An email with an infected link, opened by a staff member from Emanuel Macron’s headquarters, is the most likely vector of the attack that led to the leak of nine gigabytes of data from the email boxes of four Macron assistants, as well as OneDrive archive files. The handwriting is the same as in the case with the American Democratic Party emails that leaked to Wikileaks and were used by Trump fans to discredit Hillary Clinton. In this case, however, Wikileaks has no connection with the leak, but ironically broadly circulated… a Russian connection discovered earlier by Bivol.
#MacronLeaks: name of employee for Russian govt security contractor Evrika appears 9 times in metadata for "xls_cendric.rar" leak archive pic.twitter.com/jyhlmldlbL
— WikiLeaks (@wikileaks) May 6, 2017
Wikileaks even expressed their astonishment that, besides them and Bivol, no other media organizations were investigating the origin and the authenticity of the leaked data.
Why are WikiLeaks and Bivol the only media organizations analyzing the provenance of #MacronLeaks? Does no-one else have tech competence?
— WikiLeaks (@wikileaks) May 7, 2017
The information that Macron’s headquarters has been the subject of attacks from Russia-related hacker groups Pawn Storm and Fancy Bear was published as early as April 25, 2017, by Daily Beast. The publication cites a security expert who describes the phishing methods that have been used and brags that they have been detected and even counterattacked. The phishing attack seems to have succeeded after all. This is confirmed by, both, the statement from the Macron headquarters and the ongoing investigation by the French prosecutor’s office.
Delayed timing
The data stolen from the emails of Macron’s campaign staff members, and perhaps from the OneDrive cloud archive, was published in the US forum 4chan just hours ahead of the so-called “Day of Reflection” in France (the day preceding Election Day – editor’s note). Macron’s headquarters immediately reported they were the victims of a hacker attack, and the French Central Electoral Commission reminded the media in a special message that they are banned from reporting any news related to the political campaign until the closing of the polls and news and stories that could harm or benefit one of the candidates.
The people behind the leak most likely knew about these provisions and apparently did not rely on mass media coverage of discrediting information, but on rumors and insinuations citing the leak. It was impossible in the few remaining hours until the opening of the polls to read, analyze, and verify for authenticity the messages from the large mailboxes containing gigabytes of information. This fact, in addition to the media blackout, made possible the wide spread of fake news that could not be verified and refuted by an accurate fact checking. The subsequent hyperactivity surrounding the #MacronLeaks hashtag, launched by an American far right-wing activist confirms this hypothesis.
La cartographie animée temporaire et rapide de #MacronLeaks sans les explications pic.twitter.com/aGrW86KEoh
— Nicolas Vanderbiest (@Nico_VanderB) May 5, 2017
This activist, named Jack Posobiec, also very vigorously circulated documents from the previous cyber attack against Macron, which leaked on 4chan shortly before the presidential debate between Marine Le Pen and Emmanuel Macron. These files, which were fabricated, as it turned out, inculcated that Macron has a secret account in the Cayman Islands.
But there is another sign that this was the desired scenario:
Evidence of fake news is found in the leak
in the form of selected files, divided into three separate folders.
The first folder, entitled Macron_201705, contains an insurance contract between Allianz and Emmanuel Macron in case his election result fails to cross the 5% ceiling required to receive a subsidy for his party. A SWIFT transaction for the insurance premium is attached. There is nothing scandalous about this, but the anti-Macron trolls immediately spread the information about the transaction on social networks, presenting it as a suspicious money transaction.
https://twitter.com/JackPosobiec/status/860584992702910464
The second folder, named Gemplus, contains internal documents, dating back to 2001-2002, of a smart card maker. The scandalous businessman and arms broker Ziad Takieddine, involved in the alleged Libyan funding of Nicolas Sarkozy’s campaign, has a stake in Gemplus. Part of the documents is related to a big deal between several French arms companies and Saudi Arabia for a new border control system. All this has nothing to do with Macron. But it was also spread by Twitter trolls as “evidence” that Macron has secret money dealings with Saudi Arabia and Sarkozy.
Retweeted Sarah Abdallah (@sahouraxo):#MacronLeaks show secret ties between Macron, Sarkozy and Saudi Arabia…. https://t.co/GZ0gAfPWpr
— Anton Ironbark (@swordofgnosis) May 7, 2017
The third folder is the most interesting one. It contains 26 files, numbered 11 to 32, which contain financial reports, budgets and business plans for Macron’s political campaign. There is nothing outrageous in their content, but, once again, they were spread by trolls, with an emphasis on the wages of people working for Macron’s campaign and the cost of people polling.
#MacronLeaks De sacrées différences de salaires dans l'équipe de campagne pic.twitter.com/iBkZPtbqCv
— Nicolas JUHEL ⭐⭐ (@NicolasJuhel) May 6, 2017
However, the flop happened precisely in these files.
Russian connection
The Russian connection did not fit the scenario of the troll campaign at all, even on the contrary. At first, watchful observers from Generation Nouvelle Republique found metadata in Russian in the Excel files.
Les Hackers Russes au rabais et fachosphere ANTI FRANCE du #FN nullissimes. Merci pour la signature. #MacronLeaks #MacronGate @MLP_officiel pic.twitter.com/WT1ZyNC595
— GNR #TouchesPasAMaFrance #PasdeGiletPasdeBannon (@GNR311) May 5, 2017
Nine of these files show the name of Georgiy Petrovich Roshka, something that was first established by Bivol.
Hello, Roshka Georgiy Petrovich 🙂 pic.twitter.com/fBaklSN7V5
— Bivol (@BivolBg) May 6, 2017
On the basis of Bivol’s tweet, the Russian The Insider published a blitz survey showing that a person with the same name is an employee of the Russian IT company Eureka, which has contracts with Russian State institutions. Later, Wikileaks confirmed this report and published information that Eureka had a license from the FSB to handle classified information.
Russian press article on ЭВРИКА when company obtained an FSB security certificate to protect state secrets. https://t.co/OGjbMW9UXX
— WikiLeaks (@wikileaks) May 6, 2017
The origin of these files is not very clear, as they may come from the emails, or from the archives of Macron’s party in OneDrive. Metadata analysis shows that they were recorded at five-minute intervals on March 27, 2017. The most recent emails in the archives are from April 24, 2017, which means that the hackers had long accessed the system without being spotted.
What are we learning from the nine files with Roshka’s signature?
- All contain budget tables for the upcoming campaign. The content says this was a Business Plan, but with different versions and dates;
- All nine files with Roshka’s signature have a creation date of 2016-05-05T16:46:06Z. The other 17 files have been created on 2006-09-16T00:00:00Z;
- The email of the Macron campaign Treasurer, Cédric O (this is his full name), has four Excel files whose names start with “Business Plan”. The first one dates from March 5, 2016, followed by a file from May 5, 2016, and two more from later dates – May 16, 2016, and May 17, 2016;
- All files in Cédric’s e-mail with the name “Business Plan” are encrypted;
- The content of the four files, signed by Roshka, points to the date March 27, 2016, which is earlier than the first Cédric email messages found in the leak;
- The other 17 files in the folder that are not signed by Roshka, are also found in Cédric O’s mail, but they are not encrypted.
The most obvious conclusion is that Roshka has worked specifically on the files that contain the business plan of Macron’s campaign. A very likely scenario is that the files were opened in a Russian version of MS Office, and with the subsequent recording on the disc under another name, metatags in Russian and Roska’s name were left in them.
At this stage, many questions remain that data analysis cannot answer. Did the said Roshka have anything to do with the decryption of the files or did he obtain them from OneDrive? Was his name left in the file by mistake or was the metadata specifically entered to attract attention? The answers will be provided by the investigating authorities who will have the originals of the stolen information, as well as much more tools to analyze the origin and the timing of the hacker attack.
***
If you find this article useful, support our work with a small donation.
Pay a Bivol Tax!
We will highly appreciate if you decide to support us with monthly donations keeping the option Monthly
Извършвайки плащане Вие се съгласявате с Общите условия, които предварително сте прочели тук.
Please, read our Terms and conditions here.
Биволъ не записва и не съхранява номера на Вашата банкова карта. Плащанията се обработват през системата Stripe. Даренията за Биволъ с банкови карти се управляват от френската неправителствена организация Data for Reporters Journalists and Investigations - DRJI.
Bivol is not recording the number of your bank card. The card payments go through Stripe. Card donations for Bivol are managed by the French NGO Data for Reporters Journalists and Investigations - DRJI.
Извършвайки плащане Вие се съгласявате с Общите условия, които предварително сте прочели тук.
Please, read our Terms and conditions here.
Биволъ не записва и не съхранява номера на Вашата банкова карта. Плащанията се обработват през системата Stripe. Даренията за Биволъ с банкови карти се управляват от френската неправителствена организация Data for Reporters Journalists and Investigations - DRJI.
Bivol is not recording the number of your bank card. The card payments go through Stripe. Card donations for Bivol are managed by the French NGO Data for Reporters Journalists and Investigations - DRJI.
IBAN: BG27 ESPY 4004 0065 0626 02
BIC: ESPYBGS1
Титуляр/Account Holder: Bivol EOOD
Извършвайки плащане Вие се съгласявате с Общите условия, които предварително сте прочели тук.
Биволъ не записва и не съхранява номера на Вашата банкова карта. Плащанията се обработват през системата Stripe. Даренията за Биволъ с банкови карти се управляват от френската неправителствена организация Data for Reporters Journalists and Investigations - DRJI.
SMS код BIVOL
За да подкрепите с малка сума нашите разследвания и автори, можете да изпратите SMS на кратък номер. Ще получите с обратен SMS линк към нашия архив.
- Изпрати 1,2 лв. на номер 1851 с код BIVOL и получи достъп до Архивите на Биволъ
- Изпрати 2,4 лв. на номер 1092 с код BIVOL и получи достъп до Архивите на Биволъ
- Изпрати 4,8 лв. на номер 1094 с код BIVOL и получи достъп до Архивите на Биволъ
- Изпрати 12 лв. с два смс-а на номер 1096 с код BIVOL и получи достъп до Архивите на Биволъ
Сумите са с включен ДДС. Моля, имайте предвид, че това е най-неефективният начин да подпомогнете Биволъ, тъй като комисионната на мобилните оператори достига 60%. Ако имате възможност, използвайте някой от другите методи на плащане.
Криптовалути
За да ни изпратите биткойни сканирайте QR кода или използвайте един от двата адреса: Standard: 1EY3iwkPXiby6XFsyCcVPGZPYCGPbPeVcb
Segwit: bc1ql28g7qnvdmenrzhhc7rtk0zk67gg4wd9x9jmmc
- Powerful US Lobbyist Aids Businesses Linked to Sanctioned Bulgarian Lawmaker, Has Joint Company with Notorious Attorney - 8 January 2022
- Interview for FAKTI.bg
Assen Yordanov: If a lustration law had been passed, Bulgaria would not be in this state
- 19 November 2021 - After Peevski, the Magnitsky Act must target his puppeteers. #LUSTRATION is crucial! - 8 June 2021
This post is also available in: Bulgarian
You must be logged in to post a comment.