US CISA, FBI, and CNMF cybersecurity experts: APT employs common social engineering tactics, spearphishing, and watering hole attacks to exfiltrate information.
Russia has its “WikiLeaks” affair: it’s the activists site Distributed Denial of Secrets (DDOS), that published a compilation of hundreds of thousands hacked emails and gigabytes of leaked documents coming from Moscow and allies key figures
Russia has its “WikiLeaks”: it’s called Distributed Denial of Secrets (DDOS), and it’s an activists site recently born. It has published a compilation of hundreds of thousands of hacked emails and gigabytes of leaked documents. Inside it, there are emails, Skype and Facebook messages, along with lots of files by politicians, journalists, bankers, oligarchs, religious figures, nationalists and separatists. Hacker groups like Shaltai Boltai, Ukrainian Cyber Alliance, and CyberHunta have been penetrating and exposing Russian secrets for years. Then, DDOS started publishing batches of archives until arriving to the Russia Collection. Obviously the Kremlin denounced the leak as a fake, but several independent forensics examiners analyzed the collection and agreed the files were real. Moreover, the big archive could not be the only one. DDOS posted on it’s Twitter page that “We’ll be responding to messages and issuing an update ASAP. (A lot’s happening)”.
What is DDOS and which is its mission
Distributed Denial of Secrets is a transparency collective, aimed at enabling the free transmission of data in the public interest. According to their site, “We aim to avoid any political, corporate or personal leanings, and to act as a simple beacon of available information. As a collective, we do not support any cause, idea or message beyond ensuring that information is available to those who need it most – the people. While we are happy to serve as an index to data of all varities, all much meet the following two criteria: Is the data of public interest? Can a prima facie case be made for the veracity of the contents? Unless already public, or as authorized by our source, we do not disclose the providing party of any received information, and we are fully commited to ensuring their anonymity from all threats”. Often DDOS role is also “to act as a anonymity guard to pass data to journalists and other figures best positioned to interrogate it”.