Its fine with you that a foreign country meddled in our elections?? Wtf
So why didn't Podesta even utilise the most basic Internet security?
What allowed the hackers to target Podesta was a single email from the thousands WikiLeaks has published in the past week. In that May 16, 2015, correspondence between Podesta and Eryn Sepp, his former special assistant at the White House, Podesta asked whether Sepp knew his Apple ID, which would allow access to his Apple accounts and devices.
“I do,” she responded, listing his Gmail address and his password: Runner4567.
Within minutes of the posting of that batch of WikiLeaks emails Wednesday, Anonymous activists began exchanging queries. At 5:36 p.m. Germany time, one activist posted: “CAN we DO SOMetHING WITH AN APPLE ID?”
Moments later, another Anonymous hacker with the moniker 4Chan “had found Podesta’s Apple creds and logged in for first time,” Tait tweeted.
[
https://pbs][
https://pbs]
*Follow
[
https://pbs]Pwn All The Things*@pwnallthethings
Took about ~25 minutes from WL posting "part 5" emails before 4Chan had found Podesta's Apple creds and logged in for first time fyi.
7:21 PM - 13 Oct 2016
*
*5959 Retweets*
*5151 likes
Less than two hours later, a hacker with the collective wrote: “GUYS I FUCKING REQUESTED PASSWORD RESET FROM TWITTER FOR JOHN PODESTA.”
Another hacker posted below that, “IF ANYONE IS ACCESSING HIS EMAILS, YOU WILL BE ABLE TO SHITPOST ON HIS TWITTER.”
Later Wednesday evening, as Clinton landed in Las Vegas for a campaign event, a hacker got into Podesta’s Twitter account and tweeted in his name: “I’ve switched teams. Vote Trump 2016. Hi pol.”
*Follow
[
https://pbs]Pwn All The Things*@pwnallthethings
Apparently some asshole from anonymous compromised Podesta's Apple account using creds in WL dump and remotely wiped his phone. V cruel.
4:18 PM - 13 Oct 2016
*
*194194 Retweets*
*230230 likes
Neither Podesta nor a spokesman for the Clinton campaign, Josh Schwerin, responded to emails asking for confirmation of the data loss.
Podesta, 67, is no innocent when it comes to security matters. A Georgetown University-educated lawyer, he served as the chief of staff to President Bill Clinton in the 1990s and as counselor to President Barack Obama in 2014 and 2015.
Apple allows a user who controls an account to remotely wipe clean any of his or her devices that may have been stolen or fallen into the wrong hands.
The Clinton campaign has protested the hack of some 20,000 internal emails from the Democratic National Committee as the handiwork of Russian government-backed hackers, an accusation that U.S. intelligence agencies supported last Friday. Those emails, along with Podesta’s personal emails, found their way into the hands of WikiLeaks.
*Follow
[
https://pbs]Christopher Soghoian*@csoghoian
The woeful personal cybersecurity of senior policy makers in DC isn't a joke. It is a major national security problem.*
https://twitter.com/csoghoian/status/786653857057300481*…
8:46 PM - 13 Oct 2016
*
*9999 Retweets*
*105105 likes
But Podesta’s travails Thursday did not come at the hands of sophisticated Russian state hackers. Rather, Podesta himself was apparently lax on basic computer security measures.
Like many computer users, he apparently did not use even minimal measures to thwart hackers, such as employing distinct passwords for different accounts or using two-step authentication, an extra layer of security in which a user receives an additional code as a mobile phone text message or by other means that is required before successfully logging on.
Security experts say reusing passwords facilitates the work of hackers.
“Every time you reuse that password somewhere else, its value drops 50 percent,” said Joe Siegrist, vice president of LastPass, a password management product of Logmein.com, a Boston-headquartered software and cloud management company.
Tim Johnson:*202-383-6028,*@timjohnson4
http://www.mcclatchydc.com/news/politics-government/election/article108086007.html
Sent from my Lenovo K52e78 using Tapatalk