How Hillary’s team fell for a Russia-linked email phishing scheme

WASHINGTON — It was just before noon in Moscow on March 10, 2016, when the first volley of malicious messages hit the Hillary Clinton campaign.

The first 29 phishing emails were almost all misfires. Addressed to people who worked for Clinton during her first presidential run, the messages bounced back untouched.

Except one.

  • Uncommunist


  • So why didn’t they publish this information a year ago? They were so obsessed with finding a “Trump connection” instead of treating it objectively like any other investigation, they preferred to let it all spin out of control until there were practically riots in the streets. And then they could blame the riots on Trump too!

    What a bunch of posers. Which leads me to doubt the veracity of this article in the first place. And they deliberately failed to mention that many of the “hacks” were not in fact hacks — they were leaks from within the DNC itself (Seth Rich?). They allude to it in the article (e.g.: “…and other sources…”), but almost imperceptibly. It’s obvious that the writers of the article do not want any further investigation into the “leaking” issue.

  • BillyHW

    All they had to do was put Pizza in the subject line and Johnny Pedo couldn’t help but click on it.

  • BTW, “Two-factor authentication” can be a security/privacy problem in and of itself because e-mail providers often apply the method of authentication arbitrarily, rather than giving the user a choice or allowing him/her to define the method themselves.

    I’ve had to “hack” my own e-mail because of that using a third-party service — an additional security/privacy risk. I don’t know if anybody else has experienced a similar problem with two-factor authentication…

  • Drunk by Noon ✓

    Machine reading and AI screening before the mail even arrives will be the next step.
    It has to be.
    Some of the spear fishing attempts would have fooled me.