DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Clinton campaign says data program accessed in cyber-attack on Democrats

Posted on July 30, 2016 by Dissent

Sam Thielman and Lauren Gambino report:

A data program used by the campaign of the Democratic presidential candidate, Hillary Clinton, was “accessed” as a part of hack on the Democratic National Committee (DNC) that intelligence officials believe was carried out by Russia’s intelligence services, Clinton’s campaign said on Friday.

[…]

Clinton spokesman Nick Merrill said that despite the breach of the campaign network, “no evidence” had been found to suggest that the “internal systems have been compromised”. Reuters, citing people familiar with the matter, first reported that the Clinton computer network had been hacked.

Read more on The Guardian.


Related:

  • DCLeaks was a conspiracy to get Trump elected, but wait until you hear these Russian hackers' motivation!
  • Three IRGC Cyber Actors Indicted for ‘Hack-and-Leak’ Operation Designed to Influence the 2024 U.S. Presidential Election
  • Five recent Merrill Lynch security breaches you probably didn't know about
  • General Services Administration discloses vulnerability; starts notifying those potentially affected
  • Hacker leaks over 260 internal Democratic Party files on Hillary Clinton
Category: Breach IncidentsBusiness SectorHack

Post navigation

← Pregnancy-tracking app was riddled with vulnerabilities, exposing extremely sensitive personal information
HHS seeks threat information sharing system for health sector →

3 thoughts on “Clinton campaign says data program accessed in cyber-attack on Democrats”

  1. Jordana Ari says:
    July 30, 2016 at 10:05 am

    There are tons of Swiss cheese holes all over this. I don’t think we will know for awhile until they release whatever they are holding onto.

    And someone in Russia really does not like Hillary Clinton.

    (By the way, I am almost positive they have my emails from my real name account to the DNC. When the DNC begged for money, I wrote back quite a few times I will never give a dime for many specific reasons)

  2. Anonymous says:
    August 1, 2016 at 7:18 am

    What? No information accessed? Did he bother to pay attention to a PREVIOUS breach of the DNC and all the data that was dumped? No, They rather try to lie and feed the american people a line of crap than step up and say, logically that there is a possibility of a 2nd hack but unsure at this time what was affected

    There are MANY MANY versions of malware and other nasties that are NOT detected by anti malware. They probably searched for the same things, found nothing and decided to say, NAH there isn’t anytjing here. That’s total BS, and they know it. If you cannot fix your junk, the american people should know.

    No planning what so ever, no forward thinking what so ever…..and this team wants to ruin, errr run as president?

    The DNC needs to get a grip. they HAVE been compromised, and Anything to say that the DNC is fully clean is suspect at best.

    Some americans are aware of the issues with the DNC and the hack. Others simply don’t care and rather be blind to the issue. generally in america, the attention to detail has definately fell flat on its face over the past 15+ years.

  3. Anonymous says:
    August 1, 2016 at 7:22 am

    I never send a negative response, or any response to a potentially hacked environment. You never know if it is a phishing campaign.IF it is, then the crooks on the other end have your email address as a person who is willing to open and reply to an email. They can then add you to a list that can serve up malware that is embedded in a JPG or other attachment.

    If you use Outlook or any other email service, it is BEST to shut off any sort of preview pane to avoid an inadvertent opening of unwanted emails.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 45,000 malicious IP addresses taken down in international cyber operation
  • The Broken Records: tracing the human cost of the 2022 British MoD leak
  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life
  • Viral ‘Quittr’ Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • New data shows increase in FBI searches of Americans’ data last year
  • CalPrivacy Fines PlayOn Sports $1.1 Million for CCPA Violations Involving Student Privacy
  • 17 States Sues Trump Administration Over Unlawful Data Demands Targeting Colleges
  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.