Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Hacker ‘Guccifer’ Claims Responsibility for DNC Breach

    By
    Sean Michael Kerner
    -
    June 16, 2016
    Share
    Facebook
    Twitter
    Linkedin
      DNC hack

      On June 14, the Democratic National Committee reported that it was the victim of a data breach, allegedly by attackers from Russia. On June 15, a hacker identified only as “Guccifer” emerged, claiming responsibility for the breach, denying any connection to Russia and refuting security firm CrowdStrike’s research on the attack.

      For CrowdStrike’s part, co-founder Dmitri Alperovitch told eWEEK in a brief email exchange that everything is not as it seems.

      When the DNC discovered that it had been the victim of a data breach, it called in CrowdStrike to investigate. CrowdStrike determined that the DNC had been hacked by two different Russia-based groups that it identified as FuzzyBear and CozyBear.

      “Worldwide known cyber security company CrowdStrike announced that the Democratic National Committee (DNC) servers had been hacked by ‘sophisticated’ hacker groups,” Guccifer wrote in a public disclosure. “I’m very pleased the company appreciated my skills so highly))) But in fact, it was easy, very easy.”

      Guccifer claims to have been the first to hack the DNC, but won’t necessarily be the last. In an attempt to validate the DNC hack claims, Guccifer published multiple reports that allegedly were stolen from the DNC servers, including one on Donald Trump dated Dec. 19, 2015, a list of DNC donors and Hillary Clinton emails.

      “The main part of the papers, thousands of files and mails, I gave to Wikileaks,” Guccifer wrote. “They will publish them soon.”

      For his part, presumptive Republican presidential candidate Donald Trump has his own unique views on the DNC hack.

      “We believe it was the DNC that did the ‘hacking’ as a way to distract from the many issues facing their deeply flawed candidate and failed party leader,” Trump said in a statement.

      Despite the claims made by Guccifer, CrowdStrike is standing by its research and attribution. In a statement CrowdStrike sent to eWEEK, the company noted that the Guccifer blog post presents documents alleged to have originated from the DNC.

      “Whether or not this posting is part of a Russian Intelligence disinformation campaign, we are exploring the documents’ authenticity and origin,” CrowdStrike stated. “Regardless, these claims do nothing to lessen our findings relating to the Russian government’s involvement, portions of which we have documented for the public and the greater security community.”

      Tomer Weingarten, CEO of security firm SentinelOne, said his firm’s research team has not been actively investigating any specific group or individual in the case of the DNC hack but, when the code from the hack was released, SentinelOne immediately traced it back to some publicly available techniques that are typically used to evade antivirus software.

      “Nothing about the technique seemed all that sophisticated—in fact, we thought it was slightly atypical for a government-grade attack to use publicly known techniques,” Weingarten told eWEEK.

      In almost every hack, accurate attribution is difficult because there rarely is a smoking gun, according to Weingarten. What’s more important than attribution, he said, is the need to understand and investigate the breadth and depth of a hack.

      “Attribution is hard—not always accurate, but in some cases doable,” Weingarten said. “And who knows—maybe there were multiple hackers inside the DNC network.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×