Well, that certainly gives some credibility to the claim it's a state actor.
US DNC hackers blew through SIX zero-days vulns last year alone
Security researchers have shone fresh light on the allegedly Russian state-sponsored hacking crew blamed for ransacking the US Democratic National Committee's computers. Sednit – also known as APT28, Fancy Bear and Sofacy – has been operating since 2004. The cyber-mob has reportedly infiltrated machines operated by targets as …
COMMENTS
-
-
Thursday 20th October 2016 20:11 GMT Anonymous Coward
Re: Mostly
And here's a good reason why that may not be a good idea:
https://www.aps.org/publications/apsnews/updates/xicharges.cfm
https://www.aps.org/publications/apsnews/201510/charges-dropped.cfm
Temple University handed over the University email system to google years ago, and everyone involved in this false arrest case thinks the NSA monitoring Temple's gmail, but not understanding what they were reading, is how this fiasco started.
-
-
Friday 21st October 2016 15:52 GMT bombastic bob
Windows, Adobe Flash and Java vulnerabilities
Well, THERE's your PROBLEM!
Seriously, it's kinda known that vulnerabilities are traded on the dark web. It's also likely that the people doing this are NOT 'state sponsored', but may simply be 'anon' type activists. If you want to find them, you'd have better luck hanging out on 4chan or some similar place that 'anonymous' frequents. Pointing fingers at Russia is just Mrs. Clinton's latest distraction, since those leaks make her (and the DNC) look pretty bad...
(not saying that none of the 'anon' actors are NOT inside Russia, which may be true, but that they're probably not sponsored by Putin's gummint)