Minute-by-minute logs gathered by the cybersecurity company Secureworks and recently shared with The Associated Press suggest it took the hackers just over a week of work to zero in on and penetrate the personal Gmail account of campaign chairman John Podesta.
One outside expert who reviewed the data said it showed how even the well-defended Clinton campaign fell prey to phishing, a basic cyberespionage technique that uses bogus emails to harvest passwords.
"They were the most security-aware campaign that I'm aware of," said Markus Jakobsson, the chief scientist at email security company Agari. "And yet this happened."
Also Read
Overall, the AP documented well over 400 attempts to break into Clinton staffers and Democratic operatives between March and May of 2016 an illustration of what Jakobsson said was a key principal behind most phishing attempts.
"If you try enough, sooner or later you'll be lucky," he said.
The AP's reporting has shown how the hackers who hit Podesta acted globally in close alignment with the Russian government's interests backing assessments made by U.S. intelligence agencies that Russian spies were responsible. Here's a review of the evidence:
Other countries that were the focus of the operation were former Soviet state Georgia; Syria, where Russia has been backing the government in a bloody civil war; and Russia itself, where many government opponents were targeted. The AP has identified people in 116 countries whose accounts were targeted.
In recently unsealed court documents, a former Trump campaign foreign policy adviser said he was told by a professor closely connected to the Russian government that the Kremlin had obtained thousands of emails with "dirt" about Clinton.
Experts who've examined the list say it's Russia "It doesn't seem plausible that there is another country that would look to target the exact same set of people," said Secureworks senior security researcher Rafe Pilling.
Disclaimer: No Business Standard Journalist was involved in creation of this content