Skip to main content

Hackers allegedly used cryptocurrency in attack against Clinton campaign

Image used with permission by copyright holder

An 11-count federal indictment filed against 12 Russian military intelligence officers alleges that the group used cryptocurrency to remain anonymous in a scheme against the Democratic National Committee and Hillary Clinton’s presidential campaign in 2016. They are accused of using these digital coins to pay for the website used to release and publicize stolen election-related documents, keeping their true identities hidden.

A month before releasing the stolen documents, the group registered the dcleaks.com domain and leased a virtual private server through an online cryptocurrency service, according to the indictment. After that, they registered an URL-shortening account that was used to “spear phish” the Clinton campaign chairman and “other campaign-related individuals.”

From the time of the site’s launch until the end of the election, the group released emails stolen from the Clinton campaign and affiliated individuals, along with documents obtained through previous spear-phishing operations. The site claimed that it was run by “American hactivists” and received more than 1 million page views before it was shut down in March 2017.

At its core, cryptocurrency was designed to keep users anonymous … at least, in theory. In the case of Bitcoin, you can send and receive digital currency without supplying personal information, but you’re seemingly doing so under what could be deemed a pseudonym. The address (wallet) where you send and receive digital currency remains in a public ledger, so if that address is ever linked to your real name, any type of anonymity is flushed down the toilet.

According to the indictment filed by the Department of Justice, all 12 accused are members of the Main Intelligence Directorate of the General Staff, or GRU, that’s part of the Russian military. They are charged with hacking into the computer networks of the Clinton campaign, the Democratic Congressional Campaign Committee, and the Democratic National Committee using the names DCLeaks, Guccifer 2.0, and “another entity.”

The Department of Justice lists all 12 individuals, who were officials in Unit 26165 and Unit 74455 of the Russian government’s Main Intelligence Directorate at the time of the attacks.

For instance, Unit 26165 used spear-phishing campaigns against volunteers and employees of the Clinton campaign to steal usernames and passwords, and hack into other computers to steal emails and documents. The Department of Justice claims Unit 26165 worked with Unit 74455 to release those documents.

Meanwhile, Unit 74455 hacked into the computers of state boards of elections, secretaries of state, and U.S.-based companies that supplied software and other technology related to the administration of elections.

“To avoid detection, defendants used false identities while using a network of computers located around the world, including the United States, paid for with cryptocurrency through mining Bitcoin and other means intended to obscure the origin of the funds,” the Department of Justice states. “This funding structure supported their efforts to buy key accounts, servers, and domains.”

Here are the charges:

  • Count 1: criminal conspiracy
  • Count 2 – 9: Aggravated identify theft
  • Count 10: Conspiracy to launder money via cryptocurrency
  • Count 11: Conspiracy to commit an offense against the United States

The FBI’s cyber teams in Pittsburgh, Philadelphia, and San Francisco helped with the investigation,

Editors' Recommendations

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
Your Google Photos app may soon get a big overhaul. Here’s what it looks like
The Google Photos app running on a Google Pixel 8 Pro.

Google Photos is set to get a long-overdue overhaul that will bring new and improved sharing and notification features to the app. With its automatic backups, easy sorting and search, and album sharing, Google Photos has always been one of the better photo apps, and now it's set to get a whole slew of AI features.

According to an APK teardown done by Android Authority and the leaker AssembleDebug, Google is now set to double down on improving sharing features. Google Photos will get a new social-focused sharing page in version 6.85.0.637477501 for Android devices.

Read more
The numbers are in. Is AMD abandoning gamers for AI?
AMD's RX 7700 XT in a test bench.

The data for the first quarter of 2024 is in, and it's bad news for the giants behind some of the best graphics cards. GPU shipments have decreased, and while every GPU vendor experienced this, AMD saw the biggest drop in shipments. Combined with the fact that AMD's gaming revenue is down significantly, it's hard not to wonder about the company's future in the gaming segment.

The report comes from the analyst firm Jon Peddie Research, and the news is not all bad. The PC-based GPU market hit 70 million units in the first quarter of 2024, and from year to year, total GPU shipments (which includes all types of graphics cards) increased by 28% (desktop GPU shipments dropped by -7%, and CPU shipments grew by 33.3%). Comparing the final quarter of 2023 to the beginning of this year looks much less optimistic, though.

Read more
Hackers claim they’re selling the user data of 560 million Ticketmaster customers
A crowd enjoying a music show that you are at because of Ticketmaster.

Ticketmaster is giving people a lot to talk about. If the Justice Department is not suing it, it's reportedly suffering a data breach affecting the vital information of hundreds of millions of users. Hackread reports that a hacker group is claiming it breached Ticketmaster, putting the personal data of 560 million users at risk of suffering all types of attacks.

According to Hackread, the total amount of stolen data reaches 1.3TB and includes personal information such as names, emails, phone numbers, addresses, event details, ticket sales, order information, and partial payment card data. The list doesn't end there, though, as the compromised data also includes customer fraud details, expiration dates, and the last four digits of card numbers.

Read more