Security Expert: US Govt's Alleged 'Russian Hack' Appears to Trace Back to UkraineChris MenahanInformationLiberation Jan. 02, 2017 |
Rep. Randy Fine: Pro-Palestine Movement Are 'Demons' Who 'Must Be Put Down by Any Means Necessary'
ADL Responds to DC Shooting With Call to Deplatform Twitch Streamer Hasan Piker
Israeli PM Netanyahu: Trump Told Me 'I Have Absolute Commitment to You'
Trump Confronts South African President on White Genocide
CNN: U.S. Officials Say Israel Preparing Possible Strike on Iran
![]() ![]() Wordfence Founder/CEO Mark Maunder reports: The IP addresses that DHS provided may have been used for an attack by a state actor like Russia. But they don't appear to provide any association with Russia. They are probably used by a wide range of other malicious actors, especially the 15% of IP addresses that are Tor exit nodes.You can see from the screenshots he released the maker of the malware says they're Ukrainian. Additionally, Maunder says the malware the USG report cites is quite outdated. The "PAS" malware the USG cited was version 3.1.7, whereas now the program is now up to version 4.1.1. ![]() Note, "UA" is short for Ukraine. ![]() ![]() ![]() ![]() You can read all the specifics of how they found this data on their website. It totally blows apart the idea this was some sophisticated, next level "leet Russian haxor" operation and shows the hackers actually used not-so-sophisticated malware allegedly of Ukrainian origin. Follow InformationLiberation on Twitter and Facebook. |