Security

Cyber-crime

Iran's cyber-goons emailed stolen Trump info to Team Biden – which ignored them

To be fair, Joe was probably taking a nap


The Iranian cyber snoops who stole files from the Trump campaign, with the intention of leaking those documents, tried to slip the data to the Biden camp — but were apparently ignored, according to Uncle Sam.

In the ongoing saga of that IT compromise, in which Tehran swiped info belonging to the campaign of Republican presidential candidate Donald Trump, the Feds disclosed that the data thieves "sent unsolicited emails to individuals then associated with President Biden's campaign."

This was in late June and early July, before Biden dropped out of the race and the Democratic Party nominated VP Kamala Harris to be its presidential candidate. 

Iran sent emails to Team Biden that "contained an excerpt taken from stolen, non-public material from former President Trump's campaign as text," according to a joint advisory from the Office of the Director of National Intelligence (ODNI), the FBI, and CISA.

However, the American agencies noted: "There is currently no information indicating those recipients replied."

In early August, Microsoft published a report claiming Iranian miscreants sent spear-phishing emails to "a high-ranking official of a presidential campaign" using a "compromised email account of a former senior advisor."

Trump advisor and confidant Roger Stone was reportedly one of the targets, and told the Washington Post his personal email accounts had been compromised.

Later in August, the Feds said Tehran pilfered the Trump campaign's data.

The ultimate goal of the Iranian operation was "to stoke discord and undermine confidence in our electoral process," we're told. Plus, in the lead up to the November presidential election, Russia and China are also trying to "exacerbate divisions in US society for their own benefit, and see election periods as moments of vulnerability," the Feds noted Wednesday.

The Trump campaign leaks advisory follows a write-up by Microsoft, published earlier this week, saying that the Kremlin's troll farms are working overtime to ensure Trump defeats Harris in November. 

To this end, two Moscow-aligned groups began pumping out phony video content "designed to discredit Harris and stoke controversy around her campaign," according to Redmond's threat intelligence team. ®

Send us news
50 Comments

Wanted. Top infosec pros willing to defend Britain on shabby salaries

GCHQ job ads seek top talent with bottom-end pay packets

Just how private is Apple's Private Cloud Compute? You can test it to find out

Also updates bug bounty program with $1M payout

Five Eyes nations tell tech startups to take infosec seriously. Again

Only took 'em a year to dish up some scary travel advice, and a Secure Innovation … Placemat?

The billionaire behind Trump's 'unhackable' phone is on a mission to fight Tesla's FSD

Dan O'Dowd tells El Reg about the OS secrets and ongoing clash with Musk

Windows Themes zero-day bug exposes users to NTLM credential theft

Plus a free micropatch until Redmond fixes the flaw

Sophos to snatch Secureworks in $859M buyout: Why fight when you can just buy?

Private equity giant Thoma Bravo adds another trophy to its growing collection

Millions of Android and iOS users at risk from hardcoded creds in popular apps

Azure Blob Storage, AWS, and Twilio keys all up for grabs

Beijing claims it's found 'underwater lighthouses' that its foes use for espionage

Release the Kraken!

Uncle Sam outs a Russian accused of developing Redline infostealing malware

Or: why using the same iCloud account for malware development and gaming is a bad idea

Feds investigate China's Salt Typhoon amid campaign phone hacks

'They're taunting us,' investigator says and it looks like it's working

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Attacks on unprotected servers reach 'critical level'

Merde! Macron's bodyguards reveal his location by sharing Strava data

It's not just the French president, Biden and Putin also reportedly trackable