Profile picture
Buster Hyde USMC/Ret @BusterUSMC
, 16 tweets, 3 min read Read on Twitter
From DNC Lawsuit:
Russia’s cyberattack on DNC began only wks after Trump announced his candidacy for @POTUS in June of 2015.
The IC Report concluded: “In July 2015, Russian Intelligence gained access to Democratic National Committee (DNC) networks and maintained that access until at least June 2016”. [Actual date was determined to be “since at least July 27, 2015”]
In April 2016, another set of Russian Intelligence Agents successfully hacked into the DNC. wired.com/story/dnc-laws… On April 18, 2016, Russia launched a second phase of its cyberattack on DNC servers located in Virginia and Washington DC. This attack was executed by GRU agents.
On April 22, 2016, Russian intelligence prepared massive amounts of data for exfiltration from DNC servers.
On April 28, 2016, DNC IT Staff detected and ultimately confirmed access to the DNC network by unauthorized users. Upon discovering the intrusion, the DNC contacted Crowdstrike Services.
By June 2016, Russia had stolen thousands of DNC documents and emails.
On June 15, 2016, GRU Operative #1 (Guccifer 2.0 thedailybeast.com/exclusive-lone… ) widely disseminated a trove of stolen documents to the public, claiming they were DNC material. guccifer2.wordpress.com/2016/06/15/dnc/
On June 21, 2016, GRU Operative #1 (Guccifer 2.0) released a batch of stolen DNC documents about Secretary Clinton.
On June 30, 2016, GRU Operative #1 (Guccifer 2.0) released stolen DNC documents to the public, including research on Republican candidates and Secretary Clinton.
On July 6, 2016, GRU Operative #1 (Guccifer 2.0) released stolen DNC documents, including DNC strategy documents related to the DNC’s “counter-convention” to the RNC convention.
On July 22, 2016, WikiLeaks began disseminating stolen DNC documents, including emails and other sensitive proprietary documents, to the public.
On October 7, 2016, WikiLeaks began releasing batches of Podesta’s emails on a near-daily basis until Election Day.
From June 2016 to October 2016, the GRU and GRU Operative #1, through the online persona “Guccifer 2.0” systematically released stolen documents from the DNC on a regular basis.
Both Crowdstrike’s forensic analysis and the U.S. Government concluded that the DNC’s computer systems had been hacked by two independent, sophisticated state-sponsored adversaries.
The forensic analysts tracked the hacking activities of these adversaries by assigning them code names: “Cozy Bear” & “Fancy Bear,” which corresponds to the more widely used names Advanced Persistent Threat 29 (APT 29) & Advanced Persistent Threat 28 (APT 28), respectively.
The IC Report concluded that “Fancy Bear” was acting as an agent of the GRU.

Forensic analysis found evidence that Cozy Bear had infiltrated & remained present in the DNC’s network since at least July 27, 2015.
The DNC first detected the infiltration of the GRU, or “Fancy Bear”, in its network on April 28, 2016.
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Buster Hyde USMC/Ret
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($3.00/month or $30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!