June 20, 2016: Two more cybersecurity companies support CrowdStrike’s conclusion that the Russian government was behind the recent hack of the DNC computer network.

Michael Buratowski (Credit: FidelisCybersecurity)

Michael Buratowski (Credit: FidelisCybersecurity)

The companies are Fidelis Cybersecurity and Mandiant. They base their analysis on five malware samples used in the hacking attack. Fidelis executive Michael Buratowski says, “Based on our comparative analysis, we agree with CrowdStrike and believe that the Cozy Bear and Fancy Bear…groups were involved in successful intrusions at the DNC [Democratic National Committee] . […] The malware samples matched the description, form and function that was described in the CrowdStrike blog post. In addition, they were similar and at times identical to malware that other [research firms] have associated to these actor sets.”

However, the Washington Post reports, “It is also possible, researchers said, that someone else besides the Russians were inside the DNC’s network and had access to the same documents.” (The Washington Post, 6/20/2016) 

A law firm reviewing the DNC attack, Baker & McKenzie, has begun working with three cybersecurity companies to review CrowdStrike’s findings. Fidelis Cybersecurity is one of them, along with FireEye and Palo Alto Networks, Inc. (Bloomberg News, 6/21/2016) (Fidelis Cybersecurity, 6/20/2016)

August 18, 2016: The Clinton Foundation’s computer network may have been recently hacked.

Reuters reports that the foundation has recently hired the cybersecurity company FireEye to investigte and combat hacking after seeing indications of possible hacking. This is according to two unnamed “sources familiar with the matter.”

No stolen emails or documents from the foundation have been made public so far. However, one of the sources plus two unnamed US security officials say that hackers appear to have used “spear phishing” techniques to gain access to the foundation’s network, in the same way they’ve hacked the Democratic National Committee (DNC) and other political targets. (Reuters, 8/18/2016)

August 18, 2016: The Clinton Foundation claims its computers have not been hacked.

160818FireEyePublic

Logo of FireEye (Credit: public domain)

Earlier in the day, Reuters reported from several sources that it is likely the Clinton Foundation’s computer network has been recently hacked. But the foundation says, “We have no evidence Clinton Foundation systems were breached and have not been notified by law enforcement of an issue.”

Reuters also reported the foundation recently hired the cybersecurity company FireEye to combat hacking. The foundation has not responded to this. (Politico, 8/18/2016)

October 12, 2016: The Clinton campaign suggests that some emails released by WikiLeaks could be forgeries, but experts have found no evidence of this.

Tim Kaine appears on CNN's "State of the Union" on October 9, 2016. (Credit: CNN)

Tim Kaine appears on CNN’s “State of the Union” on October 9, 2016. (Credit: CNN)

Since October 7, 2016, WikiLeaks has been publishing an average of about 2,000 emails from Clinton campaign chair John Podesta every day. Podesta and the Clinton campaign has admitted his account got hacked, but they have suggested that some of the emails could be forgeries. For instance, on October 9, 2016, Democratic vice presidential candidate Tim Kaine said in a CNN interview, “I don’t think we can dignify documents dumped by WikiLeaks and just assume they are all accurate and true. Anybody who hacks in to get documents is completely capable of manipulating them.”

However, Politico reports, “Clinton’s team hasn’t challenged the accuracy of even the most salacious emails… And numerous digital forensic firms told Politico that they haven’t seen any proof of tampering in the emails they’ve examined — adding that only the hacked Democrats themselves could offer that kind of conclusive evidence.”

Laura Galante (Credit: Bloomberg News)

Laura Galante (Credit: Bloomberg News)

Laura Galante, a director of the cybersecurity company FireEye, says, “It’s very hard to go verify what is true and what’s not. Even the victims of the accounts that are getting exposed are having a hard time.”

Politico also comments, “Experts have warned for months about the possibility that the document leaks may eventually include a sprinkling of falsehoods to stoke their impact, noting that Russian and Soviet intelligence services had long used such techniques against their enemies.” The US government alleges that the Russian government has been behind some recent hacking of US political entities.

A WikiLeaks spokesperson dismisses claims some of the emails are fake. “Standard nonsense pushed by those who have something to hide. WikiLeaks has won a great many awards for its journalistic work and has the best vetting record of any media organization. … In fact, it’s completely legitimate to everyone in the journalism industry that [the emails] are exactly as we say they are, which is why everyone is running with them.”

Thomas Rid (Credit: Kings College, London)

Thomas Rid (Credit: Kings College, London)

However, some experts point out that hackers could have tampered with emails before giving them to WikiLeaks, or they may choose to only selectively hand over emails that promote a certain political agenda.

Thomas Rid, a cybersecurity researcher and professor, says, “Of course it would be more effective for [the Russians] not to undermine the credibility of WikiLeaks in any way by altering documents. But if we look at their past behavior, that is certainly something that has been considered and actually done in the past.” (Politico, 10/12/2016)