After analyzing the US elections hacks, the evidence found suggests Trump may not have made a very good call on this matter by publicly expressing doubt that Russia was involved. But his blaming of the victims of the cyber attacks does strike on a certain truth: the Clinton campaign, the DNC, and DCC were poorly prepared for this sort of cyberattack because they failed to learn lessons from history, and ignored advice from some very knowledgeable third parties they enlisted for help.
In order to stay away from any threats like this, we recommend the install of antivirus for Windows or antivirus for Mac on every device that you own, depending on which OS your device is running.
If you are a company, it is also recommended to hire every year a specialized cybersecurity company that will run annual tests on your company’s network. These tests include penetration testing and ethical hacking tests;
Multiple GRU units are involved in election-related hacks. 12 GRU agents interfered with the U.S. 2016 election. Here’s how do they did it:
The entire espionage operation was run by Unit 26165, commanded by GRU Officer Viktor Borisovich Netykshko. Unit 26165 appears to be the organization behind at least part of the “threat group” of tools, techniques, and procedures known as “Fancy Bear,” “Sofacy,” “APT28,” and “Sednit.” Within the unit, two divisions were involved in the breaches: one specializing in operations and the second in development and maintenance of hacking tools and infrastructure.
The GRU operation had conducted wide-ranging spear-phishing attacks against both Democrats and Republicans as far back as October 2015 with limited success. Members of John McCain’s and Lindsey Graham’s campaign staffs, as well as members of several other Republican congressional campaign staffs, had their emails stolen and later posted on the DCLeaks site. But as the presidential field narrowed, the GRU began to focus on the Democrats and Hillary Clinton’s campaign.
For this entity operation to work the Russian operatives used cryptocurrency to procure virtual private network services, domain names, and leased servers—spending about $90,000 worth of Bitcoin to finance election hacking operations, according to the DOJ.
We would continue to monitor this cyber war. Meanwhile, users should keep a keen eye out for any cyber attacks. Remember to use an antivirus for Windows or antivirus for Mac in every device that you own, depending on which OS your machine is running, If you are a company we recommend to hire every year a specialized cybersecurity company that will run annual tests on your company’s network, tests like this include: penetration testing and ethical hacking.