Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The "Russian Hacking" Story Changes Again
ZeroHedge.com ^ | 5 January 2017 | Tyler Durden

Posted on 01/05/2017 8:24:43 AM PST by Rockitz

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-103 next last
To: angryoldfatman

Gave a password to a business associate of mine once. He looked at it and said, what the heck is that ? I replied random numbers and letters. Apparently he wanted a word he could remember.


81 posted on 01/05/2017 10:19:59 AM PST by justa-hairyape (The user name is sarcastic. Although at times it may not appear that way.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: detective

This has been known and public for 6 months...

International Data Group – CSO Info

Salted Hash- Top security news
By Steve Ragan | Senior Staff Writer
|Follow
About |
Fundamental security insight to help you minimize risk and protect your organization
News
DNC hacker slams CrowdStrike, publishes opposition memo on Donald Trump
235 page opposition memo is among the recently released cache of files
CSO | Jun 15, 2016 2:07 PM PT

The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday.
A hacker claiming responsibility for the DNC hack that made headlines earlier this week has slammed the security company responsible for the incident response, and leaked several documents compromised during the incident – including a 235-page opposition memo on Donald Trump.
On Tuesday, the Washington Post reported that hackers – believed to be Russian – compromised the Democratic National Committee network and walked off with opposition research on Republican presidential candidate Donald Trump.
CrowdStrike, the security firm that was brought in to do incident response, suggested espionage as the likely motive. In fact, later that day, CrowdStrike published reports on two different “APT” groups in Russia, giving them the names Cozy Bear and Fancy Bear.
Overall, the Washington Post story actually read more like a promotion for CrowdStrike’s incident response offerings than actual security news.
But the fact is, someone targeted the DNC directly and that is news worth watching. At the same time, many experts felt it was a stretch to hype the incident as some sort of massive international conspiracy.
The hacker claiming responsibility for the DNC attack (using the alias Guccifer 2.0) mocked CrowdStrike’s assessment that he was a sophisticated hacker group, noting that he was pleased the company “appreciated my skills so highly. But in fact, it was easy, very easy.”
“Guccifer may have been the first one who penetrated Hillary Clinton’s and other Democrats’ mail servers. But he certainly wasn’t the last. No wonder any other hacker could easily get access to the DNC’s servers. Shame on CrowdStrike: Do you think I’ve been in the DNC’s networks for almost a year and saved only 2 documents? Do you really believe it?”
As proof, he published the full opposition report on Donald Trump, which describes the GOP presidential candidate having “no core.”
The 235-page memo is essentially a timeline and collection of comments and speeches given by Trump, as well as an overview of his political stance and mindset.
A 2-page memo to the DNC was included in the cache of posted files, which outlines the suggested positioning and public message strategy around the national election and the match-up between Donald Trump and Hillary Clinton.
In response to DNC comments that no financial information was accessed during the attack, several donor lists were also published on Wednesday by the hacker, showing millions in financial contributions from Hollywood elites, businesses, trade groups, and unions.
The hacker ended their disclosure with a notice that a bulk of the compromised documents, including memos marked confidential and secret – allegedly taken from Hillary Clinton’s personal email server – were delivered to WikiLeaks.
“The main part of the papers, thousands of files and mails, I gave to WikiLeaks. They will publish them soon. I guess CrowdStrike customers should think twice about company’s competence,” they wrote.
Salted Hash reached out to CrowdStrike for comment, but the company wasn’t able to respond before this article was published. It will be updated with additional details as they become available.
Update:
CrowdStrike didn’t respond to questions directly, but issued the statement below.
“CrowdStrike stands fully by its analysis and findings identifying two separate Russian intelligence-affiliated adversaries present in the DNC network in May 2016. On June 15, 2016 a blog post to a WordPress site authored by an individual using the moniker Guccifer 2.0 claiming credit for breaching the Democratic National Committee. This blog post presents documents alleged to have originated from the DNC.

“Whether or not this posting is part of a Russian Intelligence disinformation campaign, we are exploring the documents’ authenticity and origin. Regardless, these claims do nothing to lessen our findings relating to the Russian government’s involvement, portions of which we have documented for the public and the greater security community.”

Please note that none of this amount to anything COMPARED to Hillary and her minions passing TS/SAP into across unprotected, public, networks with full knowledge of the White House...


82 posted on 01/05/2017 10:22:38 AM PST by RedEyeJack (What was the basis for the restriction?)
[ Post Reply | Private Reply | To 33 | View Replies]

To: Mr. Douglas
I think they tag team Graham and McCain when they need a voice of the “disgruntled” republicans.

Maybe PayPerView can schedule a Tag Team match between McCain/Graham and Sharpton/Jackson?

83 posted on 01/05/2017 10:24:54 AM PST by BwanaNdege ("The church ... is not the master or the servant of the state, but the conscience" - Luther)
[ Post Reply | Private Reply | To 24 | View Replies]

To: justa-hairyape

He lies!!! :)

I’m dump my data later. Or at least I’ll dump something later :)


84 posted on 01/05/2017 10:25:50 AM PST by dp0622 (The only thing an upper crust conservative hates more than a liberal is a middle class conservative)
[ Post Reply | Private Reply | To 79 | View Replies]

To: isthisnickcool
The hearing I’m watching is a joke.

Not if your goal is to get a few phrases that you can weave into sentences that make the Dems look good and Trump look bad. That is exactly what I heard on network radio news at 1 p.m.

Having the dishonest media on your side helps a lot. I heard on Chris Plante (DC talk show host) this morning that today's WaPo did not have anything about the Chicago kidnap/torture event even though it was reported last night by 7 p.m.

85 posted on 01/05/2017 10:27:51 AM PST by Freee-dame (Drain the swamp!)
[ Post Reply | Private Reply | To 22 | View Replies]

To: dp0622

At least we know Julian is still a live breathing human. Maybe you are just some AI bot program. Lol. Don’t laugh too hard. We have had a few here, I suspect. Easy to throw a monkey wrench into their programming.


86 posted on 01/05/2017 10:30:53 AM PST by justa-hairyape (The user name is sarcastic. Although at times it may not appear that way.)
[ Post Reply | Private Reply | To 84 | View Replies]

To: justa-hairyape

Calling me an AI bot program is an insult to AI bot programs :)


87 posted on 01/05/2017 10:32:58 AM PST by dp0622 (The only thing an upper crust conservative hates more than a liberal is a middle class conservative)
[ Post Reply | Private Reply | To 86 | View Replies]

To: dp0622

Just trying to figure out what the intentions of your AI programming would be, is near impossible. You seem to be an honest Freeper. Warts and all.


88 posted on 01/05/2017 10:38:28 AM PST by justa-hairyape (The user name is sarcastic. Although at times it may not appear that way.)
[ Post Reply | Private Reply | To 87 | View Replies]

To: justa-hairyape

I’m an honest FReeper. Can’t say that 100 percent in life but I try!

Joined two years ago when I still thought FOX was conservative, gays would be content with civil unions, maybe there should be a minimum wage, and some other idiotic ideas.

Thanks to FR, they’re gone.

Also learned there was a Russia/China war, Vietnam isn’t a new country, lol, an asteroid could be minutes away from destroying earth and still not be detected, and hundred of other facts. Didn’t know there were other presidents from NY.

The list doesn’t end on FR. It’s like how school should be.


89 posted on 01/05/2017 10:43:53 AM PST by dp0622 (The only thing an upper crust conservative hates more than a liberal is a middle class conservative)
[ Post Reply | Private Reply | To 88 | View Replies]

To: polymuser

Podesta's pin for his bank account phone access is probably "5646" ("JOHN").



90 posted on 01/05/2017 11:07:10 AM PST by Heart-Rest ("Well done is better than well said." - Benjamin Franklin)
[ Post Reply | Private Reply | To 80 | View Replies]

To: marron

The only issue, of course, being the fact that the Russians didn’t “hack” Podesta’s password. In fact, no one did. Someone (Sean Rich?) with direct access to the DNC email server just downloaded the emails and provided them to Wikileaks. If you have administrator privileges, you don’t need his password...


91 posted on 01/05/2017 11:15:42 AM PST by ManHunter (You can run, but you'll only die tired... Army snipers: Reach out and touch someone)
[ Post Reply | Private Reply | To 9 | View Replies]

To: justa-hairyape

That can be accomplished by using a version of a pet name (or “pet” name) with some letters substituted with special characters (”i” with “!”, “o” with “0”, “a” with “@”, “e” with “3”, etc.).

The great thing about my wife is that she comes up with completely random but memorable names for our children. Like “Melvin”, when neither of my sons is named Melvin (don’t worry, I’ve never used “Melvin” nor any version of it for a password, it’s a completely made-up example).


92 posted on 01/05/2017 11:18:59 AM PST by angryoldfatman
[ Post Reply | Private Reply | To 81 | View Replies]

To: USCG SimTech

Everything so far is “in my opinion”. No presentation of any facts in the form of physical evidence, which there should be plenty of in the form of logs and screen captures.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Ok ladies and gentlemen, here’s the evidence we promised, right h... oops... that doesn’t say what we want it to say! STOP IT! PULL IT DOWN! SHUT IT DOWN!!

https://wikileaks.org/podesta-emails/emailid/22335


93 posted on 01/05/2017 11:33:16 AM PST by angryoldfatman
[ Post Reply | Private Reply | To 65 | View Replies]

To: RedEyeJack

The so called report was prepared by the Clinton campaign and the DNC. They are the ones who originally released the “Russian hack” lies and disinformation.

The so called “report” contains no additional information. The FBI did not even investigate the hacked servers.

The story keeps changing as lies always do.


94 posted on 01/05/2017 11:49:12 AM PST by detective
[ Post Reply | Private Reply | To 82 | View Replies]

To: angryoldfatman

I just look around and let my eyes come to rest on some object and use that as the basis.


95 posted on 01/05/2017 11:59:23 AM PST by ichabod1 (Make America Normal Again)
[ Post Reply | Private Reply | To 92 | View Replies]

To: Rockitz

96 posted on 01/05/2017 12:04:27 PM PST by fella ("As it was before Noah so shall it be again,")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rockitz

Shep Smith is on it now. What a weasel - I had to change the channel. He is beyond worthless. He needs to join Me-again Kelly on NBC.


97 posted on 01/05/2017 12:06:16 PM PST by meyer (The Constitution says what it says, and it doesn't say what it doesn't say.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dp0622
Of course when they find out I have ZERO knowledge of how to “hack”, they might just send me to psych ward.

Apparently, they have ZERO knowledge on how to hack too. That is why they outsourced the inspection of Podesta's computer.

98 posted on 01/05/2017 12:12:47 PM PST by meyer (The Constitution says what it says, and it doesn't say what it doesn't say.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: ichabod1

As long as you use some of that substitution scheme, you’ll probably be OK.

Otherwise, if you just use the object name, you’re subject to a “dictionary attack”. Most hacking software uses some version of that as starting point once the favorites don’t get in, like “password”, the user’s ID, 12345, or iloveyou.

http://searchsecurity.techtarget.com/definition/dictionary-attack


99 posted on 01/05/2017 12:23:20 PM PST by angryoldfatman
[ Post Reply | Private Reply | To 95 | View Replies]

To: Rockitz

They met to get their stories lined up to match information known to the public. Beyond that, nothing factual. Just unsupported claims.


100 posted on 01/05/2017 12:26:07 PM PST by RegulatorCountry
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-103 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson