Le Monde: Evidence of Russian interference in Macron's 2017 campaign

09 December 2019, 17:42 | Policy
photo glavnoe.ua
Text Size:

Within one month after another, fragments of the MacronLeaks puzzle began to appear and collect.

More than two years after the hacking aimed at the election campaign of Emmanuel Macron in 2017, as a result of which the content of many emails appeared public just before the second round of the presidential election, new evidence surfaced.

For the first time, Le Monde’s technical data published over the weekend confirms the coordinated intervention of two Russian state-owned hacker groups attempting to destabilize the presidential election.. At that time, the candidate’s entourage condemned the “form of interference”.

" We were able to familiarize ourselves with the slides that they created for this demonstration: they feature unpublished information about the deployment and artists of MacronLeaks, "

" This company, less well-known to the general public, also specializes in hunting the most advanced hackers. It has spent the past few years analyzing the structure of the military order of the Russian state in cyberspace, "

" Two highly specialized units associated with the GRU’s Russian military intelligence service attacked e-mail inboxes of the future president of the Republic, "

" The first group of hackers, well known to industry experts, code-named APT28, began sending out emails designed to trap targets in order to steal their credentials and passwords, ”the journalist points out.

"

“It is now known that the APT28 group merged with GRU 26 165, several members of which were accused, in particular by American justice, of hacking Hillary Clinton’s correspondence during the election campaign so that these emails would be known to the general public through WikiLeaks. This procedure is very close to what happened in France shortly before the second round of the presidential election, "

" According to them, this group managed to hack into individual targets related to the campaign of Emmanuel Macron. And yet their customer, apparently, was unhappy. About a month later, in mid-April, a different group appeared on the scene, different from the first, while unit 26 165 ceased its offensive, "

" FireEye, which also tracked their activities, is less categorical, but nonetheless, and it confirms that this group is directly related to the Russian state. This hacker group, which has been operating for several years, owes its name to the "

" According to him, “Sandworm is a more specialized group designed to intervene in high-risk operations, especially when time runs out,” he explained to Le Monde.

\! An increasing number of experts and special services believe that GRU members are also hiding behind Sandworm. According to some sources, this may be a lesser-known unit of 74,455, traditionally working in conjunction with 26,165, "

“Sandworm and FancyBear [another technical name APT28] are two sides of the same coin,” Matonis explains. In addition, FireEye has discovered technical links between a computer attack versus a move.!

"

" Moreover, in one of the documents published by the pirates, the name of the alleged member of the unit 26 165 was hidden, probably it was a question of incorrect disguise. However, the evidence put forward by Google and FireEye suggests that the election campaign of Emmanuel Macron was not targeted by isolated hackers, but by election manipulation professionals, "

" Despite the lack of scandalous information, a mere mention of the leak to the general public implies that the victim has something to hide, this alone may be enough to change his mind, "




Add a comment
:D :lol: :-) ;-) 8) :-| :-* :oops: :sad: :cry: :o :-? :-x :eek: :zzz :P :roll: :sigh:
 Enter the correct answer