Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Clinton Foundation Denies Being Hacked

The hacker calling himself Guccifer 2.0 leaked hundreds of megabytes of files allegedly stolen from the Clinton Foundation, but the organization’s representatives said there was no evidence of a data breach.

The hacker calling himself Guccifer 2.0 leaked hundreds of megabytes of files allegedly stolen from the Clinton Foundation, but the organization’s representatives said there was no evidence of a data breach.

Guccifer 2.0 has taken credit for hacking the Democratic National Committee (DNC) and the Democratic Congressional Campaign Committee (DCCC), from which he leaked numerous files. However, researchers believe Guccifer 2.0, who has claimed to be Romanian, is actually a persona used by Russia-backed threat actors.

In a post published on Tuesday on his WordPress blog, Guccifer 2.0 said he hacked a Clinton Foundation server and downloaded hundreds of thousands of documents from it. The more than 800 Mb of files store various types of information, including what appear to be donor lists.

“Hillary Clinton and her staff don’t even bother about the information security. It was just a matter of time to gain access to the Clinton Foundation server,” the hacker said.

However, Clinton Foundation President Donna E. Shalala said on Twitter that there is no evidence of a hack.

While some of the leaked information could come from a Clinton Foundation server, many of the files appear to originate from earlier hacks for which Guccifer 2.0 took credit. For instance, one of the sample files published by the hacker was created by someone named “Kevin McKeon.” Until 2014, McKeon occupied various leadership roles at the DCCC.

Advertisement. Scroll to continue reading.

Evidence uncovered by Ars Technica and others also suggests that many of the files come from the DCCC and not the Clinton Foundation.

This is not the first report of a breach at the Clinton Foundation. Bloomberg learned in June that the organization’s systems had been targeted by Russian hackers, but officials said they were not aware of a breach.

Security researchers believe the attacks on the U.S. Democratic Party were actually carried out by cyber espionage groups sponsored by the Russian government. One of these groups is known as Fancy Bear, APT28, Pawn Storm, Strontium, Sofacy, Sednit and Tsar Team.

Fancy Bear is believed to be responsible for, among others, the attacks on the World Anti-Doping Agency (WADA) and organizations investigating the Malaysia Airlines flight MH17 crash in Ukraine.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...