2016 Postmortem
In reply to the discussion: What will it take for the Proofers to see what happened here? [View all]apnu
(8,790 posts)This kind of hacking involved sending a bunch of spear phishing emails to trick people into installing malware that could then be exploited and/or passwords revealed.
However the range of attacks they'd have to engineer against all the small, down ticket items is daunting. Hence big things that are easy targets to find and devise a social engineering email attack were hit. The DNC and a political celebrity John Poedesta. Some small state Dem rep? I doubt the hackers are even aware of those people.
In both cases with the DNC and Poedesta, the weakest link was human beings. They coughed up the critical item the black hats wanted to compromise.
If anybody cares to read it, here's a very long NYT article about "patient zero" in the DNC hack.
https://www.nytimes.com/2016/12/20/insider/how-we-identified-the-dnc-hacks-patient-zero.html
But note the attack vectors as you read. You'll see fake gmail account and other tricks meant to make the humans think they're talking to someone they know when they're talking to someone else entirely. The central attack vector is human trust of email and false perceptions of email integrity.
Once they got in that way, they started installing malware that had Russian signatures and/or associations with other Russian cyberattacks and that's how the Russian's were identified.