Skip to Content
Uncategorized

Hacker Whose Tools Were Used in DNC Hack Steps Forward

August 16, 2017

A Ukrainian hacker called "Profexer" who built one of the tools used to penetrate the Democratic National Committee servers last year has turned himself in to authorities. According to a report today in the New York Times, the man, who first contacted Ukranian police earlier this year, claims he wrote a piece of software called the PAS Web shell, which the Department of Homeland Security has identified as malware used in the hack.

But the hacker maintains that he wasn't behind the attack, which resulted in the release of thousands of e-mails sent by DNC staffers in the thick of last year's U.S. presidential election season. “He told us he didn’t create it to be used in the way it was,” the chief of the Ukrainian Cyber Police, Serhiy Demediuk, told the Times. Because there is no evidence that he used the tool to carry out the attack, he wasn't arrested.

Profexer is now in touch with the FBI, and the big question is how the information he provides squares with the overwhelming consensus in the U.S. intelligence community that Russian operatives were behind the attack—in particular a government-run hacking group known as Fancy Bear. According to the Times report, Profexer was able to identify users involved in the DNC hack by their online handles (the full article is riveting, by the way, and also covers some of Russia's history of using Ukraine as a lab for honing its tactics in cyberattacks). 

Whether that will lead to finally unmasking members of Fancy Bear—a feat that has thus far eluded authorities and tech companies alike—remains to be seen. But it's a huge break in the case, and a striking window into the importance of cyber-operations in modern-day statecraft.

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

OpenAI teases an amazing new generative video model called Sora

The firm is sharing Sora with a small group of safety testers but the rest of us will have to wait to learn more.

Google’s Gemini is now in everything. Here’s how you can try it out.

Gmail, Docs, and more will now come with Gemini baked in. But Europeans will have to wait before they can download the app.

This baby with a head camera helped teach an AI how kids learn language

A neural network trained on the experiences of a single young child managed to learn one of the core components of language: how to match words to the objects they represent.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.