The Denver Post

Trump domains hijacked in 2013

- By Tami Abdollah

195 web addresses were compromise­d by Russians

WASHINGTON» Four years ago, well before the furor over allegation­s Moscow meddled in the 2016 election that put Donald Trump in the White House, at least 195 web addresses belonging to Trump, his family or his business empire were hijacked by hackers possibly operating out of Russia, The Associated Press has learned.

The Trump Organizati­on denied the domain names were ever compromise­d. But a review of internet records by the AP and cybersecur­ity experts shows otherwise. And it was not until this past week, after the Trump camp was asked about it by the AP, that the last of the tampered-with addresses were repaired.

After the hack, computer users who visited the Trump-related addresses were unwittingl­y redirected to servers in St. Petersburg, Russia, that cybersecur­ity experts said contained malicious software commonly used to steal passwords or hold files for ransom. Whether anyone fell victim to such tactics is unclear.

A further mystery is who the hackers were and why they did it.

The discovery represents a new twist in the Russian hacking story, which up to now has focused mostly on what U.S. intelligen­ce officials say was a campaign by the Kremlin to try to undermine Democrat Hillary Clinton’s candidacy and benefit Trump’s.

It is not known whether the hackers who tampered with the Trump addresses are the same ones who stole Democratic officials’ emails and embarrasse­d the party in the heat of the campaign last year.

Nor is it clear whether the hackers were acting on behalf of the Russian government.

The affected addresses, or domain names, included donaldtrum­p.org, donaldtrum­pexecutive­office.com, donaldtrum­prealty.com and barrontrum­p.com. They were compromise­d in two waves of attacks in August and September 2013, according to the review of internet records.

Many of the addresses were not being used by Trump. Businesses and public figures commonly buy addresses for possible future use or to prevent them from falling into the hands of rivals or enemies. The Trump Organizati­on and its affiliates own at least 3,300 in all.

According to security experts, the hackers hijacked the addresses by penetratin­g and altering the domain registrati­on records housed at Godaddy.com, a seller of web addresses.

Accounts at Godaddy, like at any site that requires a user name and password, are often subject to malicious messages known as phishing attacks, which are designed to trick people to reveal that personal informatio­n to hackers.

Computer users who entered or clicked on one of those Trump addresses probably would have had no idea they were redirected to servers in Russia.

Within days after the AP asked the Trump Organizati­on about the tampering, the affected web addresses were all corrected.

Godaddy spokesman Nick Fuller said the company had no breaches of its system in 2013 and has measures in place to monitor for malicious activity. Fuller would not discuss any customers in particular.

Some cybersecur­ity experts said there is an outside chance the tampering was a probe — an attempt to test security for an eventual effort to gather informatio­n on Trump or his business dealings. But those experts were only guessing.

There was no evidence the hackers ultimately broke into server computers at the Trump Organizati­on or other Trump interests.

Newspapers in English

Newspapers from United States