Hackers ‘targeted Hillary Clinton’s campaign chairman with bogus email’

&Tab;&Tab;<div class&equals;"wpcnt">&NewLine;&Tab;&Tab;&Tab;<div class&equals;"wpa">&NewLine;&Tab;&Tab;&Tab;&Tab;<span class&equals;"wpa-about">Advertisements<&sol;span>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"u top&lowbar;amp">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<amp-ad width&equals;"300" height&equals;"265"&NewLine;&Tab;&Tab; type&equals;"pubmine"&NewLine;&Tab;&Tab; data-siteid&equals;"111265417"&NewLine;&Tab;&Tab; data-section&equals;"1">&NewLine;&Tab;&Tab;<&sol;amp-ad>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;<&sol;div><p>New evidence released by WikiLeaks appears to show how hackers earlier this year stole more than 50&comma;000 emails from Hillary Clinton&&num;8217&semi;s campaign chairman&period;<&sol;p>&NewLine;<p>The audacious electronic attack&comma; blamed on Russia&&num;8217&semi;s government&comma; resulted in embarrassing political disclosures about Democrats in the final weeks before the US presidential election&period;<&sol;p>&NewLine;<p>The hackers sent John Podesta an official-looking email on Saturday March 19 that appeared to come from Google&comma; according to a batch of messages published by WikiLeaks&period;<&sol;p>&NewLine;<p>It warned that someone in Ukraine had obtained Mr Podesta&&num;8217&semi;s personal Gmail password and tried unsuccessfully to log in&comma; and it directed him to a website where he should &&num;8220&semi;change your password immediately&&num;8221&semi;&period;<&sol;p>&NewLine;<p>Mr Podesta&&num;8217&semi;s chief of staff&comma; Sara Latham&comma; forwarded the email to the operations help desk of Mrs Clinton&&num;8217&semi;s campaign&comma; where staffer Charles Delavan in Brooklyn&comma; New York&comma; wrote back 25 minutes later&colon; &&num;8220&semi;This is a legitimate email&period; John needs to change his password immediately&period;&&num;8221&semi;<&sol;p>&NewLine;<p>But the email was not authentic&period;<&sol;p>&NewLine;<p>The link to the website where Mr Podesta was encouraged to change his Gmail password actually directed him instead to a computer in the Netherlands with a web address associated with Tokelau&comma; a territory of New Zealand located in the South Pacific&period;<&sol;p>&NewLine;<p>The hackers carefully disguised the link using a service that shortens lengthy online addresses&period;<&sol;p>&NewLine;<p>But even for anyone checking more diligently&comma; the address &&num;8211&semi; &&num;8220&semi;google&period;com-securitysettingpage&&num;8221&semi; &&num;8211&semi; was crafted to appear genuine&period;<&sol;p>&NewLine;<p>In the email&comma; the hackers even provided an internet address of the purported Ukrainian hacker that actually traced to a mobile communications provider in Ukraine&period;<&sol;p>&NewLine;<p>It was also notable that the hackers struck Mr Podesta on a weekend morning&comma; when organisations typically have fewer resources to investigate and respond to reports of such problems&period;<&sol;p>&NewLine;<p>It is not immediately clear how Mr Podesta responded to the threat&comma; but five months later hackers successfully downloaded tens of thousands of emails from Mr Podesta&&num;8217&semi;s accounts that have now been posted online&period;<&sol;p>&NewLine;<p>The Clinton campaign declined to discuss the incident&period;<&sol;p>&NewLine;<p>Mr Podesta has previously confirmed his emails were hacked and said the FBI was investigating&period;<&sol;p>&NewLine;<p>The suspicious email was among more than 1&comma;400 messages published by WikiLeaks on Friday that had been hacked from Mr Podesta&&num;8217&semi;s account&period;<&sol;p>&NewLine;<p>It was not known whether the hackers deliberately left behind the evidence of their attempted break-in for WikiLeaks to reveal&comma; but the tools they were using seven months ago still indicate they were personally targeting Mr Podesta &&num;8211&semi; late on Friday&comma; the computer in the Netherlands that had been used in the hacking attempt featured a copy of Mr Podesta&&num;8217&semi;s biographical page from Wikipedia&period;<&sol;p>&NewLine;<p>The US Office of the Director of National Intelligence and the Homeland Security Department have formally accused Russian state-sponsored hackers over the recent string of cyber attacks intended to influence the presidential election&period;<&sol;p>&NewLine;<p>Mr Delevan emailed to Mr Podesta&&num;8217&semi;s chief of staff a separate&comma; authentic link to reset Mr Podesta&&num;8217&semi;s Gmail password and encouraged Mr Podesta to turn on two-factor authentication&period;<&sol;p>&NewLine;<p>That feature protects an account by requiring a second code that is separately sent to a mobile phone or alternate email address before a user can log in&period;<&sol;p>&NewLine;<p>&&num;8220&semi;It is absolutely imperative that this is done ASAP&comma;&&num;8221&semi; Mr Delevan said&period;<&sol;p>&NewLine;<p>Tod Beardsley&comma; a security research manager at the Boston-based cyber security firm Rapid7&comma; said the fact that an IT person deemed the suspicious email to be legitimate &&num;8220&semi;pretty much guarantees the user who is not an IT person is going to click on it&&num;8221&semi;&period;<&sol;p>&NewLine;<p>Other emails previously released by WikiLeaks have included messages containing the password for Mr Podesta&&num;8217&semi;s iPhone and iPad accounts&period;<&sol;p>&NewLine;&Tab;&Tab;&Tab;<div style&equals;"padding-bottom&colon;15px&semi;" class&equals;"wordads-tag" data-slot-type&equals;"belowpost">&NewLine;&Tab;&Tab;&Tab;&Tab;<div id&equals;"atatags-dynamic-belowpost-68eceae2a5c2a">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<script type&equals;"text&sol;javascript">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback &equals; function &lpar;&rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; false &equals;&equals;&equals; &lpar; window&period;isWatlV1 &quest;&quest; false &rpar; &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&sol;&sol; Use Aditude scripts&period;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings &equals; window&period;tudeMappings &vert;&vert; &lbrack;&rsqb;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings&period;push&lpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;divId&colon; 'atatags-dynamic-belowpost-68eceae2a5c2a'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;format&colon; 'belowpost'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; document&period;readyState &equals;&equals;&equals; 'loading' &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;document&period;addEventListener&lpar; 'DOMContentLoaded'&comma; window&period;getAdSnippetCallback &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; else &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback&lpar;&rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;script>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>


Discover more from London Glossy Post

Subscribe to get the latest posts sent to your email.

- Advertisement -

1 COMMENT

  1. What is the meaning of this Glossy? Are you saying the wikileaks are fake? All those emails?

Comments are closed.

Exit mobile version