• Donation
  • About Us
  • Career
  • Advertise
  • Contact
Saturday, February 27, 2021
No Result
View All Result
NEWSLETTER
Africa Eco News
18 °c
Nairobi
  • Climate Change
  • Pollution
  • Energy
  • Wildlife
  • Environment
  • Investigations
  • Infographic News
    • HEALTH
    • EDUCATION
    • BUSINESS
    • POLITICS
    • SPORTS
    • GAMES
      • CODEWORD
      • Sudoku
      • Simple Crossword
    • TODAY
      • HOROSCOPE
      • Quote Of The Day
      • Thought Of The Day
      • Today In History
      • TODAY’S BUSINESS TIP
      • Today’s Currency Exchange
      • Today’s Life Lesson
      • Today’s Personal Finance Tip
      • Today’s Prayer
      • Today’s Stock Market
      • Verse Of The Day
    • NEWS KIOSK
    • PHOTO GALLERIES/SLIDES
  • AFRICA ECO NEWS TV
  • Climate Change
  • Pollution
  • Energy
  • Wildlife
  • Environment
  • Investigations
  • Infographic News
    • HEALTH
    • EDUCATION
    • BUSINESS
    • POLITICS
    • SPORTS
    • GAMES
      • CODEWORD
      • Sudoku
      • Simple Crossword
    • TODAY
      • HOROSCOPE
      • Quote Of The Day
      • Thought Of The Day
      • Today In History
      • TODAY’S BUSINESS TIP
      • Today’s Currency Exchange
      • Today’s Life Lesson
      • Today’s Personal Finance Tip
      • Today’s Prayer
      • Today’s Stock Market
      • Verse Of The Day
    • NEWS KIOSK
    • PHOTO GALLERIES/SLIDES
  • AFRICA ECO NEWS TV
No Result
View All Result
Africa Eco News
No Result
View All Result
Home Special Project Report

New evidence contradicts claims of Russia providing DNCmails to Wikileaks

byadmin
March 22, 2018
inSpecial Project Report
0
0
SHARES
14
VIEWS
Share on FacebookShare on Twitter

Democratic presidential candidate Hillary Clinton claimed Russian interference in the US polls after losing the presidential race to President Donald Trump. PHOTO/SHUTTERSTOCK
The claim that the Kremlin was behind the emails stolen from the Democratic Party and leaked to WikiLeaks has been accepted too easily. This is confirmed by several cybersecurity experts in interviews with Dutch investigative programme Argos (VPRO, Dutch public radio).
‘‘Looking at the evidence, I can’t say that it is plausible that this nation state actor provided this information to WikiLeaks’, states Oscar Koeroo, digital security expert at Dutch telecom company KPN.
In June 2016, the Democratic National Committee (DNC) broke the news that their servers had been hacked by two Russian hacker groups: Cozy Bear and Fancy Bear. A month later WikiLeaks published thousands of internal DNC emails.
Hillary Clinton later declared her losing the presidential campaign is partly due to ‘Russian WikiLeaks’. In January of 2017, American intelligence agencies NSA, CIA and FBI stated ‘with high confidence that the GRU used (…) WikiLeaks’ to release the material stolen from the DNC.
But are we to blindly believe wat the DNC and American intelligence tell us? In its March 17th broadcast Argos highlights the many gaps in the official narrative.
Malware created after DNC installed protection platform
Among the findings is that the espionage software attributed to Fancy Bear was created after the DNC contracted cybersecurity company Crowdstrike. The creation date of this so-called X-Agent malware is May 10th 2016. This is notable, because Crowdstrike installed their ‘endpoint protection platform’ Falcon five days before that, on May 5th 2016. There is no evidence that the creation date of X-Agent has been manipulated, as Crowdstrike itself confirms.
The X-Agent malware ‘had its source code leaked or made available for a short period online’, says Alexis Dorais-Joncas, Security Intelligence Team Lead for cybersecurity company ESET. ‘ESET has a copy of the source code, which we found a few years ago. There are indications that other parties, among which security investigators, also have access to this code.’
As such, ESET states that it is plausible that anyone with access to this source code for Fancy Bear’s malware and knowledge of their usual tactics (TTP’s) could impersonate a hack by Fancy Bear. ‘If someone would obtain that source code and could easily modify it and perpetrate an attack, researchers could attribute this attack to Fancy Bear while in fact anyone could have done it.’
Such an impersonation could be made even better if the attackers had access to the X-agent source code and would modify in such a way that researchers would see it as an evolution of the tool, rather than just a copy of the old one, ESET tells Argos.
DNC-emails leaked after hack was discovered

Democratic National headquarters. PHOTO/THE NATION
The DNC-hack became worldwide news when WikiLeaks published thousands of leaked DNC-emails on July 22nd of 2016. These emails revealed how the members of the DNC supported Hillary Clinton and were actively thwarting her opponent in Bernie Sanders. The DNC-emails published by WikiLeaks can be traced back to the mail accounts of seven employees, among which their communication manager. The leak led to the resignation of several DNC employees, including its Chairperson.
Research conducted by Argos shows that the majority of these leaked emails was sent in the twenty days after Crowdstrike was hired by the DNC.
‘It is customary for a cybersecurity company to leave the system open for a while in order to observe what the hackers are doing’, says Rickey Gevers, cybersecurity expert at the RedSocks (specialized in malicious threat detection). ‘But twenty days is quite long. Especially if you knew from the get-go that there could be a Russian party in the system.’
“Crowdstrike must have observed the leaking of emails”
Crowdstrike and the DNC have repeatedly stated that they knew within a day that ‘the Russians were behind the attack’, thanks to Crowdstrike’s advanced endpoint protection platform Falcon. Crowdstrike also hired 24/7 Overwatch, which lets ‘elite security guards’ monitor the servers 24/7.
“If they were in fact monitoring the network this closely, they should have seen the emails leaking”, explains Gevers in Argos. But if this is not the case, an explanation could be that the emails were stolen in another way, according to experts Gevers (RedSocks), Koeroo (KPN) and Dorais-Joncas (ESET).
The initial coverage of the DNC hack contributes to the possibility that the network was not monitored that scrupulously, as stolen emails were not even mentioned. “The hackers stole two files”, according to Crowdstrike’s Shawn Henry. “No financial, donor or personal information appears to have been accessed or taken”, the DNC told the Washington Post.
Crowdstrike refused to comment on these findings due to client confidentiality.
No phishing mails sent to leaked DNC email accounts

CIA headquarters. PHOTO/WIKIMEDIA COMMONS
As American intelligence agencies and several cybersecurity companies accuse Fancy Bear of sending out spear phishing mails, Argos has also looked into this option.
In the spring of 2016 Fancy Bear sent over two hundred phishing mails to 108 employees of the ‘Hillary for America Campaign’. These mails were aimed at obtaining logins to mail accounts. DNC employees also received phishing mails. Although it has not been proven that these spear phishing emails are connected to the DNC hack, researchers from cybersecurity company SecureWorks state that a coincidence seems unlikely.
Argos gained exclusive access to the bit.ly links sent by Fancy Bear. In March and April of 2016 Fancy Bear sent out sixteen phishing mails to the DNC-email accounts (@dnc.org) of nine different DNC-employees. Argos discovered that three people clicked on the link in the phishing mail. The possibility of these people subsequently giving out their DNC-password is very slim, as this link led to a fake login page for Gmail, whereas the DNC used a different mail server.
Argos also tracked down which DNC-email accounts the phishing mails were sent to. None of the persons whose inbox has been exposed by WikiLeaks are among these accounts. Other persons with possible access to these email accounts, like assistants or secretaries, were not among the targets either.
There does appear to be a link between phishing mails sent out by Fancy Bear and the emails belonging to John Podesta, published by WikiLeaks. The chairman of the Hillary Clinton presidential campaign received a phishing email on his Gmail-account on March 19th 2016. His inbox was subsequently emptied.
The DNC has, despite multiple requests, not reacted to these findings.
This story was first published by Dutch investigative programme Argos (VPRO, Dutch public radio

Help us report stories that expose environmental degradation, deforestation, pollution, poaching and ivory trade, illegal fishing, dumping of toxic waste, e-waste and plastics, illegal mining, climate change and impacts of global warming on different sectors of the economy and communities, not only in Africa, but also across the globe. While traditional news reporting is losing its relevance, serious investigative journalism requires more than basic journalistic skills. To do this we require a lot of resources.
You can either BECOME A SPONSOR or MAKE A CONTRIBUTION


Nelson Mandela once said: “A critical, independent, and investigative press is the lifeblood of any democracy. The press must be free from state interference. It must have the economic strength to stand up to the blandishments of government officials. It must have sufficient independence from vested interests to be bold and inquiring without fear or favor. It must enjoy the protection of the constitution, so that it can protect our rights as citizens.”

If you like our journalism support us to continue bringing you groundbreaking and agenda setting stories.

Tags: ClintonRussiaTrumpWikileaks
admin

admin

Next Post

Battle to control motorcycle taxi service commonly known as boda boda goes hi-tech as competitors develop apps

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Baltic Exchange starts tracking shipping emissions

Baltic Exchange starts tracking shipping emissions

2 years ago
Ground-breaking clean air protocol to guard human health and the planet, enters into force

Ground-breaking clean air protocol to guard human health and the planet, enters into force

1 year ago

Popular News

    Connect with us

    Newsletter








    Recent Posts

    • Climate change, biodiversity loss and pollution a threat to humanity says UN boss
    • UN releases a calendar of events to build momentum on climate change ahead of COP26 conferences
    • States grappling with financing shortfalls to adapt to impacts of climate change new UN report says
    • Invest in green bonds UNEP official urge Kenyans
    • Used cars hindering fight against climate change new UN report says

    Like & Follow us :)

    Share

    About Us

    Africa Eco News

    Shinning light on environmental degradation and conservation in Africa

    • Donation
    • About Us
    • Career
    • Advertise
    • Contact

    Copyright 2018. Africa Eco News. All rights reserved.

    No Result
    View All Result
    • Climate Change
    • Pollution
    • Energy
    • Wildlife
    • Environment
    • Investigations
    • Infographic News
      • HEALTH
      • EDUCATION
      • BUSINESS
      • POLITICS
      • SPORTS
      • GAMES
        • CODEWORD
        • Sudoku
        • Simple Crossword
      • TODAY
        • HOROSCOPE
        • Quote Of The Day
        • Thought Of The Day
        • Today In History
        • TODAY’S BUSINESS TIP
        • Today’s Currency Exchange
        • Today’s Life Lesson
        • Today’s Personal Finance Tip
        • Today’s Prayer
        • Today’s Stock Market
        • Verse Of The Day
      • NEWS KIOSK
      • PHOTO GALLERIES/SLIDES
    • AFRICA ECO NEWS TV

    Copyright 2018. Africa Eco News. All rights reserved.

    Login to your account below

    Forgotten Password?

    Fill the forms bellow to register

    All fields are required. Log In

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In