January 14, 2020
If there is something crappier than the new Star Wars trilogy, it is the Russian Hacker trilogy, the third segment of which is just now preparing to be released.
Russian military hackers tried to steal emails from the Ukrainian energy firm where Hunter Biden, the son of Democratic presidential contender Joe Biden, had a seat on the board, a U.S. cybersecurity firm said on Monday.
Energy company Burisma Holdings Ltd was at the center of attempts by U.S. President Donald Trump last July to pressure Ukrainian authorities to announce an investigation into the Bidens for purported corruption, an effort that has led to the Republican being impeached by the U.S. House of Representatives on charges of abuse of power and obstruction of Congress.
California-based Area 1 Security identified the hacking of Burisma and linked it to Russia’s Main Directorate of Military Intelligence, or GRU. The same hacking group, known as “Fancy Bear” by cybersecurity researchers, breached the Democratic National Committee in 2016 in what U.S. investigators described as part of an operation to disrupt that year’s election.
“You can see this attack really is starting to parallel with what we saw in 2016,” Oren Falkowitz, Area 1’s chief executive, said in an interview.
The Russian Defense Ministry did not immediately respond to a request for comment. Officials at the U.S. National Security Agency and the Department of Homeland Security declined to comment.
Burisma did not immediately respond to a request for comment.
A source close to Burisma told Reuters the company’s website had been subject to multiple break-in attempts over the past six months but did not provide further details.
What data the hackers were looking to steal is not clear, Area 1 said. Breaching Burisma could yield communications from, to, or about Hunter Biden, who served as a director between 2014 and 2019. A leak of stolen data could potentially affect the impeachment process and U.S. electoral contest.
Area 1 said it became aware of the Russian targeting of Burisma after its email security scanning product found suspicious evidence online, including “decoy domains” – websites designed to imitate legitimate email services used by Burisma’s subsidiaries.
Oh yeah, the old “dummy domains” trick.
Gets ’em every time.
Look: this is all bullshit.
Any hacking attribution is bullshit.
You cannot prove anyone hacked anything unless you physically retrieve their computers.
Remember Dread Pirate Roberts, the guy who ran the Silk Road?
Remember how they got him?
To prevent Ulbricht from encrypting or deleting files on the laptop he was using to run the site as he was arrested, two agents pretended to be quarreling lovers. When they had sufficiently distracted him, according to Joshuah Bearman of Wired, a third agent grabbed the laptop while Ulbricht was distracted by the apparent lovers’ fight and handed it to agent Thomas Kiernan. Kiernan then inserted a flash drive in one of the laptop’s USB ports, with software that copied key files.
They had to physically seize his computer while it was unlocked. Because physical access to his computer was the only way they could convict him of any of his internet crimes.
None of this shit about Russian hackers that you hear about every day in the media could ever be proved in a court. They are just wild, baseless accusations. They know none of it will ever go to court, so the media can just report it as fact, based on the claims of shady “cybersecurity firms” which – by absolute coincidence – all have direct connections to the Democrat Party and anti-Putinist slavs.
We all know the story of Crowdstrike – the company hired by the Democrats to analyze their own server. It’s run by an ethnic Russian exile who hates Putin. And no government body ever examined the server, they just said that Crowdstrike was right, that their word is like the word of God, and the media started reporting it as a fact that Russia hacked the DNC.
So what is Area 1 Security?
Well, it’s a “firm” founded by former members of the NSA, the head of which is a Jew.
It was funded by a bunch of Democrat Party and intelligence agency linked venture capital groups.
The company was incorporated in 2013 by founders Oren Falkowitz, Blake Darché, and Phil Syme, all of whom were formerly employed by the U.S. National Security Agency. The company announced venture capital financing led by Kleiner Perkins and including Icon ventures, Allegis Capital, Cowboy Ventures, Data Collective, First Round Capital, RedSeal Networks CEO Ray Rothrock, and Shape Security CEO Derek Smith.
Falkowitz has stated that the company is working with politicians to “prevent a repeat of 2016.”
And the only reason you have to believe that Russia hacked Hunter Biden is “this shady company with all these conflicting interests said so.”
Clearly, they are setting up a narrative for any information that is leaked about Hunter Biden to be blamed on these ghost-like Russian hackers. They will then say that the leaks are “election meddling.” And repeat the entire witch-hunt.
Basically, it is now officially impossible to leak any information about anything anymore, as the leaks – no matter how legitimate or how damning – will just be dismissed as a Russian conspiracy.