Breaches WikiLeaks and CIA Chief Brennan’s Emails; The Roundup So Far Published 3 years ago on October 27, 2015 By Samburaj Das The fallout from the social-engineering hack of CIA chief John Brennan’s personal email account continues. WikiLeaks has released a third batch of personal emails. Among information such as an “unidentified Brennan Group,” a detailed dossier of an FBI agent and insight into geopolitical world politics, CIA Director Brennan’s email contacts list included a certain “hottie _200518 @ yahoo.com” Less than a week ago, it was revealed that teenage hackers gained access to the CIA Director’s personal email through a simple social engineering hack. At the time, the incident had conflicting reports, which while amusing at first quickly turned into an embarrassment when the hack was confirmed to be true. To make matters worse for CIA head Brennan, the hackers who call themselves “Cracka and associates” handed over the emails to chief-whistleblower and transparency organization WikiLeaks. In taking up the mantle, WikiLeaks has published three batches of the CIA Director’s personal emails to date. The First Batch of Emails RELEASE: CIA Director John Brennan emails https://t.co/GC22CxkRkV #CIAemails pic.twitter.com/XdjkVPS5GW — WikiLeaks (@wikileaks) October 21, 2015 A draft paper dated July 15, 2007 revealed Brennan’s take on the U.S. intelligence infrastructure, noting that the “intelligence mission of our country must involve more than the [sum] of the departments and agencies of the federal government.” He called for a national security architecture in “all levels and governments as well as those of the private sector.” A document titled “the Connundrum of Iran,” dated November 18, 2007 had Brennan point to Iran being a pawn of global politics due to “the CIA-engineered overthrow” of Iranian Prime Minister Mossadegh back in 1953, allowing the pro-U.S. Shah to reclaim power for the next 25 years. Another interesting document from the first WikiLeaks release showed a letter from Christopher Bond, vice chairman of the Senate Select Committee on Intelligence who weighed in on the use of torture during interrogation techniques. Talking about the need for the possibility of “new techniques” that are not explicitly authorized by the Army Field Manual (AFM) but “nevertheless comply with the law,” Bond asks for such law-circumventing techniques to be developed while stressing on a proposal to ban “certain harsh interrogation techniques.” “Rather than authorizing intelligence agencies to use only those techniques that are allowed under the AFM, I believe the more prudent approach is to preclude the use of specific techniques that are prohibited under the AFM.” These ‘specific techniques,’ includes sexual acts, beatings, waterboarding, mock executions, water and food deprivation among other techniques. The Second Batch of Emails RELEASE: CIA chief John Brennan emails — day two https://t.co/wrjq52Hkvd #CIAemails #afpak #afghanistan #CIA pic.twitter.com/QO3uajBcfd — WikiLeaks (@wikileaks) October 22, 2015 Brennan urged the U.S. President to appoint a ‘Special Co-ordinator” in Afghanistan, just two days after President Barrack Obama was elected into the office in November 2008. The CIA Director suggested the importance of Pakistan’s role and co-operation in U.S. operations in Afghanistan. There was also insight into the geopolitical situation in the region, noting “Pakistan’s use of militant proxies (the Taliban) in its conflict with India.” The report also has Brennan elaborating on the narcotics industry in Afghanistan, the world’s largest producer of heroin. The production of the opium accounts for more than 35% of the country’s GDP and 10% of the Afghan population are directly employed by the poppy industry. The leaked report reads: “Successful counter narcotics campaigns in the Andes, Thailand, Burma, Pakistan, and India have taught us that a balanced and coordinated effort is the only way to achieve sustainable reductions in drug production.” Another reveal highlighted a particular entry from the CIA director’s contact’s list: What was #CIA director John Brennan emailing "email@example.com" about? https://t.co/RL6xVB32L2 #CIAemails pic.twitter.com/EZRiUpdQVj — WikiLeaks (@wikileaks) October 26, 2015 The Third Batch of Emails WikiLeaks has deemed it the “Unidentified Brennan Group”, a table of 22 people including Brennan along with prominent figures in Homeland Security and former CIA employees. The release also contains information pertaining to Brennan’s previous employers – the Analysis Corporation along with details of the 22 people such as previous employment, compensation, security clearance etc. Another document revealed a comprehensive dossier on an FBI agent, taken directly from Brennan’s personal email. FBI agent Donovan J. Leighton was the FBI program manager for the FBI’s counterterrorism division in the Arabian Peninsula. WikiLeaks also published e-mails taken from the Stratfor breach, a private firm that deals with global intelligence operations. Interestingly, one of the emails taken from the company revealed an added insight into Brennan’s activities: Brennan is behind the witch hunts of investigative journalists learning information from inside the beltway sources. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (0 votes, average: 0.00 out of 5)You need to be a registered member to rate this. Loading... Samburaj Das 4 stars on average, based on 1 rated postsSamburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security. Follow @HackedCom Feedback or Requests? Related Topics:ciaJohn Brennanwikileaks Up Next British Police Arrest 15-Year-Old In Telecom Hack; Ransom Was Demanded In Bitcoin Don't Miss Boston University Researchers Identify Network Time Protocol (NTP) Vulnerabilities You may like U.S. Officials Say Defenses Are up against Alleged Russian Hacking US Reportedly Planning An “Unprecedented” Cyberattack Against Russia Is Russia Really Looking to Hack the U.S. Presidential Elections? Julian Assange: Wikileaks is About to Reveal Information That Could Damage Clinton, or Trump, or Both Julian Assange Hints at More DNC Material from WikiLeaks U.K. Police Arrest Teen Following Hacks Of High-Level U.S. Intelligence Officials Click to comment You must be logged in to post a comment Login Leave a Reply Cancel replyYou must be logged in to post a comment. Altcoins Crypto-Security Testnet Surpasses Key Milestones Published 2 weeks ago on October 2, 2018 By Daniel Mitchell Security and has been combined with micro-compucomputing are a combination which ascended to greatly relevant, both economically and financially, since the early days of commercial internet technology, the John McAfee associated era of anti-virus software, and fears of ‘millennium-bug’ (‘Y2K’)-induced societal meltdowns. As a market player, ‘cybersecurity‘ is hailed for its continuedvalue and growth, with recent implementations advancing in tandem with technological development. With ‘blockchain’ having become a key buzzword in recent years, it comes as little surprise that digital security providers have been attempting to identify and provide protection against cryptocurrency related scams. Examples of these include ‘malware‘ AKA ‘malicious software’. They are often created with the aim of illicitly subvert the processing power of the victim’s device for use towards the mining of cryptocurrencies, or lock and potentially delete highly sensitive data (such as Ransomware’). Cybersecurity and Blockchain Crypto attacks can affect almost any person or institution: from private wallets and exchanges, to cryptocurrency operators, and even sometimes unsuspecting users of internet browsers with no relation to blockchain based services. In an article published at CCN in August 2018, I wrote about the large prolificity and news coverage of cyber-attacks carried out against cryptocurrency organisations: with a majority of them involving the theft of high-value quantities of tokens or sensitive data. Key points raised in the piece include the identification of wallets and exchanges as high-value targets for potential thieves, as well as a discussion surrounding a study of over 1000 participants in which none of the top exchanges were “lauded for security”. As cybersecurity has been exposed as a fatal flaw in the unauthorised access / theft access of finances and data, it has also drawn a spotlight on the various methods employed by the companies which suffer these attacks. Middleware, Wear and Tear Some teams attempt to protect their data and finances through the creation and implementation of their own proprietary cybersecurity solutions whilst others seek the tender of others, ‘Middleware’ is nothing new and has long been utilised as a means of implementing third-party solutions as a means of shifting professional a legislative liability regarding essential functions of a brand technology. It’s a creation by third party product / service providers that sits between external and internal code in order to facilitate functions or protections. Decentralized Security Testnet REMME is a project harnessing blockchain technology to create a distributed cybersecurity solution for enterprises. Its now-released testnet has already demonstrated the efficacy of storing hashed Public Key Infrastructure certificates on the blockchain, and with 300 pilot program participants signed up, REMME isn’t short of applicants eager to trial its distributed identity and access management solution. ‘Distributed Identity and Access management’ (IAMd) and ‘Public Key Infrastructure’ requests (PKId) count amongst two of the primary features of the proprietary REMChain testchain network infrastructure. Both claims of which have come from CEO Alex Momot, who additionally praised “The interoperability of the public blockchain and sidechains”. Additional features include the ‘REMchain block explorer’ – ‘node monitoring’ (connected to five nodes worldwide) – REMME WebAuth demo application. While a pilot program reportedly attracting over 300 global enterprise applicants, REMME feels confident about the future of their long terms plans: which include full integration existing enterprise systems (ERP, CRM, Accounting software etc.). Featured image courtesy of Shutterstock. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (3 votes, average: 4.33 out of 5)You need to be a registered member to rate this. Loading... Daniel Mitchell 4.5 stars on average, based on 12 rated posts Follow @HackedCom Feedback or Requests? Continue Reading Breaches MyEtherWallet Compromised in Security Breach; Users Urged to Move Tokens Published 3 months ago on July 10, 2018 By Sam Bourgi Popular cryptocurrency service MyEtherWallet (MEW) is urging users to move their tokens after the platform succumbed to its second cyber attack of the year. As the company reported earlier, hackers targeted MEW’s popular VPN service in an attempt to steal cryptocurrency. Hola VPN Users Compromised Rather than target MEW directly, hackers took control of the Hola VPN service, which claims nearly 50 million users. For the next five hours, MEW users who had the Hola chrome extension installed and running on their computer were exposed. MEW took to Twitter to urge users to move their funds immediately. “Urgent! If you have Hola chrome extension installed and used MEW within the last 24 hrs, please transfer your funds immediately to a brand new account!” the company said. It added the following message shortly thereafter:”We received a report that suggest Hola chrome extension was hacked for approximately 5 hrs and the attack was logging your activity on MEW.” At the time of writing, MEW’s Twitter feed had no further updates. MyEtherWallet is used to access cryptocurrency wallets, where users can send and receive tokens from other people. The company reportedly told TechCrunch that the attack originated from a Russian-based IP address. “The safety and security of MEW users is our priority. We’d like to remind our users that we do not hold their personal data, including passwords so they can be assured that the hackers would not get their hands on that information if they have not interacted with the Hola chrome extension in the past day,” MEW said, as quoted by TechCrunch. It’s not yet clear how many users were compromised in the attack or how much, if any, was stolen from their wallets. MEW suffered a similar incident in February after a DNS attack wiped out $365,000 worth of cryptocurrency from users’ accounts. Cyber Attacks on the Rise The attack on MEW came less than 24 hours after Hacked reported another major cyber breach involving Bancor, a decentralized cryptocurrency exchange. The security breach compromised roughly $23.5 million worth of digital currency, including Ethereum, NPXS and BNT, Bancor’s native token. Last month, a pair of South Korean exchanges fell prey to cyber criminals, prompting local regulators to expedite their approval of new cryptocurrency laws. It has been estimated that a total of $761 million has been stolen from cryptocurrency exchanges in the first half of the year, up from $266 million in all of 2017. That figure is expected to rise to $1.5 billion this year. CipherTrace, the company behind the estimates, told Reuters last week that stolen cryptocurrencies are mainly used to launder money and aid criminals in concealing their identities. Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading. Featured image courtesy of Shutterstock. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (2 votes, average: 5.00 out of 5)You need to be a registered member to rate this. Loading... Sam Bourgi 4.6 stars on average, based on 647 rated postsSam Bourgi is Chief Editor to Hacked.com, where he specializes in cryptocurrency, economics and the broader financial markets. Sam has nearly eight years of progressive experience as an analyst, writer and financial market commentator where he has contributed to the world's foremost newscasts. Follow @HackedCom Feedback or Requests? Continue Reading Breaches Mt. Gox vs. Bithumb: That Was Then, This Is Now Published 4 months ago on June 21, 2018 By Gerelyn Terzo Bithumb now shares something in common with the Tokyo-based shuttered bitcoin exchange Mt. Gox — both suffered a hack on about the same date, June 19. It’s a club that no exchange wants to belong to and that Bithumb happened on the seven-year anniversary of Mt. Gox’s maiden attack has to be more than an eerie coincidence. It’s a stark reminder of the risks involved with keeping funds on an unregulated exchange, vulnerabilities that cost South Korea’s Bithumb some $36.6 million in digital cash and Mt. Gox $450 million in hacked bitcoin and its future. The Mt. Gox theft unfolded over a series of hacks that culminated in 2014. Though it’s still early on in the Bithumb hack, it appears the South Korean exchange will recover from the security breach. So what do we know now that we didn’t on June 19, 2011? Then vs. Now Former Coinbase official Nick Tomaino, who is also the founder of crypto fund 1 confirmation, reflected on the Mt. Gox hack in what proved to be a prescient tweet given the Bithumb attack that was about to surface. Video from that 6/19/11 flash crash (h/t @inthepixels) https://t.co/W3WWNIZUaM — Nick Tomaino (@NTmoney) June 19, 2018 The thing to note about Mt. Gox is that the Japan-based exchange in 2011 controlled most of the BTC trading volume, approximately three-quarters of it by average estimates — more if you ask Tomaino. Since bitcoin fever caught on in 2017, there are more than 500 cryptocurrency exchanges on which trading volume is shared. Binance boasts the highest trading volume and captures nearly 15% of bitcoin trading. It’s much less than Mt. Gox days but still a little high. The other thing to note is that the Mt. Gox hack or actually hacks, as there were multiple attacks on the exchange over several years, was a mysterious event that was shrouded in controversy and mistrust of a key executive. Bithumb, on the other hand, confronted the hack seemingly right away on Twitter and has not let any grass grow under its feet in the interim, which is a key difference in the way Mt. Gox was handled. Also, the bitcoin price didn’t tank in response to the Bithumb hack. It traded lower for a while, but less than 24 hours it was back in the green, which is a reflection of the fact that bitcoin trading is no longer dependent on a single exchange. Charlie Lee, creator of Litecoin (LTC), the No. 6 cryptocurrency by market cap, was among the first to respond to the Bithumb hack. He tweeted: Another day, another hack. Hopefully BitThumb is able to cover this amount, though $30MM is not a small amount. As I've said many times, be smart and only keep on exchange coins that you are actively trading. It's best to withdraw right after trading. https://t.co/8YpVcHx8tK — Charlie Lee [LTC⚡] (@SatoshiLite) June 20, 2018 Indeed, Bithumb does expect to be able to cover the losses via their reserves. Crypto Security It’s still early on in Bithumb’s security breach, and more details are sure to emerge in time. In the meantime, it’s a good idea to use the hack as an opportunity to examine the security of your cryptocurrency investment portfolio. There are several hardware wallet options out there for you to choose from — whether it’s Trezor or Ledger Nano S, to name a couple — and as Charlie Lee advised, “only keep on exchange coins that you are actively trading.” Featured image courtesy of Shutterstock. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (0 votes, average: 0.00 out of 5)You need to be a registered member to rate this. Loading... Gerelyn Terzo 4.6 stars on average, based on 69 rated postsGerelyn has been covering ICOs and the cryptocurrency market since mid-2017. She's also reported on fintech more broadly in addition to asset management, having previously specialized in institutional investing. She owns some BTC and ETH. Follow @HackedCom Feedback or Requests? Continue Reading Recent CommentsChris G on Crypto Update: Altcoin Market Cap on the Verge of Trend Reversaldavidstewartkim on “The Core of Any Blockchain Project is Decentralization” – Jack Zhang, Lightning BitcoinDaniel Won on ICO Analysis: Dusk NetworkSholaO on ICO Analysis: Dusk NetworkDaniel Won on ICO Analysis: Dusk Network Tron (TRX) Progressing Faster Than Anyone Predicte... Breakout Imminent Ripple Price Analysis: XRP/USD Subject to Pullback... Trade Recommendation: Stellar Trade Recommendation: Ripple Crypto Update: Coins Edge Lower in Quiet Trading Hawkish Fed Lifts Yields, Dollar as Stock-Correcti... Recent Posts Selloff Resumes as Italian Budget Crisis Deepens October 19, 2018 A Tale of Two Pumps: PIVX and INS Ecosystem in Coordinated 25% Spikes on Bithumb Listing October 19, 2018 Market Update: U.S. Stocks Take the Plunge as China Selloff Intensifies; Crypto Institutional Lending on the Rise October 18, 2018 ICO Analysis: NODVIX October 18, 2018 Gemini Dollar Approaches Parity with USD After Rocketing Higher Earlier in Week October 18, 2018 Pre-Market Analysis And Chartbook: Stocks Turn Lower as Treasury Yields Eye Multi-Year Highs Again October 18, 2018 Monero Price Analysis: XMR/USD is Stable and Gunning for Potential Gains on “Bulletproofs” Technology Update Day October 18, 2018 NEO Price Leapfrogs Market as Technical Article Competition Underway October 18, 2018 Tron (TRX) Progressing Faster Than Anyone Predicted – Including Justin Sun October 18, 2018 Trade Recommendation: Stellar October 18, 2018 A part of CCN Hacked.com is Neutral and Unbiased Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com. Trending Cryptocurrencies1 week ago Monero vs. ZCash: Privacy Coins Compared Analysis7 days ago Bitcoin Update: 2018 and 2014 Bear Market Comparison Altcoins5 days ago Electroneum’s Benchmark Month Sends ETN Coin Price Up 333% Altcoins1 week ago Bribery on Binance? DigiByte’s Jared Tate Blasts CZ Over DGB Listing Demands Altcoins6 days ago Digitex Futures (DGTX) Cements Top 100 Position with 194% Two-Week Growth Analysis1 week ago Crypto Update: Trade Setups for Bitcoin Cash and 0x Altcoins1 week ago Ripple Price Analysis: XRP/USD at Risk of September Bull Run Being Completely Deflated Bitcoin1 week ago Could Bitcoin Challenge Ethereum?