Politics Russia 'hacked' 21 US states in election

Discussion in 'Blazers OT Forum' started by Further, Jun 22, 2017.

  1. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    Phishing

    This is a technique where the hacker puts a link or a virus/attachment to download in an email or on a WWW site.

    In theory, any spammer link posted here, and even what posters post thinking they're legit links could be one of these phishing links.

    If the phishing is done in an email, it's typically a file download, like a calendar invite, an excel spreadsheet or word document, etc. Once you open the attachment, your system is compromised. This is 99% (my guess) effective on Windows systems.

    A typical phishing email is like the one sent to Podesta. "Your google account needs your attention, click on this link to fix"

    The link takes you to the hacker's site that is made to look EXACTLY like a google site, the only tell is the URL (which Podesta obviously didn't pay attention to).

    The hacker's page says "enter your email address and password" and Podesta did just that. The hacker now has his login and password and logs in to read Podesta's email. It isn't just Podesta - as I said, my spam email folder has thousands of these phishing emails in them.

    It doesn't have to be a site that asks for login/password. The site may simply cause the download of a virus/spyware to the user's computer that exploits some bug/security hole in the user's software (the operating system itself, the browser, Java plugin, flash, etc.).

    I have seen friends of mine get hacked via phishing. The downloaded virus at least goes through the person's contact list and emails all his contacts a phishing email. The email looks like it's coming from my friend, but has a phishing link or attachment in it.

    In Podesta's case, his contact list happens to be a lot of creepy Democrat Party operatives, and some of them likely fell for the Phishing, too.

    Lastly, Podesta may have used the same login/password at gmail as he did for his online banking, the server credentials, and so on. Once the hacker got his email/password, potentially all of Podesta's online accounts were compromised.
     
  2. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    And sly posts bullshit.

    At least I call bullshit.

    Let's see proof.
     
  3. riverman

    riverman Writing Team

    Joined:
    Nov 15, 2013
    Messages:
    67,842
    Likes Received:
    66,598
    Trophy Points:
    113
    Putin hates Hillary almost as much as Denny....it makes sense in a Romanian teenaged sort of way
     
  4. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    Finally, there's the Apple hacking that obtained photos of celebrities, compromising photos that made the headlines.

    Apple didn't get hacked. The hackers brute force tried millions (if needed) or billions of login/password credentials on Apple's icloud site until they found what the celebrity chose as his/her password.

    Again, the celebrities may have used the same credentials on gmail, their banking sites, etc.

    All this is identity theft.
     
  5. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    FYI, from SPD's link:

    Determining whether that is true is part of the ongoing investigations. CBS News has confirmed that congressional investigators are looking into whether Trump campaign associates obtained information from hacked voter databases during the election.

    So far there is no evidence of that, but it is a sign that the congressional investigations are expanding.
     
  6. SlyPokerDog

    SlyPokerDog Woof! Staff Member Administrator

    Joined:
    Oct 5, 2008
    Messages:
    122,854
    Likes Received:
    122,845
    Trophy Points:
    115
    I posted a CBS article. Hardly bullshit.
     
  7. riverman

    riverman Writing Team

    Joined:
    Nov 15, 2013
    Messages:
    67,842
    Likes Received:
    66,598
    Trophy Points:
    113
    you made some really good points ...I'm sure hackers are like mosquitos around the net..the point of the subject is Putin's directive to keep Hillary away...looks to me like it worked and hackers can probably veil their sources pretty well but I don't know much about it...but even with Chinese and N Korean attacks...Russian attempts at election tampering is a serious issue....we should all see it as something more than bullshit
     
  8. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
  9. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    I will call bullshit until I see convincing proof.

    I don't believe Obama's outgoing people. Occam's Razor says they're willing to plant excuses for Clinton losing. Occam's Razor also suggests our spy agencies are willing to spy on us, congress, and our allies' leaders, and lie to us.

    Proof isn't some report, it's objective evidence. Nobody's provided it, just "it's secret how we know." That's not proof.

    I have no doubt Putin loves to punk the US at every opportunity. He punked Obama a few times (like how he got a base in Syria, etc.). He'll punk Trump if he can, too.

    I don't doubt he wants to ridicule our government and many of our core beliefs.

    Again, that's not proof.
     
  10. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
     
  11. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    John McAfee, who founder of the McAfee virus software company:

    The Joint Analysis Report from the FBI contains an appendix that lists hundreds of IP addresses that were supposedly “used by Russian civilian and military intelligence services.” While some of those IP addresses are from Russia, the majority are from all over the world, which means that the hackers constantly faked their location.

    McAfee argues that the report is a “fallacy,” explaining that hackers can fake their location, their language, and any markers that could lead back to them. Any hacker who had the skills to hack into the DNC would also be able to hide their tracks, he said

    “If I was the Chinese and I wanted to make it look like the Russians did it, I would use Russian language within the code, I would use Russian techniques of breaking into the organization,” McAfee said, adding that, in the end, “there simply is no way to assign a source for any attack.”

    However, McAfee does see a problem with the National Security Agency (NSA) being able to listen in on every conversation and read every text message and email of every American. Rather than focusing on disrupting the bad guys in foreign countries, McAfee thinks that “all of that effort has been placed on a country that is afraid of its own citizens.”

    He claims that the only way he has been able to fully block the NSA from infecting his phone with spyware is by using a flip-phone too old to be hacked. He even goes as far as to call the iPhone the “ultimate spy device.”​
     
  12. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    Since we like Twitter so much:

     
  13. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    More twitter to love.



     
  14. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
  15. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    Fascinating. Remember, the FBI had no access to do forensic analysis of the hacked systems.



     
  16. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
  17. Further

    Further Guy

    Joined:
    Sep 20, 2008
    Messages:
    11,099
    Likes Received:
    4,039
    Trophy Points:
    113
    Occupation:
    Stuff doer
    Location:
    Place
    Stop conflating different hacks. This thread is not about the DNC hack, it's about election system hacks. That has been linked according to our intelligence agencies.





    And in an interview while driving so I can't reference exactly who was being interviewed but they were a former head of one of the intelligence agencies said this hacking would have taken a coordinated effort of several hundred to thousands of full time computer experts to pull off. That's one of the ways they know it was a massive effort that likely only a couple countries in the world could have pulled off.
     
    riverman likes this.
  18. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    I'm not conflating the different attacks. I am explaining how the various attacks work.

    "Former head" (Obama fan)... The source is dubious. Facts are not.

    Hacking doesn't take hundreds of thousands of dollars and full time computer experts to pull off.

    https://www.theguardian.com/technol...-jailed-masterminding-attacks-sony-microsoftt

    Teenage hacker jailed for masterminding attacks on Sony and Microsoft
    Adam Mudd jailed for two years for creating attack-for-hire business responsible for more than 1.7m breaches worldwide

    A man has been jailed for two years for setting up a computer hacking business that caused chaos worldwide.

    Adam Mudd was 16 when he created the Titanium Stresser program, which carried out more than 1.7m attacks on websites including Minecraft, Xbox Live and Microsoft and TeamSpeak, a chat tool for gamers.

    He earned the equivalent of more than £386,000 in US dollars and bitcoins from selling the program to cybercriminals.

    Mudd pleaded guilty and was sentenced at the Old Bailey. The judge, Michael Topolski QC, noted that Mudd came from a “perfectly respectable and caring family”. He said the effect of Mudd’s crimes had wreaked havoc “from Greenland to New Zealand, from Russia to Chile”.
     
  19. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    A few weeks ago, I was working on a prototype WWW site and left the staging server (at a hosting company) run overnight. The next day, the database was wiped and there was a message inside: 'pay ransom if you want your data back.'

    The Russians did it!

    (NOT)
     
  20. Denny Crane

    Denny Crane It's not even loaded! Staff Member Administrator

    Joined:
    May 24, 2007
    Messages:
    72,976
    Likes Received:
    10,655
    Trophy Points:
    113
    Occupation:
    Never lost a case
    Location:
    Boston Legal
    http://www.foxnews.com/politics/2016/02/13/cops-arrest-teen-for-hack-and-leak-dhs-fbi-data.html

    Cops arrest teen for hack and leak of DHS, FBI data

    A 16-year-old boy living in England has been arrested in connection with the recent hack of FBI and DHS data, as well as the personal email accounts of CIA director John Brennan and homeland security chief Jeh Johnson.

    Fox has confirmed that British authorities have arrested the still- unnamed teen with help from the FBI and that they are looking for possible accomplices.

    The alleged hacker had told Motherboard webzine that he had swiped the names, titles and contact information for 20,000 FBI employees and 9,000 Department of Homeland Security employees. He told Motherboard this was possible through a compromised Department of Justice email.
     

Share This Page