#Van Mook Computers
Explore tagged Tumblr posts
Text
Here's an entire pitch that I came up with for a spin-off video game called "A Tale Of Darkness" that brings together Tangled and Frozen in an unconventional way.
It's a dark fantasy action adventure video game that is a Tangled/Frozen female-led crossover in a different continuity, has Devil May Cry-influenced gameplay and has a mixture of high-quality computer animated cutscenes that advance the story in their own different and unique ways.
Premise:
"A Tale Of Darkness" tells the story of Anna, the sweet and kind-hearted but klutzy and socially awkward young peasant woman who is too clumsy for her own good, always leaving a mess of a trail behind much to her frustration and is seen as an outcast. It's then on one night after humiliating herself at the "Fall Harvest" due to an incident with a pig that her life is turned completely upside-down when living shadows abduct her mother and 10-year-old sister and take them into the deepest and darkest part of the forest.
There, Anna finds herself in a hidden but deadly magical world right under our noses in an attempt to rescue them against all the odds as she now has a hardened armor attached to her body that gives her pale white skin and incredible fighting skills which she now has to use in order to survive and save her mother and sister.
Along the way not only must Anna overcome the highest stakes possible ranging from the numerous macabre creatures to this hidden world's leader whose responsible for everything occurring to said leader's female soldiers with the same armor, pale skin and skills but also find it in herself the courage, maturity and strength she never knew she had.
However in doing so, Anna ends up unintentionally attracting the attention of a certain soldier by the name of Elsa who later towards the final act offers to team up with Anna after not only being impressed with her skills especially in their previous encounters but also finding out her leader's true intentions.
Notes/Trivia/Details:
• The gameplay will be heavily influenced by a lot of the free-world and combat of the first Devil May Cry game and even The Nightmare Before Christmas: Oogie's Revenge while at the same time taking what made those gameplays distinctive and making it all its own.... and also fixing all of the problems RebelTaxi had with Oogie's Revenge in his review.
• As for the aesthetic, like I said it will have the same quality of animation that the films, short and special all have with the cutscenes and aforementioned gameplay being done by WDAS. But at the same time, it will also have a gothic and macabre style to it that is almost Tim Burton-reminiscant especially with the backgrounds.
• Kristen Bell, Idina Menzel, Mandy Moore and Eden Espinosa will all reprise their roles of Anna, Elsa, Rapunzel and Cassandra. The latter three characters are now in this version or continuity part of the army of soldiers with Cass being a maniacal and manipulative one who later uses it for good, Rapunzel being the good-natured one who always gets pushed around quite literally but finally has enough and finds her own inner strength and Elsa being at first the loyal mook who follows any order that she's told and only breaks them when she feels or thinks it's for the better but then teams up with Anna when she finds out her leader's real plans.
• Three new characters are three grey-skinned female vampires with their own bombastic and enjoyably twisted personalities - Cherry, Elise and Athena - that just like Elsa, Rapunzel and Cass will turn around to the good side through their own means. Influenced by the Brides from Van Helsing in their winged bat forms minus the wings and less over-the-top as they were.
• Anna, Elsa, Rapunzel and Cass will have the same type of armor that Cass had in Rapunzel's Tangled Adventure S3 when she fused with the Moonstone, pale skin and all while at the same time keeping the colors of their hair so said color pops - Anna's hair is brown, Elsa's hair is white, Rapunzel's hair is golden blonde and Cassandra's hair is black. Meanwhile with their armor - Anna's armor is brown, Elsa's armor is white, Rapunzel's armor is purple and Cassandra's armor is black.
• The game will have a dark and intense, scary edge to it that shows us the dangers and stakes that all of the characters, especially Anna, are in and to balance out the lighter aspects. For example, when Anna accidentally ends up falling on Elsa.... Elsa devours her whole. Only for Anna to blast her way out of Elsa's stomach using something she ate way earlier and for later, Elsa puts herself back together in one.
• As for the villain of the video game, the leader that I've mentioned is named Eris and is a cunning, cold-hearted and ferocious master who is later on revealed to have a code she goes by when push comes to shove while at the same time never losing her menace.
• SPOILERS: How it ends is that after going through hell and back and a larger climax than you think, Anna is reunited with her mother and sister only to find out when they're asleep that she still has her armor and that Elsa, Rapunzel, Cassandra, Cherry, Elise and Athena all followed her into her world with Elsa proposing that they use their skills for good and that her and Anna become a couple. Without any other choice, Anna's forced to agree with Elsa embracing her.
Remember, different continuity. They are not related here as they honestly should've been from the getco.
One final thing that should be interesting is without it being obvious is that every now and then there are a few easter eggs that heavily imply a retroactive shared universe and it could be in a shared universe. It's through objects that Eris collects.
9 notes
·
View notes
Text
Update Office software dankzij Van Mook Computers en Hollands Kroonse Uitdaging
Bedrijvennieuws: 'Update Office software dankzij Van Mook Computers en Hollands Kroonse Uitdaging'
WIERINGERMEER – Dankzij Van Mook Computers uit Hippolytushoef en de Hollands Kroonse Uitdaging is de Stichting De Meerpeen Media, Muziek en Theater, waar ook de nieuwswebsite De Meerpeen deel van uitmaakt, in het bezit gekomen in een nieuw pakket van Office 2019.
‘Tot vandaag werkten we bij de stichting nog met een oude versie van Office. Volgens mij Office 2007 als ik me niet vergis. Qua…
View On WordPress
0 notes
Text
Finished a rewatch of Noir! It is absolutely not a binge-friendly show, at least in an unchanged state. It has to save a whole lot of animation budget, so there are so many stills and repeat footage. Some of the stills, I feel, do work with the traditional pacing of the film noir, good timing to capture the tension in a scene, or to allow for quiet moments of character introspection. However, the repeat flashbacks get really bad. And the cherry on top is that their soundtrack budget in the early episodes was tiny, so not only do you get repeat footage, there is SO MUCH music repeat, even more than might be acceptable for a non-binge show. It's probably better to watch the show either in a slightly sped up state, or just being liberal in skipping forward in the stream. The Funimation player, which I used for this rewatch, has the +/- 10s feature, which is nice. The show, both sub and dub, are both legally available on Youtube, though. The pacing issue is the main problem with the series. The other problem is that this is a show broadcast in 2001, set in 2009, but never having predicted how thoroughly technology would change the game. No hacking, little of tech-based surveillance or security systems, brick phones but the protagonists don't have any (they use a pay phone once!), no earbud comms, and the background designers forget themselves and have shown big box computer monitors multiple times (with floppy drives!). The lack of a "nerd in a van/nerd back at ops HQ" is really notable. It's all about taking out mooks, not cameras or alarms. However, if you just pretend the show isn't set in 2009, it works. A lot of the lack of technology puts the show back in the film noir aesthetic, keeping the focus on man vs. man. And in that, I thought that the show is still strong. The character motivations are consistent. Other than Kirika the kuudere, most of the main characters avoid anime archetypes. The writer is confident in the arcs they want, and in the relationship dynamics to portray each episode. While there's nothing special about the writing, the plotting kept necessarily simple to keep within action budget and time constraints, I still find it relatively stronger than a lot of anime. To go along with that, the direction of photography is quite good. Even with the stills, the directors have strong intent with each shot, a conservation of detail in framing that I rarely feel in other anime. The voice acting rises to the occasion, of course, paired with meaningful silent expression work by the animators. Plus, the bits of sakuga in this are good. Not just the action-fests, which are a treat worth all of the stills and (skipped) flashbacks), but also little moments only meant to demonstrate character. Noir is not a great show. It's probably not a good watch for people not into anime, or who like the current prestige TV model. But I myself wouldn't mind rewatching it again in the future. (It's funny, the OP has the great Bond Theme visuals, but that song is DATED and only gets more annoying the longer the show goes on, whereas the ED only gets better.)
#noir#noir (anime)#category: anime#now should I rewatch el cazador or try out canaan for the first time?
4 notes
·
View notes
Text
Episode 3! TIME TO MEET THE BUFF DIVA AND KLEPTO QUEEN.
Recap time?? Ain’t nobody got time for that.
OKAY SO IT’S NOT A TOTAL RECAP
People in Den City are hyped that Playmaker won…
OH AND HERE’S KNIGHT BOY ON THE GROUND okay so he didn’t fall to his death
Playmaker runs over to him, starts interrogating this heavily injured man
Knight Boy… smiles?
AND THE RED THING OVER HIS EYE STARTS BLINKING
IGNIS IS SCREAMING
HE
SHOOTS OUT OF PLAYMAKERS DUEL DISK??
ENVELOPS THE KNIGHBOY?????
EATS. THE. KNIGHT BOY.
OH MY GOD.
IGNIS JUST ATE SOMEONE
WHAT IS THIS SHIT?!
I DIDN’T KNOW YOU WERE A HUMANITARIAN, IGNIS
WOW. WOW.
*hyperventalating*
So... Ignis goes back into the duel disk...
PLAYMAKER DOESN’T EVEN LOOK FAZED THAT HIS HOSTAGE COULD HAVE EATEN HIM AT ANY MOMENT
Ignis is… annoyed?? “Look what you made me do, man. I didn’t even wanna eat that guy, he tasted as disgusting as he looked*
AHHHH IT’S GO.
HE CHALLENGES PLAYMAKER TO A DUEL
BLUE ANGEL DOES THE SAME
BUT YUSAKU FLIES OFF ON HIS D-BOARD INSTEAD
BUT NOT TO WORRY, THEY’LL GET AT HIM SOON ENOUGH
SLEEP WITH ONE EYE OPEN, PLAYMAKER.
So back in the real world
Yusaku is obviously in pain??
Well yeah he almost died twice last episode
He and Ignis are tlking about shit and
WHATEVER HE SAYS… FLATTERS IGNIS?? Aw look at my little humanitarian.
So it goes without saying that Akira, Revolver and Specter are… HIGHLY interested in Playmaker now
… nice, the vid I’m watching jumped -_-
So, next day
Playmaker’s all over the news
He’s the new shit in town!
Back in Link Vrains
IS THIS FROG AND ROBOPPY??
THESE CUTE ROBOT ANIMALS
So i figure they’re also sentient??
*heavy sigh* Okay let’s see how this works
Someone’s shouting?/
Wait
WAIT
THAT IS NOT PLAYMAKER
SOME HAPPY ASSHOLE IS POSING AS PLAYMAKER AND
OKAY THERE ARE TWO OTHERS??
THEY ALL LOOK WAY TOO PEPPY LMFAO
But this is interesting, they look a LOT like Playmaker…
So you can change your face shape in VR?? Hot damn.
Back in the illustrious hotdog van!
Yusaku’s trying to make a physical version of Decode Talker, it seems
Shoichi’s there, too
Ignis is still calling Yusaku ‘playmaker-sama’
He and Yusaku are talking about things and stuffs
Their conversation eventually devolves into Ignis whining in the background while Yusaku goes about his business
Yusaku starts talking to Shoichi??
WHATEVER THEY’RE TALKING ABOUT IS MAKING IGNIS CRY?? HOW DARE.
Kk so back in Link Vrains
Two dudes broke some rules or some shit and got bagged by the cops
Okay, so at least we know not ANYTHING goes? But these cops obvs can’t stop the KoH
Back at SOL
Akira is conversing with Bishop, Knight and Rook
Prob thinking up a plan to get Ignis or whatever
Oh, Akira just brought up the Cyberse!
Akira is hype af to catch Playmaker lol calm down dude
Alright alright
ALONG THE CITY ROADS
Akira’s limo pulls up and it’s…!
EMA. MY QUEEN.
She’s on her bike, talking to Akira in his limo
He’s hiring her services to take down Playmaker
Ema… I can’t read Ema right now, she looks too peppy
Damn, I wish I knew what they were saying??
But sure, it seems they come to some sort of agreement; they drive off in opposite directions.
Later, in the outskirts of town…
GO IS WORKING OUT
AND HE’S MAD.
TOTALLY LIVID THAT YUSAKU IS NOW MORE POPULAR THAN HIM
HIS MANAGER (?) TRIES TO CALM HIM DOWN??
AND THAT’S WHEN
Akira drives up.
He introduces himself, hands Manager Man his business card
So… Akira is also hiring Go to take on Playmaker
And it looks like he’ll be giving Go a D-Board for this purpose
Nice nice nice
So basically, Akira needs people who can speed duel
Ema has her D-Wheel, and now Go is gonna have a D-Board
AND GO IS GONNA DO IT
HOT DAMN
Back to the truck, which is liTERALLY PARKED IN THE WOODS
OKAY I WAS KIDDING WHEN I SAID THEY LIVED IN THE TRUCK OUT IN THE WOODS HOW THE HELL—
Anyway, it’s officially nighttime and Yusaku is still working on that damn card
Shoichi is bored
Do you ever sleep outside of class, Yusaku? Like, ever?
So Yusaku says something that catches Shoichi’s interest
Ignis is… alarmed?
Omg wait
ARE YUSAKU AND SHOICHI ABLE TO SEE INTO IGNIS’S MEMORIES OF REVOLVER??
YEAH, THEY’RE WATCHING THE WHOLE ‘CYBERSE’ EVENT
IGNIS MALFUNCTIONS
REVOLVER COMES UP
YUSAKU AND SHOICHI SHUT DOWN THEIR ENTIRE OPERATION
YUSAKU RUNS OUTSIDE AND
AND…!
THE REAL WORLD AND LINK VRAINS ARE MERGING??
REVOLVER COMES OUT OF THE SKY
HE’S FLYING ON CRACKING DRAGON
HES HEADED RIGHT FOR YUSAKU
OMG DID THEY INADVERTENTLY LET REVOLVER KNOW WHERE IGNIS WAS
WHAT IS THIS
WHAT
W H A T ?
…. okay Shoichi comes running out
Was that… a hallucination on Yusaku’s part??
WHAT
So… back in the van?? (I really need an explanation for wtf just happened)
All the computers are back on
Ignis drops a drama bomb on Yusaku and Shoichi that has them both freaking out
“Revolver…?!”
Yusaku… you don’t KNOW Revolver, do you? 8)
… and speaking of my beautiful bullet baby
Revolver is distressed??
He’s talking with some doctor
About Playmaker, because he’s the latest fashion trend
So the doctor… comes out of VR, back to the real world
Walks over to a hospital bed…
Some guy is laying there with his head enveloped in some machine—
That’s Revolver, isn’t it.
OH SHIT SO
THE KOH WANT TO DESTROY THE CYBERSE BECAUSE…!
Is it that they’re trapped in it and want to get out?? Omg.
What if Vrains is all one giant coma dream Revolver is having, guys
Okay and the doctor places his hand over Revolver’s (?)
Doctor has a… mark on his thumb? A little tattoo?? The fuck is up with that
The next day in school!
Yusaku is so not about this lecture
Instead, he’s thinking about his Revolver hallucination and that speed duel and data storm and—
Naoki interrupts! Asks Yusaku about Playmaker lmao
OKAY I LOVE HOW NAOKI WAS SITTING A FEW SEATS AWAY AND NOW
HE’S SITTING RIGHT NEXT TO YUSAKU
GUSHING ABOUT PLAYMAKER
MY GAY SON ISN’T AT ALL SUBTLE ABOUT HIS CRUSHES
Yusaku doesn’t give a shit, as always
Naoki asks Yusaku about his… duel disk?? Okay.
Well he obvs cant bring it to school anymore, so it’s—
What is this interesting af looking apt building
IS THIS WHERE YUSAKU LIVES
OMG IT LOOKS LIKE A RUN DOWN SHACK
THIS HAS TO BE IT
IGNIS IS THERE
And so is a cleaning robot??
What a cutie omg
Ignis is talking to the cleaning robot
Talk talk taaaalk
ALRIGHT BACK TO GO
“INTO THE VRAINS”
AHHHH WE’RE GONNA SEE GO’S MAGICAL GIRL SEQUENCE I’M SO EXCITE.
ANNNNND he doesn’t have one.
Naturally, he looks the same in both settings—
OH NO
AW FUCK THE KOH ARE ATTACKING
IT’S A KOH MOOK—
Waaaaait
No. No no no.
I feel like this is Go.
IT HAS TO BE, WE DIDN’T SE HIS SEQUENCE, WE KNOW HE’S GOING TO BE POSING AS ONE OF THEM—
But okay, the characters don’t know that
Which is why Naoki, who was watching Link Vrains in class, is now freaking out
HE STANDS UP, STARTS SCREAMING
YUSAKU IMMEDIATLY DISAPEPARS lol that’s not suspicious at all
Preview time!
Yusaku runs home to get ignis, I presume
Shoichi also finished making a physical version of Decode Talker?
Go has revealed himself!
HE AND PLAYMAKER ARE DUELING
AW YIS NEXT EPISODE IS GONNA BE SO LIT
#yugioh vrains#vrains episode reactions#vrains episode 3#yusaku fujiki#playmaker#ai#shoichi kusanagi#go onizuka#'go onizuka'#akira zaizen#ema bessho#revolver#sol technology#knights of hanoi#den city#link vrains#cyberse
16 notes
·
View notes
Text
Inside story: How Russians hacked the Democrats’ emails
Photo by Spencer Platt/Getty Images
WASHINGTON — It was just before noon in Moscow on March 10, 2016, when the first volley of malicious messages hit the Hillary Clinton campaign.
The first 29 phishing emails were almost all misfires. Addressed to people who worked for Clinton during her first presidential run, the messages bounced back untouched.
Except one.
Within nine days, some of the campaign’s most consequential secrets would be in the hackers’ hands, part of a massive operation aimed at vacuuming up millions of messages from thousands of inboxes across the world.
An Associated Press investigation into the digital break-ins that disrupted the U.S. presidential contest has sketched out an anatomy of the hack that led to months of damaging disclosures about the Democratic Party’s nominee. It wasn’t just a few aides that the hackers went after; it was an all-out blitz across the Democratic Party. They tried to compromise Clinton’s inner circle and more than 130 party employees, supporters and contractors.
While U.S. intelligence agencies have concluded that Russia was behind the email thefts, the AP drew on forensic data to report Thursday that the hackers known as Fancy Bear were closely aligned with the interests of the Russian government.
The AP’s reconstruction— based on a database of 19,000 malicious links recently shared by cybersecurity firm Secureworks — shows how the hackers worked their way around the Clinton campaign’s top-of-the-line digital security to steal chairman John Podesta’s emails in March 2016.
It also helps explain how a Russian-linked intermediary could boast to a Trump policy adviser, a month later, that the Kremlin had “thousands of emails” worth of dirt on Clinton.
PHISHING FOR VICTIMS
The rogue messages that first flew across the internet March 10 were dressed up to look like they came from Google, the company that provided the Clinton campaign’s email infrastructure. The messages urged users to boost their security or change their passwords while in fact steering them toward decoy websites designed to collect their credentials.
One of the first people targeted was Rahul Sreenivasan, who had worked as a Clinton organizer in Texas in 2008 — his first paid job in politics. Sreenivasan, now a legislative staffer in Austin, was dumbfounded when told by the AP that hackers had tried to break into his 2008 email — an address he said had been dead for nearly a decade.
“They probably crawled the internet for this stuff,” he said.
Almost everyone else targeted in the initial wave was, like Sreenivasan, a 2008 staffer whose defunct email address had somehow lingered online.
But one email made its way to the account of another staffer who’d worked for Clinton in 2008 and joined again in 2016, the AP found. It’s possible the hackers broke in and stole her contacts; the data shows the phishing links sent to her were clicked several times.
Secureworks’ data reveals when phishing links were created and indicates whether they were clicked. But it doesn’t show whether people entered their passwords.
Within hours of a second volley emailed March 11, the hackers hit pay dirt. All of a sudden, they were sending links aimed at senior Clinton officials’ nonpublic 2016 addresses, including those belonging to longtime Clinton aide Robert Russo and campaign chairman John Podesta.
The Clinton campaign was no easy target; several former employees said the organization put particular stress on digital safety.
Work emails were protected by two-factor authentication, a technique that uses a second passcode to keep accounts secure. Most messages were deleted after 30 days and staff went through phishing drills. Security awareness even followed the campaigners into the bathroom, where someone put a picture of a toothbrush under the words: “You shouldn’t share your passwords either.”
Two-factor authentication may have slowed the hackers, but it didn’t stop them. After repeated attempts to break into various staffers’ hillaryclinton.com accounts, the hackers turned to the personal Gmail addresses. It was there on March 19 that they targeted top Clinton lieutenants — including campaign manager Robby Mook, senior adviser Jake Sullivan and political fixer Philippe Reines.
A malicious link was generated for Podesta at 11:28 a.m. Moscow time, the AP found. Documents subsequently published by WikiLeaks show that the rogue email arrived in his inbox six minutes later. The link was clicked twice.
Podesta’s messages — at least 50,000 of them — were in the hackers’ hands.
A SERIOUS BREACH
Though the heart of the campaign was now compromised, the hacking efforts continued. Three new volleys of malicious messages were generated on the 22nd, 23rd and 25th of March, targeting communications director Jennifer Palmieri and Clinton confidante Huma Abedin, among others.
The torrent of phishing emails caught the attention of the FBI, which had spent the previous six months urging the Democratic National Committee in Washington to raise its shield against suspected Russian hacking. In late March, FBI agents paid a visit to Clinton’s Brooklyn headquarters, where they were received warily, given the agency’s investigation into the candidate’s use of a private email server while secretary of state.
The phishing messages also caught the attention of Secureworks, a subsidiary of Dell Technologies, which had been following Fancy Bear, whom Secureworks codenamed Iron Twilight.
Fancy Bear had made a critical mistake.
It fumbled a setting in the Bitly link-shortening service that it was using to sneak its emails past Google’s spam filter. The blunder exposed whom they were targeting.
It was late March when Secureworks discovered the hackers were going after Democrats.
“As soon as we started seeing some of those hillaryclinton.com email addresses coming through, the DNC email addresses, we realized it’s going to be an interesting twist to this,” said Rafe Pilling, a senior security researcher with Secureworks.
By early April Fancy Bear was getting increasingly aggressive, the AP found. More than 60 bogus emails were prepared for Clinton campaign and DNC staffers on April 6 alone, and the hackers began hunting for Democrats beyond New York and Washington, targeting the digital communications director for Pennsylvania Gov. Tom Wolf and a deputy director in the office of Chicago Mayor Rahm Emanuel.
The group’s hackers seemed particularly interested in Democratic officials working on voter registration issues: Pratt Wiley, the DNC’s then-director of voter protection, had been targeted as far back as October 2015 and the hackers tried to pry open his inbox as many as 15 times over six months.
Employees at several organizations connected to the Democrats were targeted, including the Clinton Foundation, the Center for American Progress, technology provider NGP VAN, campaign strategy firm 270 Strategies, and partisan news outlet Shareblue Media.
As the hacking intensified, other elements swung into place. On April 12, 2016, someone paid $37 worth of bitcoin to the Romanian web hosting company THCServers.com , to reserve a website called Electionleaks.com, according to transaction records obtained by AP. A botched registration meant the site never got off the ground, but the records show THC received a nearly identical payment a week later to create DCLeaks.com.
By the second half of April, the DNC’s senior leadership was beginning to realize something was amiss. One DNC consultant, Alexandra Chalupa, received an April 20 warning from Yahoo saying her account was under threat from state-sponsored hackers, according to a screengrab she circulated among colleagues.
The Trump campaign had gotten a whiff of Clinton email hacking, too. According to recently unsealed court documents, former Trump foreign policy adviser George Papadopoulos said that it was at an April 26 meeting at a London hotel that he was told by a professor closely connected to the Russian government that the Kremlin had obtained compromising information about Clinton.
“They have dirt on her,” Papadopoulos said he was told. “They have thousands of emails.”
A few days later, Amy Dacey, then the DNC chief executive, got an urgent call.
There’d been a serious breach at the DNC.
‘DON’T EVEN TALK TO YOUR DOG ABOUT IT’
It was 4 p.m. on Friday June 10 when some 100 staffers filed into the Democratic National Committee’s main conference room for a mandatory, all-hands meeting.
“What I am about to tell you cannot leave this room,” DNC chief operating officer Lindsey Reynolds told the assembled crowd, according to two people there at the time.
Everyone needed to turn in their laptops immediately; there would be no last-minute emails; no downloading documents and no exceptions. Reynolds insisted on total secrecy.
“Don’t even talk to your dog about it,” she was quoted as saying.
Reynolds didn’t return messages seeking comment.
Two days later, as the cybersecurity firm that was brought in to clean out the DNC’s computers finished its work, WikiLeaks founder Julian Assange told a British Sunday television show that emails related to Clinton were “pending publication.”
“WikiLeaks has a very good year ahead,” he said.
On Tuesday, June 14, the Democrats went public with the allegation that their computers had been compromised by Russian state-backed hackers, including Fancy Bear.
Shortly after noon the next day, William Bastone, the editor-in-chief of investigative news site The Smoking Gun, got an email bearing a small cache of documents marked “CONFIDENTIAL.”
“Hi,” the message said. “This is Guccifer 2.0 and this is me who hacked Democratic National Committee.”
‘CAN IT INFLUENCE THE ELECTION?’
Guccifer 2.0 acted as a kind of master of ceremonies during the summer of leaks, proclaiming that the DNC’s stolen documents were in WikiLeaks’ hands, publishing a selection of the material himself and constantly chatting up journalists over Twitter in a bid to keep the story in the press.
He appeared particularly excited to hear on June 24 that his leaks had sparked a lawsuit against the DNC by disgruntled supporters of Clinton rival Bernie Sanders.
“Can it influence the election in any how?” he asked a journalist with Russia’s Sputnik News, in uneven English.
Later that month Guccifer 2.0 began directing reporters to the newly launched DCLeaks site, which was also dribbling out stolen material on Democrats. When WikiLeaks joined the fray on July 22 with its own disclosures the leaks metastasized into a crisis, triggering intraparty feuding that forced the resignation of the DNC’s chairwoman and drew angry protests at the Democratic National Convention.
Guccifer 2.0, WikiLeaks and DCLeaks ultimately published more than 150,000 emails stolen from more than a dozen Democrats, according to an AP count.
The AP has since found that each of one of those Democrats had previously been targeted by Fancy Bear, either at their personal Gmail addresses or via the DNC, a finding established by running targets’ emails against the Secureworks’ list.
All three leak-branded sites have distanced themselves from Moscow. DCLeaks claimed to be run by American hacktivists. WikiLeaks said Russia wasn’t its source. Guccifer 2.0 claimed to be Romanian.
But there were signs of dishonesty from the start. The first document Guccifer 2.0 published on June 15 came not from the DNC as advertised but from Podesta’s inbox , according to a former DNC official who spoke on condition of anonymity because he was not authorized to speak to the press.
The official said the word “CONFIDENTIAL” was not in the original document .
Guccifer 2.0 had airbrushed it to catch reporters’ attention.
‘PLEASE GOD, DON’T LET IT BE ME’
To hear the defeated candidate tell it, there’s no doubt the leaks helped swing the election.
“Even if Russian interference made only a marginal difference,” Clinton told an audience at a recent speech at Stanford University, “this election was won at the margins, in the Electoral College.”
It’s clear Clinton’s campaign was profoundly destabilized by the sudden exposures that regularly radiated from every hacked inbox. It wasn’t just her arch-sounding speeches to Wall Street executives or the exposure of political machinations but also the brutal stripping of so many staffers’ privacy.
“It felt like your friend had just been robbed, but it wasn’t just one friend, it was all your friends at the same time by the same criminal,” said Jesse Ferguson, a former Clinton spokesman.
An atmosphere of dread settled over the Democrats as the disclosures continued.
One staffer described walking through the DNC’s office in Washington to find employees scrolling through articles about Putin and Russia. Another said she began looking over her shoulder when returning from Clinton headquarters in Brooklyn after sundown. Some feared they were being watched; a car break-in, a strange woman found lurking in a backyard late at night and even a snake spotted on the grounds of the DNC all fed an undercurrent of fear.
Even those who hadn’t worked at Democratic organizations for years were anxious. Brent Kimmel, a former technologist at the DNC, remembers watching the leaks stream out and thinking: “Please God, don’t let it be me.”
‘MAKE AMERICA GREAT AGAIN’
On Oct. 7, it was Podesta.
The day began badly, with Hillary Clinton’s phone buzzing with crank messages after its number was exposed in a leak from the day before. The number had to be changed immediately; a former campaign official said that Abedin, Clinton’s confidante, had to call staffers one at a time with Clinton’s new contact information because no one dared put it in an email.
The same afternoon, just as the American electorate was digesting a lewd audio tape of Trump boasting about sexually assaulting women, WikiLeaks began publishing the emails stolen from Podesta.
The publications sparked a media stampede as they were doled out one batch at a time, with many news organizations tasking reporters with scrolling through the thousands of emails being released in tranches. At the AP alone, as many as 30 journalists were assigned, at various times, to go through the material.
Guccifer 2.0 told one reporter he was thrilled that WikiLeaks had finally followed through.
“Together with Assange we’ll make america great again,” he wrote.
from FOX 4 Kansas City WDAF-TV | News, Weather, Sports http://fox4kc.com/2017/11/04/inside-story-how-russians-hacked-the-democrats-emails/
from Kansas City Happenings https://kansascityhappenings.wordpress.com/2017/11/05/inside-story-how-russians-hacked-the-democrats-emails/
0 notes
Text
Inside story: How Russians hacked the Democrats’ emails
New Post has been published on https://nexcraft.co/inside-story-how-russians-hacked-the-democrats-emails/
Inside story: How Russians hacked the Democrats’ emails
Work emails were protected by two-factor authentication, a technique that uses a second passcode to keep accounts secure. Most messages were deleted after 30 days and staff went through phishing drills. Security awareness even followed the campaigners into the bathroom, where someone put a picture of a toothbrush under the words: “You shouldn’t share your passwords either.”
Two-factor authentication may have slowed the hackers, but it didn’t stop them. After repeated attempts to break into various staffers’ hillaryclinton.com accounts, the hackers turned to the personal Gmail addresses. It was there on March 19 that they targeted top Clinton lieutenants — including campaign manager Robby Mook, senior adviser Jake Sullivan and political fixer Philippe Reines.
A malicious link was generated for Podesta at 11:28 a.m. Moscow time, the AP found. Documents subsequently published by WikiLeaks show that the rogue email arrived in his inbox six minutes later. The link was clicked twice.
Podesta’s messages — at least 50,000 of them — were in the hackers’ hands.
A serious breach
Though the heart of the campaign was now compromised, the hacking efforts continued. Three new volleys of malicious messages were generated on the 22nd, 23rd and 25th of March, targeting communications director Jennifer Palmieri and Clinton confidante Huma Abedin, among others.
The torrent of phishing emails caught the attention of the FBI, which had spent the previous six months urging the Democratic National Committee in Washington to raise its shield against suspected Russian hacking. In late March, FBI agents paid a visit to Clinton’s Brooklyn headquarters, where they were received warily, given the agency’s investigation into the candidate’s use of a private email server while secretary of state.
The phishing messages also caught the attention of Secureworks, a subsidiary of Dell Technologies, which had been following Fancy Bear, whom Secureworks codenamed Iron Twilight.
Fancy Bear had made a critical mistake.
It fumbled a setting in the Bitly link-shortening service that it was using to sneak its emails past Google’s spam filter. The blunder exposed whom they were targeting.
It was late March when Secureworks discovered the hackers were going after Democrats.
“As soon as we started seeing some of those hillaryclinton.com email addresses coming through, the DNC email addresses, we realized it’s going to be an interesting twist to this,” said Rafe Pilling, a senior security researcher with Secureworks.
By early April Fancy Bear was getting increasingly aggressive, the AP found. More than 60 bogus emails were prepared for Clinton campaign and DNC staffers on April 6 alone, and the hackers began hunting for Democrats beyond New York and Washington, targeting the digital communications director for Pennsylvania Gov. Tom Wolf and a deputy director in the office of Chicago Mayor Rahm Emanuel.
The group’s hackers seemed particularly interested in Democratic officials working on voter registration issues: Pratt Wiley, the DNC’s then-director of voter protection, had been targeted as far back as October 2015 and the hackers tried to pry open his inbox as many as 15 times over six months.
Employees at several organizations connected to the Democrats were targeted, including the Clinton Foundation, the Center for American Progress, technology provider NGP VAN, campaign strategy firm 270 Strategies, and partisan news outlet Shareblue Media.
As the hacking intensified, other elements swung into place. On April 12, 2016, someone paid $37 worth of bitcoin to the Romanian web hosting company THCServers.com , to reserve a website called Electionleaks.com, according to transaction records obtained by AP. A botched registration meant the site never got off the ground, but the records show THC received a nearly identical payment a week later to create DCLeaks.com.
By the second half of April, the DNC’s senior leadership was beginning to realize something was amiss. One DNC consultant, Alexandra Chalupa, received an April 20 warning from Yahoo saying her account was under threat from state-sponsored hackers, according to a screengrab she circulated among colleagues.
The Trump campaign had gotten a whiff of Clinton email hacking, too. According to recently unsealed court documents, former Trump foreign policy adviser George Papadopoulos said that it was at an April 26 meeting at a London hotel that he was told by a professor closely connected to the Russian government that the Kremlin had obtained compromising information about Clinton.
“They have dirt on her,” Papadopoulos said he was told. “They have thousands of emails.”
A few days later, Amy Dacey, then the DNC chief executive, got an urgent call.
There’d been a serious breach at the DNC.
‘Don’t even talk to your dog about it’
It was 4 p.m. on Friday June 10 when some 100 staffers filed into the Democratic National Committee’s main conference room for a mandatory, all-hands meeting.
“What I am about to tell you cannot leave this room,” DNC chief operating officer Lindsey Reynolds told the assembled crowd, according to two people there at the time.
Everyone needed to turn in their laptops immediately; there would be no last-minute emails; no downloading documents and no exceptions. Reynolds insisted on total secrecy.
“Don’t even talk to your dog about it,” she was quoted as saying.
Reynolds didn’t return messages seeking comment.
Two days later, as the cybersecurity firm that was brought in to clean out the DNC’s computers finished its work, WikiLeaks founder Julian Assange told a British Sunday television show that emails related to Clinton were “pending publication.”
Share & Written By CNBC
0 notes
Text
The inside story of how Russians hacked the Democrats' emails
Associated Press/Andrew Harnik
Hackers tried to compromise Hillary Clinton's inner circle and more than 130 party employees, supporters, and contractors in an all-out blitz across the Democratic Party.
The hackers, known as Fancy Bear, were closely aligned with the interests of the Russian government.
Hackers worked their way around the Clinton campaign's top-of-the-line digital security to steal chairman John Podesta's emails in March 2016.
WASHINGTON (AP) — It was just before noon in Moscow on March 10, 2016, when the first volley of malicious messages hit the Hillary Clinton campaign.
The first 29 phishing emails were almost all misfires. Addressed to people who worked for Clinton during her first presidential run, the messages bounced back untouched.
Except one.
Within nine days, some of the campaign's most consequential secrets would be in the hackers' hands, part of a massive operation aimed at vacuuming up millions of messages from thousands of inboxes across the world.
An Associated Press investigation into the digital break-ins that disrupted the US presidential contest has sketched out an anatomy of the hack that led to months of damaging disclosures about the Democratic Party's nominee. It wasn't just a few aides that the hackers went after; it was an all-out blitz across the Democratic Party. They tried to compromise Clinton's inner circle and more than 130 party employees, supporters and contractors.
While US intelligence agencies have concluded that Russia was behind the email thefts, the AP drew on forensic data to report Thursday that the hackers known as Fancy Bear were closely aligned with the interests of the Russian government.
The AP's reconstruction— based on a database of 19,000 malicious links recently shared by cybersecurity firm Secureworks — shows how the hackers worked their way around the Clinton campaign's top-of-the-line digital security to steal chairman John Podesta's emails in March 2016.
It also helps explain how a Russian-linked intermediary could boast to a Trump policy adviser, a month later, that the Kremlin had "thousands of emails" worth of dirt on Clinton.
____
Phishing for victims
Drew Angerer/Getty ImagesThe rogue messages that first flew across the internet March 10 were dressed up to look like they came from Google, the company that provided the Clinton campaign's email infrastructure. The messages urged users to boost their security or change their passwords while in fact steering them toward decoy websites designed to collect their credentials.
One of the first people targeted was Rahul Sreenivasan, who had worked as a Clinton organizer in Texas in 2008 — his first paid job in politics. Sreenivasan, now a legislative staffer in Austin, was dumbfounded when told by the AP that hackers had tried to break into [email protected]. He said the address had been dead for nearly a decade.
"They probably crawled the internet for this stuff," he said.
Almost everyone else targeted in the initial wave was, like Sreenivasan, a 2008 staffer whose defunct email address had somehow lingered online.
But one email made its way to the account of another staffer who'd worked for Clinton in 2008 and joined again in 2016, the AP found. It's possible the hackers broke in and stole her contacts; the data shows the phishing links sent to her were clicked several times.
Secureworks' data reveals when phishing links were created and indicates whether they were clicked. But it doesn't show whether people entered their passwords.
Within hours of a second volley emailed March 11, the hackers hit pay dirt. All of a sudden, they were sending links aimed at senior Clinton officials' nonpublic 2016 addresses, including those belonging to longtime Clinton aide Robert Russo and campaign chairman John Podesta.
The Clinton campaign was no easy target; several former employees said the organization put particular stress on digital safety.
Work emails were protected by two-factor authentication, a technique that uses a second passcode to keep accounts secure. Most messages were deleted after 30 days and staff went through phishing drills. Security awareness even followed the campaigners into the bathroom, where someone put a picture of a toothbrush under the words: "You shouldn't share your passwords either."
Two-factor authentication may have slowed the hackers, but it didn't stop them. After repeated attempts to break into various staffers' hillaryclinton.com accounts, the hackers turned to the personal Gmail addresses. It was there on March 19 that they targeted top Clinton lieutenants — including campaign manager Robby Mook, senior adviser Jake Sullivan and political fixer Philippe Reines.
A malicious link was generated for Podesta at 11:28 a.m. Moscow time, the AP found. Documents subsequently published by WikiLeaks show that the rogue email arrived in his inbox six minutes later. The link was clicked twice.
Podesta's messages — at least 50,000 of them — were in the hackers' hands.
___
A serious breach
Associated Press/Andrew Harnik
Though the heart of the campaign was now compromised, the hacking efforts continued. Three new volleys of malicious messages were generated on the 22nd, 23rd and 25th of March, targeting communications director Jennifer Palmieri and Clinton confidante Huma Abedin, among others.
The torrent of phishing emails caught the attention of the FBI, which had spent the previous six months urging the Democratic National Committee in Washington to raise its shield against suspected Russian hacking. In late March, FBI agents paid a visit to Clinton's Brooklyn headquarters, where they were received warily, given the agency's investigation into the candidate's use of a private email server while secretary of state.
The phishing messages also caught the attention of Secureworks, a subsidiary of Dell Technologies, which had been following Fancy Bear, whom Secureworks codenamed Iron Twilight.
Fancy Bear had made a critical mistake.
It fumbled a setting in the Bitly link-shortening service that it was using to sneak its emails past Google's spam filter. The blunder exposed whom they were targeting.
It was late March when Secureworks discovered the hackers were going after Democrats.
"As soon as we started seeing some of those hillaryclinton.com email addresses coming through, the DNC email addresses, we realized it's going to be an interesting twist to this," said Rafe Pilling, a senior security researcher with Secureworks.
By early April Fancy Bear was getting increasingly aggressive, the AP found. More than 60 bogus emails were prepared for Clinton campaign and DNC staffers on April 6 alone, and the hackers began hunting for Democrats beyond New York and Washington, targeting the digital communications director for Pennsylvania Gov. Tom Wolf and a deputy director in the office of Chicago Mayor Rahm Emanuel.
Reuters/Gary CameronThe group's hackers seemed particularly interested in Democratic officials working on voter registration issues: Pratt Wiley, the DNC's then-director of voter protection, had been targeted as far back as October 2015 and the hackers tried to pry open his inbox as many as 15 times over six months.
Employees at several organizations connected to the Democrats were targeted, including the Clinton Foundation, the Center for American Progress, technology provider NGP VAN, campaign strategy firm 270 Strategies, and partisan news outlet Shareblue Media.
As the hacking intensified, other elements swung into place. On April 12, 2016, someone paid $37 worth of bitcoin to the Romanian web hosting company THCServers.com, to reserve a website called Electionleaks.com, according to transaction records obtained by AP. A botched registration meant the site never got off the ground, but the records show THC received a nearly identical payment a week later to create DCLeaks.com.
By the second half of April, the DNC's senior leadership was beginning to realize something was amiss. One DNC consultant, Alexandra Chalupa, received an April 20 warning from Yahoo saying her account was under threat from state-sponsored hackers, according to a screengrab she circulated among colleagues.
The Trump campaign had gotten a whiff of Clinton email hacking, too. According to recently unsealed court documents, former Trump foreign policy adviser George Papadopoulos said that it was at an April 26 meeting at a London hotel that he was told by a professor closely connected to the Russian government that the Kremlin had obtained compromising information about Clinton.
"They have dirt on her," Papadopoulos said he was told. "They have thousands of emails."
A few days later, Amy Dacey, then the DNC chief executive, got an urgent call.
There'd been a serious breach at the DNC.
___
'Don't even talk to your dog about it'
Carl Court/Getty ImagesIt was 4 p.m. on Friday June 10 when some 100 staffers filed into the Democratic National Committee's main conference room for a mandatory, all-hands meeting.
"What I am about to tell you cannot leave this room," DNC chief operating officer Lindsey Reynolds told the assembled crowd, according to two people there at the time.
Everyone needed to turn in their laptops immediately; there would be no last-minute emails; no downloading documents and no exceptions. Reynolds insisted on total secrecy.
"Don't even talk to your dog about it," she was quoted as saying.
Reynolds didn't return messages seeking comment.
Two days later, as the cybersecurity firm that was brought in to clean out the DNC's computers finished its work, WikiLeaks founder Julian Assange told a British Sunday television show that emails related to Clinton were "pending publication."
"WikiLeaks has a very good year ahead," he said.
On Tuesday, June 14, the Democrats went public with the allegation that their computers had been compromised by Russian state-backed hackers, including Fancy Bear.
Shortly after noon the next day, William Bastone, the editor-in-chief of investigative news site The Smoking Gun, got an email bearing a small cache of documents marked "CONFIDENTIAL."
"Hi," the message said. "This is Guccifer 2.0 and this is me who hacked Democratic National Committee."
___
'Can it influence the election?'
Scott Eisen/Getty ImagesGuccifer 2.0 acted as a kind of master of ceremonies during a summer of leaks, proclaiming that the DNC's stolen documents were in WikiLeaks' hands, publishing a selection of the material himself and constantly chatting up journalists over Twitter in a bid to keep the story in the press.
He appeared particularly excited to hear on June 24 that his leaks had sparked a lawsuit against the DNC by disgruntled supporters of Clinton rival Bernie Sanders.
"Can it influence the election in any how?" he asked a journalist with Russia's Sputnik News, in uneven English.
Later that month Guccifer 2.0 began directing reporters to the newly launched DCLeaks site, which was also dribbling out stolen material on Democrats. When WikiLeaks joined the fray on July 22 with its own disclosures the leaks metastasized into a crisis, triggering intraparty feuding that forced the resignation of the DNC's chairwoman and drew angry protests at the Democratic National Convention.
Guccifer 2.0, WikiLeaks and DCLeaks ultimately published more than 150,000 emails stolen from more than a dozen Democrats, according to an AP count.
The AP has since found that each of one of those Democrats had previously been targeted by Fancy Bear, either at their personal Gmail addresses or via the DNC, something a finding established by running targets' emails against the Secureworks' list.
All three leak-branded sites have distanced themselves from Moscow. DCLeaks claimed to be run by American hacktivists. WikiLeaks said Russia wasn't its source. Guccifer 2.0 claimed to be Romanian.
But there were signs of dishonesty from the start. The first document Guccifer 2.0 published on June 15 came not from the DNC as advertised but from Podesta's inbox, according to a former DNC official who spoke on condition of anonymity because he was not authorized to speak to the press.
The official said the word "CONFIDENTIAL" was not in the original document.
Guccifer 2.0 had airbrushed it to catch reporters' attention.
___
'Please God, don't let it be me'
REUTERS/Kamil Krzaczynski
To hear the defeated candidate tell it, there's no doubt the leaks helped swing the election.
"Even if Russian interference made only a marginal difference," Clinton told an audience at a recent speech at Stanford University, "this election was won at the margins, in the Electoral College."
It's clear Clinton's campaign was profoundly destabilized by the sudden exposures that regularly radiated from every hacked inbox. It wasn't just her arch-sounding speeches to Wall Street executives or the exposure of political machinations but also the brutal stripping of so many staffers' privacy.
"It felt like your friend had just been robbed, but it wasn't just one friend, it was all your friends at the same time by the same criminal," said Jesse Ferguson, a former Clinton spokesman.
An atmosphere of dread settled over the Democrats as the disclosures continued.
One staffer described walking through the DNC's office in Washington to find employees scrolling through articles about Putin and Russia. Another said she began looking over her shoulder when returning from Clinton headquarters in Brooklyn after sundown. Some feared they were being watched; a car break-in, a strange woman found lurking in a backyard late at night and even a snake spotted on the grounds of the DNC all fed an undercurrent of fear.
Even those who hadn't worked at Democratic organizations for years were anxious. Brent Kimmel, a former technologist at the DNC, remembers watching the leaks stream out and thinking: "Please God, don't let it be me."
___
'Make America Great Again'
AP/Andrew HarnikOn Oct. 7, it was Podesta.
The day began badly, with Hillary Clinton's phone buzzing with crank messages after its number was exposed in a leak from the day before. The number had to be changed immediately; a former campaign official said that Abedin, Clinton's confidante, had to call staffers one at a time with Clinton's new contact information because no one dared put it in an email.
The same afternoon, just as the American electorate was digesting a lewd audio tape of Trump boasting about sexually assaulting women, WikiLeaks began publishing the emails stolen from Podesta.
The publications sparked a media stampede as they were doled out one batch at a time, with many news organizations tasking reporters with scrolling through the thousands of emails being released in tranches. At the AP alone, as many as 30 journalists were assigned, at various times, to go through the material.
Guccifer 2.0 told one reporter he was thrilled that WikiLeaks had finally followed through.
"Together with Assange we'll make america great again," he wrote.
___
Donn reported from Plymouth, Massachusetts. Desmond Butler, Ted Bridis, Julie Pace and Ken Thomas in Washington, Justin Myers in Chicago, Frank Bajak in Houston, Lori Hinnant in Paris, Maggie Michael in Cairo, Erika Kinetz in Shanghai and Vadim Ghirda in Bucharest, Romania contributed to this report.
___
Editor's Note: Satter's father, David Satter, is an author and Russia specialist who has been critical of the Russian government. Several of his emails were published last year by hackers and his address is on Secureworks' list.
Nineteen thousand lines of raw data associated with the theft of Hillary Clinton campaign emails shows how the hackers dodged strict security measures to pull it off.
Minute-by-minute logs gathered by cybersecurity company Secureworks and recently shared with The Associated Press tell the tale. It took the hackers just over a week of work to zero in on and penetrate the personal Gmail account of campaign chairman John Podesta.
One outside expert who reviewed the data said it showed how even the well-defended Clinton campaign fell prey to phishing, a basic cyberespionage technique which uses bogus emails to harvest passwords
NOW WATCH: Here's what losing weight does to your body and brain
from Feedburner http://ift.tt/2zb9guL
0 notes
Text
How Russians hacked the Democrats’ emails
http://ryanguillory.com/how-russians-hacked-the-democrats-emails/
How Russians hacked the Democrats’ emails
Work emails were protected by two-factor authentication, a technique that uses a second passcode to keep accounts secure. Most messages were deleted after 30 days and staff went through phishing drills. Security awareness even followed the campaigners into the bathroom, where someone put a picture of a toothbrush under the words: “You shouldn’t share your passwords either.”
Two-factor authentication may have slowed the hackers, but it didn’t stop them. After repeated attempts to break into various staffers’ hillaryclinton.com accounts, the hackers turned to the personal Gmail addresses. It was there on March 19 that they targeted top Clinton lieutenants — including campaign manager Robby Mook, senior adviser Jake Sullivan and political fixer Philippe Reines.
A malicious link was generated for Podesta at 11:28 a.m. Moscow time, the AP found. Documents subsequently published by WikiLeaks show that the rogue email arrived in his inbox six minutes later. The link was clicked twice.
Podesta’s messages — at least 50,000 of them — were in the hackers’ hands.
A serious breach
Though the heart of the campaign was now compromised, the hacking efforts continued. Three new volleys of malicious messages were generated on the 22nd, 23rd and 25th of March, targeting communications director Jennifer Palmieri and Clinton confidante Huma Abedin, among others.
The torrent of phishing emails caught the attention of the FBI, which had spent the previous six months urging the Democratic National Committee in Washington to raise its shield against suspected Russian hacking. In late March, FBI agents paid a visit to Clinton’s Brooklyn headquarters, where they were received warily, given the agency’s investigation into the candidate’s use of a private email server while secretary of state.
The phishing messages also caught the attention of Secureworks, a subsidiary of Dell Technologies, which had been following Fancy Bear, whom Secureworks codenamed Iron Twilight.
Fancy Bear had made a critical mistake.
It fumbled a setting in the Bitly link-shortening service that it was using to sneak its emails past Google’s spam filter. The blunder exposed whom they were targeting.
It was late March when Secureworks discovered the hackers were going after Democrats.
“As soon as we started seeing some of those hillaryclinton.com email addresses coming through, the DNC email addresses, we realized it’s going to be an interesting twist to this,” said Rafe Pilling, a senior security researcher with Secureworks.
By early April Fancy Bear was getting increasingly aggressive, the AP found. More than 60 bogus emails were prepared for Clinton campaign and DNC staffers on April 6 alone, and the hackers began hunting for Democrats beyond New York and Washington, targeting the digital communications director for Pennsylvania Gov. Tom Wolf and a deputy director in the office of Chicago Mayor Rahm Emanuel.
The group’s hackers seemed particularly interested in Democratic officials working on voter registration issues: Pratt Wiley, the DNC’s then-director of voter protection, had been targeted as far back as October 2015 and the hackers tried to pry open his inbox as many as 15 times over six months.
Employees at several organizations connected to the Democrats were targeted, including the Clinton Foundation, the Center for American Progress, technology provider NGP VAN, campaign strategy firm 270 Strategies, and partisan news outlet Shareblue Media.
As the hacking intensified, other elements swung into place. On April 12, 2016, someone paid $37 worth of bitcoin to the Romanian web hosting company THCServers.com , to reserve a website called Electionleaks.com, according to transaction records obtained by AP. A botched registration meant the site never got off the ground, but the records show THC received a nearly identical payment a week later to create DCLeaks.com.
By the second half of April, the DNC’s senior leadership was beginning to realize something was amiss. One DNC consultant, Alexandra Chalupa, received an April 20 warning from Yahoo saying her account was under threat from state-sponsored hackers, according to a screengrab she circulated among colleagues.
The Trump campaign had gotten a whiff of Clinton email hacking, too. According to recently unsealed court documents, former Trump foreign policy adviser George Papadopoulos said that it was at an April 26 meeting at a London hotel that he was told by a professor closely connected to the Russian government that the Kremlin had obtained compromising information about Clinton.
“They have dirt on her,” Papadopoulos said he was told. “They have thousands of emails.”
A few days later, Amy Dacey, then the DNC chief executive, got an urgent call.
There’d been a serious breach at the DNC.
‘Don’t even talk to your dog about it’
It was 4 p.m. on Friday June 10 when some 100 staffers filed into the Democratic National Committee’s main conference room for a mandatory, all-hands meeting.
“What I am about to tell you cannot leave this room,” DNC chief operating officer Lindsey Reynolds told the assembled crowd, according to two people there at the time.
Everyone needed to turn in their laptops immediately; there would be no last-minute emails; no downloading documents and no exceptions. Reynolds insisted on total secrecy.
“Don’t even talk to your dog about it,” she was quoted as saying.
Reynolds didn’t return messages seeking comment.
Two days later, as the cybersecurity firm that was brought in to clean out the DNC’s computers finished its work, WikiLeaks founder Julian Assange told a British Sunday television show that emails related to Clinton were “pending publication.”
Source link
0 notes
Text
How Russians hacked the Democrats’ emails
http://ryanguillory.com/how-russians-hacked-the-democrats-emails/
How Russians hacked the Democrats’ emails
Work emails were protected by two-factor authentication, a technique that uses a second passcode to keep accounts secure. Most messages were deleted after 30 days and staff went through phishing drills. Security awareness even followed the campaigners into the bathroom, where someone put a picture of a toothbrush under the words: “You shouldn’t share your passwords either.”
Two-factor authentication may have slowed the hackers, but it didn’t stop them. After repeated attempts to break into various staffers’ hillaryclinton.com accounts, the hackers turned to the personal Gmail addresses. It was there on March 19 that they targeted top Clinton lieutenants — including campaign manager Robby Mook, senior adviser Jake Sullivan and political fixer Philippe Reines.
A malicious link was generated for Podesta at 11:28 a.m. Moscow time, the AP found. Documents subsequently published by WikiLeaks show that the rogue email arrived in his inbox six minutes later. The link was clicked twice.
Podesta’s messages — at least 50,000 of them — were in the hackers’ hands.
A serious breach
Though the heart of the campaign was now compromised, the hacking efforts continued. Three new volleys of malicious messages were generated on the 22nd, 23rd and 25th of March, targeting communications director Jennifer Palmieri and Clinton confidante Huma Abedin, among others.
The torrent of phishing emails caught the attention of the FBI, which had spent the previous six months urging the Democratic National Committee in Washington to raise its shield against suspected Russian hacking. In late March, FBI agents paid a visit to Clinton’s Brooklyn headquarters, where they were received warily, given the agency’s investigation into the candidate’s use of a private email server while secretary of state.
The phishing messages also caught the attention of Secureworks, a subsidiary of Dell Technologies, which had been following Fancy Bear, whom Secureworks codenamed Iron Twilight.
Fancy Bear had made a critical mistake.
It fumbled a setting in the Bitly link-shortening service that it was using to sneak its emails past Google’s spam filter. The blunder exposed whom they were targeting.
It was late March when Secureworks discovered the hackers were going after Democrats.
“As soon as we started seeing some of those hillaryclinton.com email addresses coming through, the DNC email addresses, we realized it’s going to be an interesting twist to this,” said Rafe Pilling, a senior security researcher with Secureworks.
By early April Fancy Bear was getting increasingly aggressive, the AP found. More than 60 bogus emails were prepared for Clinton campaign and DNC staffers on April 6 alone, and the hackers began hunting for Democrats beyond New York and Washington, targeting the digital communications director for Pennsylvania Gov. Tom Wolf and a deputy director in the office of Chicago Mayor Rahm Emanuel.
The group’s hackers seemed particularly interested in Democratic officials working on voter registration issues: Pratt Wiley, the DNC’s then-director of voter protection, had been targeted as far back as October 2015 and the hackers tried to pry open his inbox as many as 15 times over six months.
Employees at several organizations connected to the Democrats were targeted, including the Clinton Foundation, the Center for American Progress, technology provider NGP VAN, campaign strategy firm 270 Strategies, and partisan news outlet Shareblue Media.
As the hacking intensified, other elements swung into place. On April 12, 2016, someone paid $37 worth of bitcoin to the Romanian web hosting company THCServers.com , to reserve a website called Electionleaks.com, according to transaction records obtained by AP. A botched registration meant the site never got off the ground, but the records show THC received a nearly identical payment a week later to create DCLeaks.com.
By the second half of April, the DNC’s senior leadership was beginning to realize something was amiss. One DNC consultant, Alexandra Chalupa, received an April 20 warning from Yahoo saying her account was under threat from state-sponsored hackers, according to a screengrab she circulated among colleagues.
The Trump campaign had gotten a whiff of Clinton email hacking, too. According to recently unsealed court documents, former Trump foreign policy adviser George Papadopoulos said that it was at an April 26 meeting at a London hotel that he was told by a professor closely connected to the Russian government that the Kremlin had obtained compromising information about Clinton.
“They have dirt on her,” Papadopoulos said he was told. “They have thousands of emails.”
A few days later, Amy Dacey, then the DNC chief executive, got an urgent call.
There’d been a serious breach at the DNC.
‘Don’t even talk to your dog about it’
It was 4 p.m. on Friday June 10 when some 100 staffers filed into the Democratic National Committee’s main conference room for a mandatory, all-hands meeting.
“What I am about to tell you cannot leave this room,” DNC chief operating officer Lindsey Reynolds told the assembled crowd, according to two people there at the time.
Everyone needed to turn in their laptops immediately; there would be no last-minute emails; no downloading documents and no exceptions. Reynolds insisted on total secrecy.
“Don’t even talk to your dog about it,” she was quoted as saying.
Reynolds didn’t return messages seeking comment.
Two days later, as the cybersecurity firm that was brought in to clean out the DNC’s computers finished its work, WikiLeaks founder Julian Assange told a British Sunday television show that emails related to Clinton were “pending publication.”
Source link
0 notes