Hillary Clinton Email Hacker Says It Was "Easy" | Hacked: Hacking Finance

Hillary Clinton Email Hacker Says It Was “Easy”


Samburaj Das

Samburaj Das

Samburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.


Total Coverage 22nd August, 2017

ChronoPay Looks to Kickstart Bitcoin Adoption in Russia 29th May, 2017


Hillary Clinton Email Hacker Says It Was “Easy”

Posted on .
This article was posted on Thursday, 17:33, UTC.

 Romanian hacker Marcel Lehel, infamously known as “Guccifer” has, in an interview with Fox News from a Virginia jail, claimed that he breached Hillary Clinton’s “completely unsecured” private email server, repeatedly and easily.

// -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- //

42-year old Lehel, best known for his hacking prowess that compromised targets such as former US President George Bush and several celebrities including Steve Martin and Leonardo di Caprio, allegedly, has revealed details of his breach of Hillary Clinton’s email account.

Speaking to Fox News who queried him if it was easy or hard to gain access to Hillary Clinton’s email account, Guccifer stated:

For me, it was easy…easy for me, for everybody.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

The hacker revealed that the process of the breach began when he correctly guessed Clinton confidant Sidney Blumenthal’s AOL account security question in early 2013, before gaining access to Clinton’s private server.

He stated that he had accessed Clinton’s server “twice” although he deemed it was uninteresting to him at the time.

I was not paying attention. For me, it was not like the Hillary Clinton server, it was like an email server she and others were using with political voting stuff.

Although there isn’t much to go by with how he gained access to Hillary Clinton’s emails, he claimed that he sought the originating IP of the email. “The email header is the originating IP usually,” Lazard explained before adding that he then scanned and checked the IP with an IP scanner.

He also mentioned programs like netscan, Netmap, Angry IP and Wireshark as tools in which he checked to see if the targeted servers and ports were “alive” and open.

Meanwhile, Hillary Clinton’s campaign issued a statement refuting Guccifer’s claims which read:

There is absolutely no basis to believe the claims made by this criminal from his prison cell. In addition to the fact he offers no proof to support his claims, his descriptions of Secretary Clinton’s server are inaccurate. It is unfathomable that we would have gained access to her emails and not leaked them the way he did to his other victims.

Hillary Clinton’s secret email was revealed as [email protected], her personal email during her tenure as the Secretary of State.

Guccifer was recently extradited to the United States and faces charges of unauthorized access to a protected computer, cyberstalking, aggravated identify theft, wire fraud and obstruction of justice by the US Department of Justice.

Fox News added that it could not independently verify Guccifer’s claims.

Featured image from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.

Feedback or Requests?

Samburaj Das

Samburaj Das

Samburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.

  • user

    AUTHOR Dennis Freeland

    Posted on 5:59 am May 11, 2016.

    “Guccifer never hacked my server”

    Then she needs to explain how RT obtained 20,000 of her emails, and published all the Benghazi related emails, all marked with “G” for Guccifer , publishing them over two years before she handed them over to the DOJ & State Department. Comparison with the State Department published emails shows them to be correct – actual emails either to or from HRC.

    Her alternative options are :
    a) He made a lucky guess on who sent what emails when and to whom, and the entire content of the emails verbatim !!
    b) It wasn’t him – it was someone else – who then marked them as if they had come from him. But that still leaves her as having been hacked. That sounds like the “I didnt have sex with that woman” defense.
    c) She deliberately leaked her emails as an act of positive espionage.

    Regardless of which option turns out to be true, it is hardly the outcome one would want attributed to a Presidential candidate.

  • View Comments (1) ...
    The team:
    Dmitriy Lavrov
    Dmitriy Lavrov is a professional trader, technical analyst and money manager with 10 years of trading experience. He covers Forex, Commodities and Cryptocurrencies. He is among the top 10 most Read More
    Jonas Borchgrevink
    Jonas Borchgrevink is the founder of Hacked.com and CryptoCoinsNews.com. He is a serial entrepreneur, trader and investor. He shares his own personal journey on Hacked.com. // -- Discuss and ask Read More
    Mate Csar
    Trader and financial analyst, with 10 years of experience in the field. An expert in technical analysis and risk management, but also an avid practitioner of value investment and passive Read More
    Mati Greenspan
    Senior Market Analyst at Etoro.com. // -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- // Important: Never invest Read More
    Rakesh Upadhyay
    Rakesh Upadhyay is a Technical Analyst and Portfolio Consultant for The Summit Group. He has more than a decade of experience as a private trader. His philosophy is to use Read More
    Pamela Meropiali
    Account Manager
    Pamela Meropiali is responsible for users on Hacked.com. // -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- // Read More
    Joseph Young
    Joseph Young is a finance and tech journalist & analyst based in Hong Kong. He has worked with leading media and news agencies in the technology and finance industries, offering Read More
    In what constitutes a major data breach comprising of hundreds…