In-depth

Online attack 'disrupted Clinton Campaign's phone-dialling software'

Advocacy group says cyber attack disturbed Clinton 'go vote' calls

Hillary Clinton's campaign operations were disrupted by a cyber attack on the eve of the US presidential election, it has been claimed.

The news comes from NextGen Climate, an advocacy group supporting Clinton. Suzanne Henkels, spokeswoman for the group, told the Wall Street Journal that NextGen Climate experienced problems with its phone-dialling software on Monday.

This, she said, had been caused by an online attack that hit TCN, the company providing the phone-dialling services used by NextGen Climate.

This was confirmed by TCN, who told The Wall Street Journal that the issue had lasted about an hour, starting at 2.35pm on Monday.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The attacks started on Sunday night and continued for 24 hours, but they affected the web-based software the following day.

An anonymous post on the 4chan message board, written by a user who called himself Sparky, said the writer had planned to use a version of the Mirai botnet to attack TCN and create problems for Clinton's campaign. It is unclear whether the person who wrote this post was the one that conducted the attack.

In an interview with Wired, Jesse Bird, TCN's chief technology officer, said: "The ironic thing is that they were probably impacting Republican calls just as much as Democrat calls."

Bird said that the attack was not targeted at specific organisations, as TCN provides services for around 2,000 clients, including ones affiliated with the conservative party.

Mirai malware acts by taking over a number of IoT devices and using them to flood other computers by flooding them with data. It was the same malware involved in last month's attack that affected websites such as Spotify and Twitter.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

23 Dec 2019
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/hardware/354584/windows-10-and-the-tools-for-agile-working
Sponsored

Windows 10 and the tools for agile working

20 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020