VP Hopeful Sarah Palin's Yahoo E-Mail Account HackedVP Hopeful Sarah Palin's Yahoo E-Mail Account Hacked
A team of hackers dubbed "Anonymous" claims to have breached vice presidential hopeful Gov. Sarah Palin's Yahoo e-mail account, based on a number of announcements and screenshots posted to the Web and Wikileaks.org
September 17, 2008
A team of hackers dubbed "Anonymous" claims to have breached vice presidential hopeful Gov. Sarah Palin's Yahoo e-mail account, based on a number of announcements and screenshots posted to the Web and Wikileaks.orgEither it was an elaborate fake, or the hackers actually did compromise VP Palin's e-mail address and then send the information to Wikileaks.
The link, which has been only intermittently available, is available here:
This is the information that was posted on Wikileaks.org:
"Circa midnight Tuesday the 16th of September (EST) Wikileaks' sources loosely affiliated with the activist group 'anonymous' gained access to U.S. Republican Party Vice-presidential candidate Sarah Palin's Yahoo email account [email protected]. Governor Palin has come under criticism for using private email accounts to avoid government transparency mechanisms. The zip archive made available by Wikileaks contains screen shots of Palin's inbox, example emails, address book and two family photos. The list of correspondence, together with the account name, appears to re-enforce the criticism."
It's not yet at all clear how Gov. Palin's account had been breached, although chances are that the password to her account was cracked and Yahoo wasn't breached.
This AP story quotes a statement from the McCain campaign on the incident:
"This is a shocking invasion of the governor's privacy and a violation of law. The matter has been turned over to the appropriate authorities and we hope that anyone in possession of these e-mails will destroy them," the McCain campaign said in a statement.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023