So What Was Trump's Big Reveal?

NPR's IT department said it was the Russians. That settles it right?
See? This tard SKIMMED the post. I told ya!

NPR's IT department said it could be a false flag. NPR's IT department is headquartered in Moscow. Which figures, right? :D

The cybersecurity expert explained in detail how it could NOT be a false flag.

READ! For chrissakes.

I read the whole thing Ricky Retardo. The Cyber Experts said the Russians "accidentally" hacked the election
Nope. Goddam you have reading comprehension almost as shitty as UC's!

The expert said the Russians were discovered because they made an accidental mistake. They used the same URL shortening service for a thousand other hacks. "They look for efficiencies".
 
I also saw somewhere that some of the Russian hackers were so dumb that they used email addresses that they had forgot to put on private... so they were able to be traced back to Russia.

Did you Lewd? :eek:

I'm SURE you'll be posting evidence any second now..

Shall I hold my breath while you Little Goebbels post the avalanche of evidence you have? :dunno:

It was in the video interview with CrowdStrike posted by Esquire.



Sorry, I block video, I can't watch it.


Go figure.


I block a lot of things here, including G5000's brain (ThinkProgress, DailyKOS)


Why do you even post in these threads if you don't read or watch the evidence provided for you? Why do you post in these threads if you have your mind made up and won't even consider evidence provided for you?
 
NPR's IT department said it was the Russians. That settles it right?
See? This tard SKIMMED the post. I told ya!

NPR's IT department said it could be a false flag. NPR's IT department is headquartered in Moscow. Which figures, right? :D

The cybersecurity expert explained in detail how it could NOT be a false flag.

READ! For chrissakes.

I read the whole thing Ricky Retardo. The Cyber Experts said the Russians "accidentally" hacked the election
Nope. Goddam you have reading comprehension almost as shitty as UC's!

The expert said the Russians were discovered because they made an accidental mistake. They used the same URL shortening service for a thousand other hacks. "They look for efficiencies".

CrowdStrike also watched where the malware in the DNC servers sent the information back to... they followed the trail back to the Russians.
 
NPR's IT department said it was the Russians. That settles it right?
See? This tard SKIMMED the post. I told ya!

NPR's IT department said it could be a false flag. NPR's IT department is headquartered in Moscow. Which figures, right? :D

The cybersecurity expert explained in detail how it could NOT be a false flag.

READ! For chrissakes.

I read the whole thing Ricky Retardo. The Cyber Experts said the Russians "accidentally" hacked the election
Nope. Goddam you have reading comprehension almost as shitty as UC's!

The expert said the Russians were discovered because they made an accidental mistake. They used the same URL shortening service for a thousand other hacks. "They look for efficiencies".

Fake news all reads alike
 
The part I bolded is the Podesta hack:

The U.S. Government confirms that two different RIS actors participated in the intrusion into a U.S. political party. The first actor group, known as Advanced Persistent Threat (APT) 29, entered into the party’s systems in summer 2015, while the second, known as APT28, entered in spring 2016.

Both groups have historically targeted government organizations, think tanks, universities, and corporations around the world. APT29 has been observed crafting targeted spearphishing campaigns leveraging web links to a malicious dropper; once executed, the code delivers Remote Access Tools (RATs) and evades detection using a range of techniques. APT28 is known for leveraging domains that closely mimic those of targeted organizations and tricking potential victims into entering legitimate credentials. APT28 actors relied heavily on shortened URLs in their spearphishing email campaigns. Once APT28 and APT29 have access to victims, both groups exfiltrate and analyze information to gain intelligence value. These groups use this information to craft highly targeted spearphishing campaigns. These actors set up operational infrastructure to obfuscate their source infrastructure, host domains and malware for targeting organizations, establish command and control nodes, and harvest credentials and other valuable information from their targets.

In summer 2015, an APT29 spearphishing campaign directed emails containing a malicious link to over 1,000 recipients, including multiple U.S. Government victims. APT29 used legitimate domains, to include domains associated with U.S. organizations and educational institutions, to host malware and send spearphishing emails. In the course of that campaign, APT29 successfully compromised a U.S. political party. At least one targeted individual activated links to malware hosted on operational infrastructure of opened attachments containing malware. APT29 delivered malware to the political party’s systems, established persistence, escalated privileges, enumerated active directory accounts, and exfiltrated email from several accounts through encrypted connections back through operational infrastructure.

In spring 2016, APT28 compromised the same political party, again via targeted spearphishing. This time, the spearphishing email tricked recipients into changing their passwords through a fake webmail domain hosted on APT28 operational infrastructure. Using the harvested credentials, APT28 was able to gain access and steal content, likely leading to the exfiltration of information from multiple senior party members. The U.S. Government assesses that information was leaked to the press and publicly disclosed.



 
NPR's IT department said it was the Russians. That settles it right?
See? This tard SKIMMED the post. I told ya!

NPR's IT department said it could be a false flag. NPR's IT department is headquartered in Moscow. Which figures, right? :D

The cybersecurity expert explained in detail how it could NOT be a false flag.

READ! For chrissakes.

I read the whole thing Ricky Retardo. The Cyber Experts said the Russians "accidentally" hacked the election
Nope. Goddam you have reading comprehension almost as shitty as UC's!

The expert said the Russians were discovered because they made an accidental mistake. They used the same URL shortening service for a thousand other hacks. "They look for efficiencies".

Fake news all reads alike

What fake news? Every fucking site and news source? NPR which is sponsored by a Russian based cyber-security firm had the guy on it that said it WAS the Russians...
 
They followed it back to the Russians LOL

Russian hackers haven't figured out how to use multiple proxies, but they hacked Hillary, Podesta, the DNC and the US election

 
NPR's IT department said it was the Russians. That settles it right?
See? This tard SKIMMED the post. I told ya!

NPR's IT department said it could be a false flag. NPR's IT department is headquartered in Moscow. Which figures, right? :D

The cybersecurity expert explained in detail how it could NOT be a false flag.

READ! For chrissakes.

I read the whole thing Ricky Retardo. The Cyber Experts said the Russians "accidentally" hacked the election
Nope. Goddam you have reading comprehension almost as shitty as UC's!

The expert said the Russians were discovered because they made an accidental mistake. They used the same URL shortening service for a thousand other hacks. "They look for efficiencies".

CrowdStrike also watched where the malware in the DNC servers sent the information back to... they followed the trail back to the Russians.
Exactly.
 
[


Why do you even post in these threads if you don't read or watch the evidence provided for you? Why do you post in these threads if you have your mind made up and won't even consider evidence provided for you?

Most information comes from legitimate news sources (or at least the NYT, WaPo, et al) rather than hate sites like KOS.

I run a business, I have a responsibility to block hate sites. I block porn as well.

Video is too often abused, so I block that as well.
 
NPR's IT department said it was the Russians. That settles it right?
See? This tard SKIMMED the post. I told ya!

NPR's IT department said it could be a false flag. NPR's IT department is headquartered in Moscow. Which figures, right? :D

The cybersecurity expert explained in detail how it could NOT be a false flag.

READ! For chrissakes.

I read the whole thing Ricky Retardo. The Cyber Experts said the Russians "accidentally" hacked the election
Nope. Goddam you have reading comprehension almost as shitty as UC's!

The expert said the Russians were discovered because they made an accidental mistake. They used the same URL shortening service for a thousand other hacks. "They look for efficiencies".

Fake news all reads alike

What fake news? Every fucking site and news source? NPR which is sponsored by a Russian based cyber-security firm had the guy on it that said it WAS the Russians...

Right.

And that guy went in not believing it was the Russians.

He studied the evidence with the intent of proving it was not the Russians.

But the evidence removed all doubt from his mind that it was the Russians.
 
They followed it back to the Russians LOL

Russian hackers haven't figured out how to use multiple proxies, but they hacked Hillary, Podesta, the DNC and the US election
Read the WHOLE posts, willfully blind monkey.

The expert was asked about that.
 
See? This tard SKIMMED the post. I told ya!

NPR's IT department said it could be a false flag. NPR's IT department is headquartered in Moscow. Which figures, right? :D

The cybersecurity expert explained in detail how it could NOT be a false flag.

READ! For chrissakes.

I read the whole thing Ricky Retardo. The Cyber Experts said the Russians "accidentally" hacked the election
Nope. Goddam you have reading comprehension almost as shitty as UC's!

The expert said the Russians were discovered because they made an accidental mistake. They used the same URL shortening service for a thousand other hacks. "They look for efficiencies".

Fake news all reads alike

What fake news? Every fucking site and news source? NPR which is sponsored by a Russian based cyber-security firm had the guy on it that said it WAS the Russians...

Right.

And that guy went in not believing it was the Russians.

He studied the evidence with the intent of proving it was not the Russians.

But the evidence removed all doubt from his mind that it was the Russians.

Exactly, he wanted to prove CrowdStrike wrong... they are a competitor to his company.
 
The part I bolded is the Podesta hack:

The U.S. Government confirms that two different RIS actors participated in the intrusion into a U.S. political party. The first actor group, known as Advanced Persistent Threat (APT) 29, entered into the party’s systems in summer 2015, while the second, known as APT28, entered in spring 2016.

Both groups have historically targeted government organizations, think tanks, universities, and corporations around the world. APT29 has been observed crafting targeted spearphishing campaigns leveraging web links to a malicious dropper; once executed, the code delivers Remote Access Tools (RATs) and evades detection using a range of techniques. APT28 is known for leveraging domains that closely mimic those of targeted organizations and tricking potential victims into entering legitimate credentials. APT28 actors relied heavily on shortened URLs in their spearphishing email campaigns. Once APT28 and APT29 have access to victims, both groups exfiltrate and analyze information to gain intelligence value. These groups use this information to craft highly targeted spearphishing campaigns. These actors set up operational infrastructure to obfuscate their source infrastructure, host domains and malware for targeting organizations, establish command and control nodes, and harvest credentials and other valuable information from their targets.

In summer 2015, an APT29 spearphishing campaign directed emails containing a malicious link to over 1,000 recipients, including multiple U.S. Government victims. APT29 used legitimate domains, to include domains associated with U.S. organizations and educational institutions, to host malware and send spearphishing emails. In the course of that campaign, APT29 successfully compromised a U.S. political party. At least one targeted individual activated links to malware hosted on operational infrastructure of opened attachments containing malware. APT29 delivered malware to the political party’s systems, established persistence, escalated privileges, enumerated active directory accounts, and exfiltrated email from several accounts through encrypted connections back through operational infrastructure.

In spring 2016, APT28 compromised the same political party, again via targeted spearphishing. This time, the spearphishing email tricked recipients into changing their passwords through a fake webmail domain hosted on APT28 operational infrastructure. Using the harvested credentials, APT28 was able to gain access and steal content, likely leading to the exfiltration of information from multiple senior party members. The U.S. Government assesses that information was leaked to the press and publicly disclosed.


so curious, it states the summer of 2015 right? why is this news today and it wasn't then? hmmmmmm?
 
I read the whole thing Ricky Retardo. The Cyber Experts said the Russians "accidentally" hacked the election
Nope. Goddam you have reading comprehension almost as shitty as UC's!

The expert said the Russians were discovered because they made an accidental mistake. They used the same URL shortening service for a thousand other hacks. "They look for efficiencies".

Fake news all reads alike

What fake news? Every fucking site and news source? NPR which is sponsored by a Russian based cyber-security firm had the guy on it that said it WAS the Russians...

Right.

And that guy went in not believing it was the Russians.

He studied the evidence with the intent of proving it was not the Russians.

But the evidence removed all doubt from his mind that it was the Russians.

Exactly, he wanted to prove CrowdStrike wrong... they are a competitor to his company.
:dig:
 
The part I bolded is the Podesta hack:

The U.S. Government confirms that two different RIS actors participated in the intrusion into a U.S. political party. The first actor group, known as Advanced Persistent Threat (APT) 29, entered into the party’s systems in summer 2015, while the second, known as APT28, entered in spring 2016.

Both groups have historically targeted government organizations, think tanks, universities, and corporations around the world. APT29 has been observed crafting targeted spearphishing campaigns leveraging web links to a malicious dropper; once executed, the code delivers Remote Access Tools (RATs) and evades detection using a range of techniques. APT28 is known for leveraging domains that closely mimic those of targeted organizations and tricking potential victims into entering legitimate credentials. APT28 actors relied heavily on shortened URLs in their spearphishing email campaigns. Once APT28 and APT29 have access to victims, both groups exfiltrate and analyze information to gain intelligence value. These groups use this information to craft highly targeted spearphishing campaigns. These actors set up operational infrastructure to obfuscate their source infrastructure, host domains and malware for targeting organizations, establish command and control nodes, and harvest credentials and other valuable information from their targets.

In summer 2015, an APT29 spearphishing campaign directed emails containing a malicious link to over 1,000 recipients, including multiple U.S. Government victims. APT29 used legitimate domains, to include domains associated with U.S. organizations and educational institutions, to host malware and send spearphishing emails. In the course of that campaign, APT29 successfully compromised a U.S. political party. At least one targeted individual activated links to malware hosted on operational infrastructure of opened attachments containing malware. APT29 delivered malware to the political party’s systems, established persistence, escalated privileges, enumerated active directory accounts, and exfiltrated email from several accounts through encrypted connections back through operational infrastructure.

In spring 2016, APT28 compromised the same political party, again via targeted spearphishing. This time, the spearphishing email tricked recipients into changing their passwords through a fake webmail domain hosted on APT28 operational infrastructure. Using the harvested credentials, APT28 was able to gain access and steal content, likely leading to the exfiltration of information from multiple senior party members. The U.S. Government assesses that information was leaked to the press and publicly disclosed.



And?

Still no evidence of hacking our election systems.

We KNOW that moron Podesta got hacked, we read his emails - which exposed what corrupt scum you democrats are.

But John Podesta is not the election system, neither is your filthy party, though you believe the party to be all.
 
Trump's ego can't handle that he was helped by a hostile foreign power.

That's what all this denial is about. The monkeys are just being obedient slaves to whatever their master tweets.
 
The part I bolded is the Podesta hack:

The U.S. Government confirms that two different RIS actors participated in the intrusion into a U.S. political party. The first actor group, known as Advanced Persistent Threat (APT) 29, entered into the party’s systems in summer 2015, while the second, known as APT28, entered in spring 2016.

Both groups have historically targeted government organizations, think tanks, universities, and corporations around the world. APT29 has been observed crafting targeted spearphishing campaigns leveraging web links to a malicious dropper; once executed, the code delivers Remote Access Tools (RATs) and evades detection using a range of techniques. APT28 is known for leveraging domains that closely mimic those of targeted organizations and tricking potential victims into entering legitimate credentials. APT28 actors relied heavily on shortened URLs in their spearphishing email campaigns. Once APT28 and APT29 have access to victims, both groups exfiltrate and analyze information to gain intelligence value. These groups use this information to craft highly targeted spearphishing campaigns. These actors set up operational infrastructure to obfuscate their source infrastructure, host domains and malware for targeting organizations, establish command and control nodes, and harvest credentials and other valuable information from their targets.

In summer 2015, an APT29 spearphishing campaign directed emails containing a malicious link to over 1,000 recipients, including multiple U.S. Government victims. APT29 used legitimate domains, to include domains associated with U.S. organizations and educational institutions, to host malware and send spearphishing emails. In the course of that campaign, APT29 successfully compromised a U.S. political party. At least one targeted individual activated links to malware hosted on operational infrastructure of opened attachments containing malware. APT29 delivered malware to the political party’s systems, established persistence, escalated privileges, enumerated active directory accounts, and exfiltrated email from several accounts through encrypted connections back through operational infrastructure.

In spring 2016, APT28 compromised the same political party, again via targeted spearphishing. This time, the spearphishing email tricked recipients into changing their passwords through a fake webmail domain hosted on APT28 operational infrastructure. Using the harvested credentials, APT28 was able to gain access and steal content, likely leading to the exfiltration of information from multiple senior party members. The U.S. Government assesses that information was leaked to the press and publicly disclosed.



And?

Still no evidence of hacking our election systems.
Wow. Just...wow.

You didn't read it, did you. Or else you are not capable of understanding it.

I have no idea why I waste my time with you.
 
Again, tell us what the Russians, by hacking a private organization, did t hat gave Trump a "leg up"?

The Watergate criminals didn't give Nixon a leg up. That's not the point.

Uhm, can you read? That is exactly what he said. His words, not mine. OK then, lets try this again, let's assume for the sake of argument the Russians did hack the DNC. OK, that sucks. But how in anyway did this affect the election?

So you're trying to say that no Trump supporters were happy that the hacked emails were publicized, because no Trump supporters thought they might harm the Hillary campaign?

Are you insane?

Dude, so what was in them that was so damning she lost? If there was anything that damning, then why would you want her as President?

And no, I am not insane.
The tards were dancing in the streets over the leaked emails. "Stick a fork in her!" "Hitlery is toast!"

Now they are claiming the leaks didn't help Trump get elected. Which is an open admission that deep in their hearts they know Russia was behind the leaks.
you still don't get it. It validated everything everyone already thought and tried to tell everyone!!!! Duhhhhhhhh
 
Trump's ego can't handle that he was helped by a hostile foreign power.

That's what all this denial is about. The monkeys are just being obedient slaves to whatever their master tweets.
and your stupidity won't allow you to understand that you have no evidence. but hey? it's a fking message board.
 
But John Podesta is not the election system, neither is your filthy party, though you believe the party to be all.
I am a Republican, and always have been. Liar.

You just lie and lie and lie. Sociopath.
 

Forum List

Back
Top