Hacker "Guccifer" distributes Hillary Clinton's Libya memos

The hacker obtained confidential emails from former WH aide Sidney Blumenthal's email account [UPDATED]

Published March 19, 2013 1:10PM (EDT)

 Sidney Blumenthal    (Wikimedia)
Sidney Blumenthal (Wikimedia)

Update – March 19, 11:33 a.m.: This post is updated to reflect the fact that Sidney Blumenthal was formerly a Washington bureau chief for Salon.

From earlier:

Last week it was reported that a hacker going by "Guccifer" had gained access to the personal email account of former Clinton White House aide (and confidant to Hillary) Sidney Blumenthal. On Tuesday, according to The Smoking Gun, Guccifer began sharing contents found in Blumenthal AOL account (yes, Sidney Blumenthal still uses AOL mail).

In playful emails, the hacker disseminated four recent memos on Libya sent by former Secretary of State Hillary Clinton to a "wide array of congressional aides, political figures, and journalists worldwide." The Smoking Gun reported that, "most of the e-mail recipients were sent four separate memos that were e-mailed to Clinton by Blumenthal during the past five months. Each memo dealt with assorted developments in Libya, including the September 11, 2012 attack on the U.S. mission in Benghazi. One memo marked “Confidential” was sent to Clinton on September 12."

Days before Guccifer's cyberattack on Blumenthal (who also previously served as Washington bureau chief for Salon), the hacker infiltrated Colin Powell's email account and defaced his Facebook page, uploading posts including a message that read “You will burn in hell, Bush!”

The hacker, who took pains to copy and paste the Clinton memos into documents on pink backgrounds and Comic Sans type before blasting them out, remains a unidentified. Via The Smoking Gun:

As for the location of “Guccifer,” that also remains a mystery. Though two IP addresses connected to the hacker’s recent online maneuvers have been traced to the Russian Federation, TSG has learned.  However, this could be indicative of nothing since hackers go to great lengths to obscure their trail via proxies, IP spoofing, and powerful anonymizing software like Tor.

By Natasha Lennard

Natasha Lennard is an assistant news editor at Salon, covering non-electoral politics, general news and rabble-rousing. Follow her on Twitter @natashalennard, email nlennard@salon.com.

MORE FROM Natasha Lennard

Related Topics ------------------------------------------

Aol Benghazi Attack Guccifer Hacking Hillary Clinton Libya Sidney Blumenthal