State-backed hackers targeted Trump and Biden campaigns, says Google

&Tab;&Tab;<div class&equals;"wpcnt">&NewLine;&Tab;&Tab;&Tab;<div class&equals;"wpa">&NewLine;&Tab;&Tab;&Tab;&Tab;<span class&equals;"wpa-about">Advertisements<&sol;span>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"u top&lowbar;amp">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<amp-ad width&equals;"300" height&equals;"265"&NewLine;&Tab;&Tab; type&equals;"pubmine"&NewLine;&Tab;&Tab; data-siteid&equals;"111265417"&NewLine;&Tab;&Tab; data-section&equals;"1">&NewLine;&Tab;&Tab;<&sol;amp-ad>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;<&sol;div><p>State-backed hackers have targeted the election campaigns of US President Donald Trump and former vice president Joe Biden&comma; Google said&period;<&sol;p>&NewLine;<p>The company confirmed the findings after the director of its Threat Analysis Group&comma; Shane Huntley&comma; disclosed the attempts on Twitter&period;<&sol;p>&NewLine;<p>Mr Huntley said a Chinese group known as Hurricane Panda targeted Trump campaign staff while an Iranian outfit known as Charming Kitten had attempted to breach accounts of Biden campaign workers&period;<&sol;p>&NewLine;<p>Google said it saw no evidence that the phishing attempts were successful&period;<&sol;p>&NewLine;<blockquote class&equals;"twitter-tweet" data-width&equals;"550" data-dnt&equals;"true">&NewLine;<p lang&equals;"en" dir&equals;"ltr">If you are working on a campaign this election cycle&comma; your personal accounts may be targeted&period; Use the best protection you can&period; Two factor authentication or Advanced Protection really can make a difference&period; <a href&equals;"https&colon;&sol;&sol;t&period;co&sol;Y8shDx9eWu">https&colon;&sol;&sol;t&period;co&sol;Y8shDx9eWu<&sol;a><&sol;p>&NewLine;<p>&mdash&semi; Shane Huntley &lpar;&commat;ShaneHuntley&rpar; <a href&equals;"https&colon;&sol;&sol;twitter&period;com&sol;ShaneHuntley&sol;status&sol;1268589220601323521&quest;ref&lowbar;src&equals;twsrc&percnt;5Etfw">June 4&comma; 2020<&sol;a><&sol;p><&sol;blockquote>&NewLine;<p><script async src&equals;"https&colon;&sol;&sol;platform&period;twitter&period;com&sol;widgets&period;js" charset&equals;"utf-8"><&sol;script><&sol;p>&NewLine;<p>Such attempts typically involve forged emails with links designed to harvest passwords or infect devices with malware&period;<&sol;p>&NewLine;<p>The effort targeted personal email accounts of staff in both campaigns&comma; according to the company statement&period;<&sol;p>&NewLine;<p>A Google spokesman added that &OpenCurlyDoubleQuote;<i>the timeline is recent and that a couple of people were targeted on both campaigns<&sol;i>”&period;<&sol;p>&NewLine;<p>He would not say how many&period;<&sol;p>&NewLine;<p>Google said it sent targeted users &OpenCurlyDoubleQuote;<i>our standard government-backed attack warning<&sol;i>” and referred the incidents to federal law enforcement&period;<&sol;p>&NewLine;<blockquote class&equals;"twitter-tweet" data-width&equals;"550" data-dnt&equals;"true">&NewLine;<p lang&equals;"en" dir&equals;"ltr">This is a major disclosure of potential cyber-enabled influence operations&comma; just as we saw in 2016&period; <&sol;p>&NewLine;<p>The part here disclosed by <a href&equals;"https&colon;&sol;&sol;twitter&period;com&sol;ShaneHuntley&quest;ref&lowbar;src&equals;twsrc&percnt;5Etfw">&commat;ShaneHuntley<&sol;a>&&num;39&semi;s team at <a href&equals;"https&colon;&sol;&sol;twitter&period;com&sol;Google&quest;ref&lowbar;src&equals;twsrc&percnt;5Etfw">&commat;Google<&sol;a> is the cyber-enabled pre-cursor to potential influence operations&period;<&sol;p>&NewLine;<p>It&&num;39&semi;s a necessary reminder&comma; especially to campaigns&period; <a href&equals;"https&colon;&sol;&sol;t&period;co&sol;eKqWvN7Ub0">https&colon;&sol;&sol;t&period;co&sol;eKqWvN7Ub0<&sol;a><&sol;p>&NewLine;<p>&mdash&semi; Graham Brookie &lpar;&commat;GrahamBrookie&rpar; <a href&equals;"https&colon;&sol;&sol;twitter&period;com&sol;GrahamBrookie&sol;status&sol;1268594454002380804&quest;ref&lowbar;src&equals;twsrc&percnt;5Etfw">June 4&comma; 2020<&sol;a><&sol;p><&sol;blockquote>&NewLine;<p><script async src&equals;"https&colon;&sol;&sol;platform&period;twitter&period;com&sol;widgets&period;js" charset&equals;"utf-8"><&sol;script><&sol;p>&NewLine;<p>Graham Brookie&comma; director of the Atlantic Council’s Digital Forensic Research Lab&comma; called the announcement &OpenCurlyDoubleQuote;<i>a major disclosure of potential cyber-enabled influence operations&comma; just as we saw in 2016<&sol;i>″&period;<&sol;p>&NewLine;<p>His tweet referred to the Russian hacking of the Democratic National Committee and Hillary Clinton’s 2016 presidential campaign and subsequent online release of internal emails – some doctored – that US investigators determined sought to assist the Trump campaign&period;<&sol;p>&NewLine;<p>Neither the Biden nor the Trump campaign would say how many staff were targeted&comma; when the attempts took place or whether the phishing was successful&period;<&sol;p>&NewLine;<p>Both campaigns have been extremely reticent about discussing cyber security&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;<i>The Trump campaign has been briefed that foreign actors unsuccessfully attempted to breach the technology of our staff&comma;<&sol;i>” the campaign said in a statement&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;<i>We are vigilant about cyber security and do not discuss any of our precautions<&sol;i>&period;”<&sol;p>&NewLine;<p>The Biden campaign did not even confirm the attempt&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;<i>We are aware of reports from Google that a foreign actor has made unsuccessful attempts to access the personal email accounts of campaign staff&comma;<&sol;i>” it said in a statement&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;<i>We have known from the beginning of our campaign that we would be subject to such attacks and we are prepared for them&period;<&sol;i>”<&sol;p>&NewLine;<p>Hurricane Panda&comma; also known by security researchers as Zirconium or APT31 – an abbreviation for &OpenCurlyDoubleQuote;<i>advanced persistent threat<&sol;i>” – is known for focusing on intellectual property theft and other espionage&period;<&sol;p>&NewLine;<p>Charming Kitten&comma; also known as Newscaster and APT35&comma; is reported to have targeted US and Middle Eastern government officials and businesses&comma; also for information theft and spying&period;<&sol;p>&NewLine;<p>In October&comma; Microsoft said hackers linked to Iran’s government had targeted a US presidential campaign and the New York Times and Reuters identified the target as Mr Trump’s re-election campaign&period;<&sol;p>&NewLine;<p>Campaign spokesman Tim Murtaugh said at the time that there was &OpenCurlyDoubleQuote;<i>no indication that any of our campaign infrastructure was targeted<&sol;i>”&period;<&sol;p>&NewLine;<p>A former director of the National Security Agency&comma; Keith Alexander&comma; said he fully expects geopolitical rivals of the US to take advantage of the Covid-19 crisis and unrest in the country&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;<i>This is an increased time I think for adversaries to hurt our country and I do think they will take that during elections&comma;<&sol;i>” he said&period;<&sol;p>&NewLine;&Tab;&Tab;&Tab;<div style&equals;"padding-bottom&colon;15px&semi;" class&equals;"wordads-tag" data-slot-type&equals;"belowpost">&NewLine;&Tab;&Tab;&Tab;&Tab;<div id&equals;"atatags-dynamic-belowpost-68ed2c396c2fa">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<script type&equals;"text&sol;javascript">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback &equals; function &lpar;&rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; false &equals;&equals;&equals; &lpar; window&period;isWatlV1 &quest;&quest; false &rpar; &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&sol;&sol; Use Aditude scripts&period;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings &equals; window&period;tudeMappings &vert;&vert; &lbrack;&rsqb;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings&period;push&lpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;divId&colon; 'atatags-dynamic-belowpost-68ed2c396c2fa'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;format&colon; 'belowpost'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; document&period;readyState &equals;&equals;&equals; 'loading' &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;document&period;addEventListener&lpar; 'DOMContentLoaded'&comma; window&period;getAdSnippetCallback &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; else &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback&lpar;&rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;script>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>


Discover more from London Glossy Post

Subscribe to get the latest posts sent to your email.

- Advertisement -
Exit mobile version