Skip to main content

Hackers allegedly used cryptocurrency in attack against Clinton campaign

Image used with permission by copyright holder

An 11-count federal indictment filed against 12 Russian military intelligence officers alleges that the group used cryptocurrency to remain anonymous in a scheme against the Democratic National Committee and Hillary Clinton’s presidential campaign in 2016. They are accused of using these digital coins to pay for the website used to release and publicize stolen election-related documents, keeping their true identities hidden.

A month before releasing the stolen documents, the group registered the dcleaks.com domain and leased a virtual private server through an online cryptocurrency service, according to the indictment. After that, they registered an URL-shortening account that was used to “spear phish” the Clinton campaign chairman and “other campaign-related individuals.”

Recommended Videos

From the time of the site’s launch until the end of the election, the group released emails stolen from the Clinton campaign and affiliated individuals, along with documents obtained through previous spear-phishing operations. The site claimed that it was run by “American hactivists” and received more than 1 million page views before it was shut down in March 2017.

At its core, cryptocurrency was designed to keep users anonymous … at least, in theory. In the case of Bitcoin, you can send and receive digital currency without supplying personal information, but you’re seemingly doing so under what could be deemed a pseudonym. The address (wallet) where you send and receive digital currency remains in a public ledger, so if that address is ever linked to your real name, any type of anonymity is flushed down the toilet.

According to the indictment filed by the Department of Justice, all 12 accused are members of the Main Intelligence Directorate of the General Staff, or GRU, that’s part of the Russian military. They are charged with hacking into the computer networks of the Clinton campaign, the Democratic Congressional Campaign Committee, and the Democratic National Committee using the names DCLeaks, Guccifer 2.0, and “another entity.”

The Department of Justice lists all 12 individuals, who were officials in Unit 26165 and Unit 74455 of the Russian government’s Main Intelligence Directorate at the time of the attacks.

For instance, Unit 26165 used spear-phishing campaigns against volunteers and employees of the Clinton campaign to steal usernames and passwords, and hack into other computers to steal emails and documents. The Department of Justice claims Unit 26165 worked with Unit 74455 to release those documents.

Meanwhile, Unit 74455 hacked into the computers of state boards of elections, secretaries of state, and U.S.-based companies that supplied software and other technology related to the administration of elections.

“To avoid detection, defendants used false identities while using a network of computers located around the world, including the United States, paid for with cryptocurrency through mining Bitcoin and other means intended to obscure the origin of the funds,” the Department of Justice states. “This funding structure supported their efforts to buy key accounts, servers, and domains.”

Here are the charges:

  • Count 1: criminal conspiracy
  • Count 2 – 9: Aggravated identify theft
  • Count 10: Conspiracy to launder money via cryptocurrency
  • Count 11: Conspiracy to commit an offense against the United States

The FBI’s cyber teams in Pittsburgh, Philadelphia, and San Francisco helped with the investigation,

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
The Samsung Galaxy A16 sets a new record for budget Android phones
Galaxy A16 banner Samsung

We've known that Samsung's next lineup of budget phones was on the way, especially after all of the information that leaked last week. Now, we have confirmation on several elements of the phone, but the most important of them all is the incredible (and unheard of) six years of security patches the Galaxy A16 5G will receive from launch. That means it will be fully up to date until October 31, 2030.

We reported on this possibility a couple of weeks ago, but now it's confirmed — and that's a big deal. Many budget phones only receive two years of security patches post-launch. The Galaxy A16 5G's six years of support puts it only one year behind Samsung's flagship models in the Galaxy S24 series. For a phone as cheap as the Galaxy A16, that's incredible.

Read more
Microsoft Word may delete your files — here’s how to avoid it
Windows 11 logo on a laptop.

There's a new bug in Microsoft Word that may delete your files, and according to user reports, they're not always recoverable through the Recycle Bin. Fortunately, Microsoft is aware of the problem, but it's unclear when the issue might be fixed. If you want to make sure that your files stay safe, we've got a few workarounds to help you out.

In the last few days, the Microsoft community boards have been flooded with reports of people complaining about their files randomly being deleted, with one user saying: "I use Word. Today, it deleted eight hours of work." Further reports quickly made it clear that the affected files have a few things in common.

Read more
Nothing’s Android 15 beta is live, but only for one of its phones
A person holding the Nothing Phone 2a Plus.

If you've been patiently awaiting the launch of Nothing 3.0, it's closer than ever. It's expected to be released in December of this year, but the Nothing 3.0 beta is now available for the Nothing Phone 2a.

Interestingly enough, only the Nothing Phone 2a can download the update right now. The Nothing Phone 2 will get access in November, while the Nothing Phone 1, Nothing Phone 2a Plus, and Nothing CMF Phone 1 will have to wait until December.

Read more