Weeks before the Democratic convention was upended by 20,000 leaked e-mails released through WikiLeaks, another little-known website began posting the secrets of a top NATO general, billionaire George Soros philanthropy and a Chicago-based Clinton campaign volunteer.
Security experts now say that site, DCLeaks.com, with its spiffy capitol-dome logo, shows the marks of the same Russian intelligence attire that targeted the Democratic political organizations.
The e-mails and documents posted to the DCLeaks site in early June suggest that the hackers may have a broader agenda than influencing the U.S. general elections, one that ranges from the Obama administrations policy toward Russia to disclosures about the hidden levers of political power in Washington.
It also entails the hackers may have much left in their grab bag to distribute at will. The is a matter of the DCLeaks site include a former ranking intelligence official who now works for a major defense contractor and a retired Army officer whose wife serves on the USS Nimitz, the nuclear-powered aircraft carrier. Some of the e-mails go back years.
Open Society Foundations, the Soros group, reported the breach to the Federal Bureau of Investigation in June, said spokeswoman Laura Silber, who added that an investigation by a security firm detected the intrusion was limited to an intranet system used by board members, staff and foundation partners.
The biggest revelation on DCLeaks involves U.S. Gen. Philip Breedlove, who retired in May and was formerly the top military commander of the North Atlantic Treaty Organization. E-mails from Breedloves personal account show him complaining that the Obama administration wasnt paying enough attention to European security.( I do not see this WH truly engaged, he writes at one point, subsequently wondering how to run this personally with the POTUS .) The Intercept subsequently wrote a story about the e-mails, picked up by some cable news channels, inflaming tensions between the U.S. and its European allies.
Breedlove told CNN in July that the e-mails were stolen as part of a state-sponsored intelligence operation and didnt respond to a request for remark this week.
The leaks highlight the effectiveness of some of the hackers tricks, including the targeting of private e-mail accounts to gather sensitive military and political intelligence. DCLeaks also offers some insight for researchers on what appears to be the hackers early blunders and ad hoc approach.
A cache of hacked Google e-mails from a Clinton volunteer, for example, doesnt add up to much: They purport to be from the account of Sarah Hamilton, who works for a public relations firm in Chicago and volunteers for Hillary for America, and prove little but the harried schedule of the campaign faculty. Hamilton didnt respond to a request for comment.
Similarly, a trove of redacted documents issued for the William J. Clinton Library were declassified and ought to have publicly available on the librarys website for several years, a spokeswoman for the library said.
It actually looks like the hackers tried a couple of things that merely werent truly running before they hit on using WikiLeaks, said John Hultquist, the manager of cyberespionage intelligence at FireEye Inc. With this earlier stuff, it looks like they were experimenting.
Describing itself as the work of American hacktivists, DCLeaks.com was registered in April, and many of the documents were posted in early June. A DCLeaks administrator, who identified himself by e-mail as Steve Wanders, didnt respond to written questions, including why much of the material focuses on Russia or Russian foreign-policy interests.
The site seems designed to cater to the U.S. medias voracious cravings for leaks. It has related Twitter and Facebook accounts that push out nuggets from purloined documents and that suggest slants journalists might pursue.
The Russian government has rejected the idea that it was involved in the hack of the Democratic National Committee, and WikiLeaks founder Julian Assange said theres no proof whatsoever that Moscow was involved.
Security experts insure links to a larger Russian information operation. Thats in part, according to two people familiar with the probe, because the e-mail address of Breedlove and Hamilton are amongst thousands targeted in a several-month campaign that has been initiated last fall by a Russian hacking group that cybersecurity firms have referred to by monikers including Fancy Bear, APT2 8 and the Sofacy Group.
Cyberintelligence firms have linked that hacking group to the GRU, Russias military intelligence service, whose Moscow headquarters is nicknamed the Aquarium. Three private security groups have connected the DNC incursion to that group and another Russian hacking group associated with the FSB, the countrys civilian intelligence agency. U.S. intelligence agencies have told officials they believe the DNC hack was orchestrated by the Russian government.
A hacker calling himself Guccifer 2.0 and purporting to be Romanian initially took credit for the DNC hack. That claim was viewed skeptically, in part because the hacker didnt appear to speak Romanian. Guccifer 2.0 provided the Smoking gun with leaked e-mails from Sarah Hamiltons account, according to a story posted on that site on June 28. FireEye believes Guccifer 2.0 is a covering identity for APT2 8, Hultquist said.
In the case of Soross Open Society, hackers stole a trove of documents after accessing the foundations internal intranet, a system called Karl, according to a person familiar with its internal investigation. On August 3, the DCLeaks.com Twitter account tweeted Check George Soross OSF plans to counter Russian policy and traditional values, attaching a screenshot of a $500,000 budget request for an Open Society program designed to counter Russian influence among European democracies.
The hackers may have had access the foundations network for nearly a year, according to another person familiar with the results of the investigation. Although Open Society has about 800 full-time faculty, as many as 7,000 people have access to Karl, which enables us to circulate draft program proposals, budgets and other internal documents.
DCLeaks.com provides a possible outline of the successful tactics used by the suspected Russian hackers, like targeting personal e-mail accounts to scoop up sensitive information.
The hackers were apparently reading Breedloves personal e-mails that went back to at least 2012, a period when he was among the highest-ranking U.S. military officers and was commander of the U.S. European Command and NATO Allied Command Operations.
Among Breedloves correspondents, according to DCLeaks.com, were former Secretary of the Air Force James Roche, former presidential candidate Wesley Clark and former Secretary of State Colin Powell. Endeavours to contact Clark and Powell werent immediately successful.
Roche, in an e-mail, said Breedlove is a thoughtful officer who has worked hard for the betterment of the Air force and “the two countries “. Of the Russians, Roche added: I hope they learned that there are many dedicated officers who are thinking of the best ways to ensure that our countrys leaders cant be bullied by Mr. Putin and his associates.
Read more: www.bloomberg.com