【】Play your favorite retro games at work
Even Russian spies apparently make mistakes when it comes to VPNs.。
Like Guccifer 2.0, the self-proclaimed hacker apparently responsible for burrowing into the Democratic National Committee computer network, then sending stolen emails to WikiLeaks.。
According to a new report by The Daily Beast, Guccifer, who'd long been presenting as a solo, independent hacker from Romania, infiltrating the DNC, has reportedly been exposed as working from Russia. And they would have got away with it if it wasn't for a damn VPN.。
SEE ALSO:The 6 best VPNs to help keep you anonymous on the internet。The Guccifer persona apparently neglected to switch on the VPN client before logging on once. 。
As a result," the report reads, "he left a real, Moscow-based Internet Protocol address in the server logs of an American social media company, according to a source familiar with the government’s Guccifer investigation."。
Yep, Moscow.。
U.S. investigators used that IP address to connect Guccifer to a Russian foreign military intelligence agency known as GRU, according to the Daily Beast's sources.。
Thanks for signing up!。
It's important to note that this claim hasn't been confirmed by the U.S. government. In January 2017, U.S. intelligence officials linked Guccifer 2.0 to the Russian spying agency with "high confidence," but didn't confirm the link unequivocally.。
Guccifer 2.0 leaked DNC materials to Wikileaks and pretty much any GOP operative that wanted the goods. The hack exposed embarrassing details about Hillary Clinton's campaign and the DNC's inner workings. It was a boon for President Donald Trump ahead of the election.。
Finding a link between Russia and the DNC hack was a priority for U.S. investigators from the start. Kyle Ehmke, an intelligence researcher at cyber security firm ThreatConnect who previously led an investigation into Guccifer's identity, told the Daily Beast ThreatConnect tried to track the persona through their email metadata — which always led them to a French data centre.。
"Almost immediately various cyber security companies and individuals were skeptical of Guccifer 2.0 and the backstory that he had generated for himself,” Ehmke told the publisher. 。
“We started seeing these inconsistencies that led back to the idea that he was created hastily … by the individual or individuals that affected the DNC compromise."。
Guccifer was reportedly using a service called Elite VPN, which indeed existed in France — but had Russian headquarters. Then, it was a case of Robert Mueller and his team tracking the one-off IP address to none other than GRU HQ on Grizodubovoy Street in Moscow.。
VPNs huh? VPNs huh?
UPDATE: March 28, 2018, 12:19 p.m. AEDT。
This story has been updated to reflect that Kyle Ehmke was discussing previous investigations on behalf of ThreatConnect into Guccifer 2.0 with the Daily Beast. ThreatConnect does not have ties to the recent discovery. 。
Featured Video For You。
相关文章
One of the most controversial power struggles in media comes to a close
One of the world's biggest media companies has been embroiled in a complex personal and professional2025-01-18All the biggest news from PlayStation's E3 showcase
PlayStation's E3 showcase was chock full of great reveals and new looks at upcoming games including2025-01-18'Stranger Things' books are coming to you
Two 。 Stranger Things 。books are on their way from Penguin Random House. That's two books publishing f2025-01-18YubiKey Neo review: $50 gets you worry
Privacy and protecting data has certainly moved up in importance on a global scale over the past few2025-01-18What brands need to know about virtual reality
Virtual reality (VR) is all the rage. Premium publishers like USA Today, the New York Times, and AOL2025-01-18Facebook's Oculus Venues streams its first VR concert. Was it any good?
When Australian artist Vance Joy performed at Colorado'sRed Rocks Amphitheatre on Wednesday, there w2025-01-18
最新评论