

Perkins Coie, the law firm representing the Democratic Party and Hillary 4 America, hires research and strategic intelligence firm Fusion GPS, with the objective of finding dirt on Trump. From this, we can conclude that the contents of Podesta’s inbox were forged shortly after he received the phishing mail. The emails are dated until March 21, 2016. WikiLeaks publishes his emails in October 2016 (These are the Podesta-mails, not the DNC-mails). John Podesta, chairman of the Hillary Clinton Campaign, receives a phishing mail. WikiLeaks obtained these emails from the US State Department through a Freedom of Information Act request. WikiLeaks publishes the Hillary Clinton Email Archive: tens of thousands of emails and attachments from Clinton’s private server, which she used during her time as Secretary of State. The database is not accessible to the public. SecureWorks shared the bit.ly-database with Associated Press. This because there are many Russian enemies among the receivers, such as critical journalists, a Pussy Riot singer, targets in Ukraine, and companies specialising in defence, such as Boeing and Lockheed in the US. They studied the 19.000 accounts to which the phishing mails were sent and concluded that Fancy Bear must have been behind the phishing mails.


We know this, because cybersecurity company SecureWorks gained access to Fancy Bear’s bit.ly-account. This time the mails are also sent employees of the DCCC, the Clinton Foundation and members of the Republican Party. In the following weeks Fancy Bear continues to send out phishing mails. If the receiver fills in its username and password, Fancy Bear gains access to them. The phishing mails contain a link to a page that looks like the Gmail login page. According a number of cybersecurity companies Fancy Bear can be linked to Russian intelligence agency GRU. Russian hacker group Fancy Bear starts sending out phishing mails to employees working for the Hillary Clinton Campaign.
