It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: pavil
a reply to: theantediluvian
Now were back to phishing for passwords.......ok. Them Ruskies are high tech.
Anyone who get's phished, deserves it. It's not that hard to figure out.
Before clicking on a link, you can observe the bottom left corner of the screen to make sure where your going is what is being presented. Also httpS: domains for security. There's just the simple common sense of not putting too much faith in the system as well.
Aside from that, from the thread I did on CrowdStrike, I'm not sure we are being fed all of the information on what the FBI knew/knows or doesn't. In fact, there may be cause to say that they are having a few behind the scenes relations for all out plausible deniability.
Also, this would make Assange a liar, no? Having stated multiple times that the leaks didn't come from Russia. Now, if that is true, then Wikileaks integrity is shot, over and done.
The reality is that I've been continuously ahead of the curve.
This article proves how podesta fell for a phishing scam on his Gmail acount. It has nothing to do with the DNC server being hacked. In fact in the article they state that it used 2 passwords and one wouldn't give them access. So you kind of proved the opisit of what you intended. You showed a phishing scam couldn't get access to the DNC server.
originally posted by: IgnoranceIsntBlisss
a reply to: odzeandennz
Leaks / Hacks / Tapes didnt seem to sway the DNC base in the slightest, neither qualitatively or quantitatively:
originally posted by: theantediluvian
a reply to: nwtrucker
If that's the case, we're so totally and inescapably f'd that it really doesn't matter.
If that's the case, we're so totally and inescapably f'd that it really doesn't matter.
Forensicator viewed Guccifer 2 as a lone wolf hacker who lived somewhere in Eastern Europe or Russia; he used a Russian-aligned VPN service to mask his IP address.
In the United States, which was Russia’s Cold War rival, Fancy Bear tried to pry open at least 573 inboxes belonging to those in the top echelons of the country’s diplomatic and security services: then-Secretary of State John Kerry, former Secretary of State Colin Powell, then-NATO Supreme Commander, U.S. Air Force Gen. Philip Breedlove, and one of his predecessors, U.S. Army Gen. Wesley Clark.
The list skewed toward workers for defense contractors such as Boeing, Raytheon and Lockheed Martin or senior intelligence figures, prominent Russia watchers and — especially — Democrats. More than 130 party workers, campaign staffers and supporters of the party were targeted, including Podesta and other members of Clinton’s inner circle.
The AP also found a handful of Republican targets.
In Ukraine, which is fighting a grinding war against Russia-backed separatists, Fancy Bear attempted to break into at least 545 accounts, including those of President Petro Poroshenko and his son Alexei, half a dozen current and former ministers such as Interior Minister Arsen Avakov and as many as two dozen current and former lawmakers.
The list includes Serhiy Leshchenko, an opposition parliamentarian who helped uncover the off-the-books payments allegedly made to Trump campaign chairman Paul Manafort — whose indictment was unsealed Monday in Washington.
In Russia, Fancy Bear focused on government opponents and dozens of journalists. Among the targets were oil tycoon-turned-Kremlin foe Mikhail Khodorkovsky, who spent a decade in prison and now lives in exile, and Pussy Riot’s Maria Alekhina. Along with them were 100 more civil society figures, including anti-corruption campaigner Alexei Navalny and his lieutenants.
Conclusion 5: The lengthy time gaps suggest that many additional files were initially copied en masse and that only a small subset of that collection was selected for inclusion into the final 7zip archive file (that was subsequently published by Guccifer 2). Given the calculations above, if 1.98 GB were copied at a rate of 22.6 MB/s and all the time gaps were attributed to additional file copying then approximately 19.3 GB in total were initially copied. In this hypothetical scenario, the 7zip archive represents only about 10% of the total amount of data that was initially collected.
Initially when this data was analyzed, the “time gaps” were attributed to “think time”, where it was assumed that the individual who collected the files would copy the files in small batches and in between each batch would need some “think time” to find or decide on the next batch to copy. This may be an equally valid way to explain the presence of time gaps at various junctures in the top-level files and folders. However, in this analysis we will assume that a much larger collection of files were initially copied on 7/5/2016; the files in the final .7z file (the subject of this analysis) represent only a small percentage of all the files that were initially collected.
Two facor authentication means not only do they need a password but the device they are on has to be authorized on the server. Not impossible to get around if you hack into some ones device. But a phishing scam isnt going to pull it off. Unless the administrator was an idiot he should not have authorized any device until speaking to the user. So now to access clintons or DNC server you need to use an authorized device.
There were multiple Gmail accounts phished. It's possible that DNC staffers used the same password for domain accounts (assuming the DNC uses Windows servers) as for the Gmail. It's also possible that domain passwords or passwords for other email accounts were emailed to the Gmail accounts. Which would be extremely bad form but then again, we know that Podesta's CAP domain password was sent via email. That would open up many lines of attack if their computers were remotely accessible.
Ps if a hacker is good he willleave behind zero evidence as to his identity by using several proxy servers. Meaning you cant identify any real hackers just scammers