Hackers Phish for Political Secrets in Midterm Campaigns

The best hacks are always the simplest.

When Russian hackers successfully attacked Hillary Clinton’s presidential campaign chairman John Podesta in 2016, they didn’t need to use crippling ransomware or a complex zero-day exploit. Instead, the Russians used one of the oldest tricks in the hacker playbook: Email phishing.

“Phishing is all about the bad guy — the attacker — sending a malicious email to a victim and fooling that person either to click on a link within the email or open up an attachment,” said hacker and computer security consultant Kevin Mitnick in an interview with CBS News. “When the victim [clicks the link or opens the attachment] their computer ends up being compromised and malware is installed so the bad guy has full control.”

To view the full article and to get updates on other current news items please visit the source.

Source: WCBI

Topics: election hacking, email phishing, fake domains, WikiLeaks, Claire McCaskill, computer security expert, Hillary Clinton, information theft, intelligence, IP blocking, Julian Assange, keynote speaker, malicious email, Putin, John Podesta, malware, Zzure Cloud platform, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

6 FAQs From CISOs About the Pentesting Process

As a Chief Information Security Officer (CISO), you have the responsibility of not only directing your organization’s security but also conveying your..

Read more ›

What You Get When You Invest in Mitnick Red Team Pentesting

A data breach can have extremely negative impacts on businesses, including financial losses as well as harm to their reputation with clients, customer..

Read more ›

Cyber Security Penetration Testing for Multinational Corporations

Read more ›
tech-texture-bg