DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Clinton campaign says data program accessed in cyber-attack on Democrats

Posted on July 30, 2016 by Dissent

Sam Thielman and Lauren Gambino report:

A data program used by the campaign of the Democratic presidential candidate, Hillary Clinton, was “accessed” as a part of hack on the Democratic National Committee (DNC) that intelligence officials believe was carried out by Russia’s intelligence services, Clinton’s campaign said on Friday.

[…]

Clinton spokesman Nick Merrill said that despite the breach of the campaign network, “no evidence” had been found to suggest that the “internal systems have been compromised”. Reuters, citing people familiar with the matter, first reported that the Clinton computer network had been hacked.

Read more on The Guardian.

Category: Breach IncidentsBusiness SectorHack

Post navigation

← Pregnancy-tracking app was riddled with vulnerabilities, exposing extremely sensitive personal information
HHS seeks threat information sharing system for health sector →

3 thoughts on “Clinton campaign says data program accessed in cyber-attack on Democrats”

  1. Jordana Ari says:
    July 30, 2016 at 10:05 am

    There are tons of Swiss cheese holes all over this. I don’t think we will know for awhile until they release whatever they are holding onto.

    And someone in Russia really does not like Hillary Clinton.

    (By the way, I am almost positive they have my emails from my real name account to the DNC. When the DNC begged for money, I wrote back quite a few times I will never give a dime for many specific reasons)

  2. Anonymous says:
    August 1, 2016 at 7:18 am

    What? No information accessed? Did he bother to pay attention to a PREVIOUS breach of the DNC and all the data that was dumped? No, They rather try to lie and feed the american people a line of crap than step up and say, logically that there is a possibility of a 2nd hack but unsure at this time what was affected

    There are MANY MANY versions of malware and other nasties that are NOT detected by anti malware. They probably searched for the same things, found nothing and decided to say, NAH there isn’t anytjing here. That’s total BS, and they know it. If you cannot fix your junk, the american people should know.

    No planning what so ever, no forward thinking what so ever…..and this team wants to ruin, errr run as president?

    The DNC needs to get a grip. they HAVE been compromised, and Anything to say that the DNC is fully clean is suspect at best.

    Some americans are aware of the issues with the DNC and the hack. Others simply don’t care and rather be blind to the issue. generally in america, the attention to detail has definately fell flat on its face over the past 15+ years.

  3. Anonymous says:
    August 1, 2016 at 7:22 am

    I never send a negative response, or any response to a potentially hacked environment. You never know if it is a phishing campaign.IF it is, then the crooks on the other end have your email address as a person who is willing to open and reply to an email. They can then add you to a list that can serve up malware that is embedded in a JPG or other attachment.

    If you use Outlook or any other email service, it is BEST to shut off any sort of preview pane to avoid an inadvertent opening of unwanted emails.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas gastroenterology and surgical practice victim of ransomware attack
  • Romanian Citizen Pleads Guilty to ‘Swatting’ Numerous Members of Congress, Churches, and Former U.S. President
  • North Dakota Enacts Financial Data Security and Data Breach Notification Requirements
  • Pro-Ukraine hacker group Black Owl poses ‘major threat’ to Russia, Kaspersky says
  • Vanta bug exposed customers’ data to other customers
  • Lyrix Ransomware Targets Windows Users with Advanced Evasion Techniques
  • Central Maine Healthcare tackles suspected cybersecurity issue; hospitals remain open
  • Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed
  • Beyond the Pond Phish: Unraveling Lazarus Group’s Evolving Tactics
  • Akira doesn’t keep its promises to victims — SuspectFile

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Supreme Court Agrees to Clarify Emergency Situations Where Police Don’t Need Warrant
  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.