Hackers Phish for Political Secrets in Midterm Campaigns

The best hacks are always the simplest.

When Russian hackers successfully attacked Hillary Clinton’s presidential campaign chairman John Podesta in 2016, they didn’t need to use crippling ransomware or a complex zero-day exploit. Instead, the Russians used one of the oldest tricks in the hacker playbook: Email phishing.

“Phishing is all about the bad guy — the attacker — sending a malicious email to a victim and fooling that person either to click on a link within the email or open up an attachment,” said hacker and computer security consultant Kevin Mitnick in an interview with CBS News. “When the victim [clicks the link or opens the attachment] their computer ends up being compromised and malware is installed so the bad guy has full control.”

To view the full article and to get updates on other current news items please visit the source.

Source: WCBI

Topics: Speaking Engagements, election hacking, email phishing, fake domains, Global Ghost Team, WikiLeaks, Claire McCaskill, Hillary Clinton, information theft, intelligence, IP blocking, Julian Assange, malicious email, Putin, John Podesta, malware, Zzure Cloud platform, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Why Healthcare Cybersecurity Matters: 5 Lessons From Recent Data Breaches

In 2024, data thieves breached a record-breaking number of healthcare records, exposing the personal and healthcare data of more than 185 million indi..

Read more ›

5 Interview Questions to Ask Penetration Testing Companies

If you've never experienced a data breach, consider yourself lucky. If you have, you know it's an absolute nightmare. With cyber criminals looking for..

Read more ›

4 Ways Security Awareness Training Can Benefit Your Organization

Threat actors rely on human error, counting on employees to fall for their tricks.

Read more ›
tech-texture-bg