World

Boo! Democrats Scared by Their Own Hack Test, Called FBI

The Democratic National Committee (DNC) is reversing their narrative on a widely reported hacking attempt against them on Tuesday. Now, they’re saying there was no real threat ‒ rather, the alarm was triggered by a test paid for by the DNC.
Sputnik

The DNC brought out the big guns when they thought they were getting hacked on Tuesday, informing the FBI that they had been targeted by a sophisticated spear-phishing campaign, complete with a mock website designed to mimic the actual website the party uses to hold its "VoteBuilder" voter database.

If the "hacking attempt" had been successful, it would have compromised not just the DNC staffers' login information, but a trove of home addresses and phone numbers belonging to potential voters and party donors.

The only problem? It wasn't a spear-phishing campaign at all. The "hacking attempt" discovered by a Democratic contractor called Lookout, a San Francisco-based cybersecurity firm, was actually a testing operation by another company called DigiDems, which the Michigan Democratic Party had paid to probe DNC systems.

Someone didn't get the memo.

Nonetheless, Democrats are still patting themselves on the back. "The party took the necessary precautions to ensure that sensitive data critical to candidates and state parties across the country was not compromised," DNC chief security officer Bob Lord said in a Thursday statement.

While the DNC said initially that they thwarted the attack, and then that it wasn't an attack, but they still handled it appropriately, they apparently see the confusion over the test they ordered as cause to "continue to be vigilant," Lord said, calling the false alarm paid for by the party even "further proof" of the need for such vigilance.

While Tuesday's events definitely were not a hack, whether the intrusion into their servers during the 2016 elections was one remains disputed by experts.

Discuss