ShareThis Page
Political Headlines

At least 195 Trump web addresses found to have been hijacked by hackers

| Saturday, Nov. 4, 2017, 8:42 p.m.
At least 195 web addresses belonging to Trump, his family or his business empire were hijacked by hackers possibly operating out of Russia, The Associated Press has learned.
At least 195 web addresses belonging to Trump, his family or his business empire were hijacked by hackers possibly operating out of Russia, The Associated Press has learned.

WASHINGTON — Four years ago, well before the furor over allegations Moscow meddled in the 2016 election that put Donald Trump in the White House, at least 195 web addresses belonging to Trump, his family or his business empire were hijacked by hackers possibly operating out of Russia, The Associated Press has learned.

The Trump Organization denied the domain names were ever compromised. But a review of internet records by the AP and cybersecurity experts shows otherwise. And it was not until this past week, after the Trump camp was asked about it by the AP, that the last of the tampered-with addresses were repaired.

After the hack, computer users who visited the Trump-related addresses were unwittingly redirected to servers in St. Petersburg, Russia, that cybersecurity experts said contained malicious software commonly used to steal passwords or hold files for ransom. Whether anyone fell victim to such tactics is unclear.

A further mystery is who the hackers were and why they did it.

The discovery represents a new twist in the Russian hacking story, which up to now has focused mostly on what U.S. intelligence officials say was a campaign by the Kremlin to try to undermine Democrat Hillary Clinton's candidacy and benefit Trump's.

It is not known whether the hackers who tampered with the Trump addresses are the same ones who stole Democratic officials' emails and embarrassed the party in the heat of the campaign last year. Nor is it clear whether the hackers were acting on behalf of the Russian government.

The affected addresses, or domain names, included donaldtrump.org, donaldtrumpexecutiveoffice.com, donaldtrumprealty.com and barrontrump.com. They were compromised in two waves of attacks in August and September 2013, according to the review of internet records.

The attacks took place as Trump was preparing to travel to Moscow for the Miss Universe pageant, which was held on Nov. 9, 2013, at a property owned by a wealthy Russian real estate developer.

Many of the addresses were not being used by Trump. Businesses and public figures commonly buy addresses for possible future use or to prevent them from falling into the hands of rivals or enemies. The Trump Organization and its affiliates own at least 3,300 in all.

According to security experts, the hackers hijacked the addresses by penetrating and altering the domain registration records housed at GoDaddy.com, a seller of web addresses.

Accounts at GoDaddy, like at any site that requires a user name and password, are often subject to malicious messages known as phishing attacks, which are designed to trick people to reveal that personal information to hackers.

Computer users who entered or clicked on one of those Trump addresses probably would have had no idea they were redirected to servers in Russia.

Within days after the AP asked the Trump Organization about the tampering, the affected web addresses were all corrected.

The White House referred questions to the Trump Organization. The FBI did not respond to a request for comment.

GoDaddy spokesman Nick Fuller said the company had no breaches of its system in 2013 and has measures in place to monitor for malicious activity. Fuller would not discuss any customers in particular.

Some cybersecurity experts said there is an outside chance the tampering was a probe — an attempt to test security for an eventual effort to gather information on Trump or his business dealings. But those experts were only guessing.

There was no evidence the hackers ultimately broke into server computers at the Trump Organization or other Trump interests.

“This is beyond me,” said Paul Vixie, CEO of the San Mateo, Calif.-based internet security company Farsight Security Inc. “I have simply never seen a benefit accrue from an attack of this kind. I'm at loss, unless it's a demonstration of capabilities.”

Vixie said the Trump Organization's apparent failure to detect what was happening probably suggests inadequate cybersecurity at the company.

“There's no way something like this could go by in the Bloomberg empire without this being seen,” Vixie said.

TribLIVE commenting policy

You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service.

We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.

While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.

We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers

We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.

We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.

We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.

We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.

click me