DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Clinton campaign says data program accessed in cyber-attack on Democrats

Posted on July 30, 2016 by Dissent

Sam Thielman and Lauren Gambino report:

A data program used by the campaign of the Democratic presidential candidate, Hillary Clinton, was “accessed” as a part of hack on the Democratic National Committee (DNC) that intelligence officials believe was carried out by Russia’s intelligence services, Clinton’s campaign said on Friday.

[…]

Clinton spokesman Nick Merrill said that despite the breach of the campaign network, “no evidence” had been found to suggest that the “internal systems have been compromised”. Reuters, citing people familiar with the matter, first reported that the Clinton computer network had been hacked.

Read more on The Guardian.

Category: Breach IncidentsBusiness SectorHack

Post navigation

← Pregnancy-tracking app was riddled with vulnerabilities, exposing extremely sensitive personal information
HHS seeks threat information sharing system for health sector →

3 thoughts on “Clinton campaign says data program accessed in cyber-attack on Democrats”

  1. Jordana Ari says:
    July 30, 2016 at 10:05 am

    There are tons of Swiss cheese holes all over this. I don’t think we will know for awhile until they release whatever they are holding onto.

    And someone in Russia really does not like Hillary Clinton.

    (By the way, I am almost positive they have my emails from my real name account to the DNC. When the DNC begged for money, I wrote back quite a few times I will never give a dime for many specific reasons)

  2. Anonymous says:
    August 1, 2016 at 7:18 am

    What? No information accessed? Did he bother to pay attention to a PREVIOUS breach of the DNC and all the data that was dumped? No, They rather try to lie and feed the american people a line of crap than step up and say, logically that there is a possibility of a 2nd hack but unsure at this time what was affected

    There are MANY MANY versions of malware and other nasties that are NOT detected by anti malware. They probably searched for the same things, found nothing and decided to say, NAH there isn’t anytjing here. That’s total BS, and they know it. If you cannot fix your junk, the american people should know.

    No planning what so ever, no forward thinking what so ever…..and this team wants to ruin, errr run as president?

    The DNC needs to get a grip. they HAVE been compromised, and Anything to say that the DNC is fully clean is suspect at best.

    Some americans are aware of the issues with the DNC and the hack. Others simply don’t care and rather be blind to the issue. generally in america, the attention to detail has definately fell flat on its face over the past 15+ years.

  3. Anonymous says:
    August 1, 2016 at 7:22 am

    I never send a negative response, or any response to a potentially hacked environment. You never know if it is a phishing campaign.IF it is, then the crooks on the other end have your email address as a person who is willing to open and reply to an email. They can then add you to a list that can serve up malware that is embedded in a JPG or other attachment.

    If you use Outlook or any other email service, it is BEST to shut off any sort of preview pane to avoid an inadvertent opening of unwanted emails.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.