RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Sender:
Records Management Program <[log in to unmask]>
Date:
Fri, 28 Oct 2016 22:36:52 -0500
Reply-To:
Records Management Program <[log in to unmask]>
Subject:
MIME-Version:
1.0
Content-Transfer-Encoding:
quoted-printable
Content-Type:
text/plain; charset=UTF-8
From:
Comments:
To: RAINbyte <[log in to unmask]>, RECMGMT-UK <[log in to unmask]>
Parts/Attachments:
text/plain (30 lines)
A Russian hacking group used spearphishing to steal the Gmail login
credentials of Hillary Clinton campaign staff, and that may be how campaign
emails now being released were stolen, according to Secure Works.

The attack targeted 108 hillaryclinton.com email addresses, and was carried
out by a Russian group called Threat Group-4127 (TG-4127), according to
Secure Works’ Counter Threat Unit (CTU) blog.

CTU can’t directly link the spearphishing operation against the Clinton
campaign with the hack of Democratic National Committee emails revealed
June 14, but “CTU researchers suspect that TG-4127 used the spearphishing
emails or similar techniques to gain an initial foothold in the DNC
network. “
http://bit.ly/2eR2pwk
http://bit.ly/2eR2pwk+

-- 
Peterk
Dallas, Tx
[log in to unmask]
Save our in-boxes! http://emailcharter.org
“If only there were a massive entity that I were forced to fund to tell me
how I should live my life, since I’m so obviously incapable of deciding for
myself.” M. Hashimoto

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

ATOM RSS1 RSS2