Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10:15 AM

FBI Reportedly Took Months To Warn DNC That Russia May Be Behind Hackings

Full disclosure may have lessened damage but official says agency was acting in national interest.

The FBI was aware of Russia likely being behind the breach on Democratic National Committee (DNC) but did not disclose this when it first warned DNC of hacking activities last fall, according to a Reuters report.

The report, quoting people familiar with the matter, also said that as a result, the DNC did not realize how serious the intrusions were till as late as March.

Sources told Reuters that the lack of full disclosure would have made DNC officials take proactive steps but, instead, hackers continued to have access to their servers for month, especially during a crucial period in the US polls.

However, an unnamed official quoted in the report defended the intelligence agency’s move saying it was acting in the interest of national security. “There is a fine line between warning people or companies or even other government agencies that they’re being hacked – especially if the intrusions are ongoing – and protecting intelligence operations that concern national security,” the official told Reuters.

Cybersecurity personnel and US officials have alleged that the Russian government was behind all the hacking activities on DNC, DCCC and the Clinton campaign but there is no official confirmation of this from the US government.

Read full report on Reuters.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
8/8/2016 | 3:44:10 PM
Re: Does it matter?
I completely agree. Regardless of the suspected intruder, a notified organization should immediately take steps to secure their infrastructure. This not only sound policy, it is simple common sense.
User Rank: Ninja
8/5/2016 | 10:19:50 AM
Does it matter?
Politics aside, no company or organization should treat a breach event differently based on who the perpetrator is.  Once notify the DNC should have acted with diligence and assume the worst.  That is what any IT security professional will recommend.
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...