M.N.: This is indeed the hypothetical connection between the “PETRONAS” (Petrov Boshirov PERSONAS) – the Salisbury Poisoning, and the Blackberry – Abedin’s device – Clinton’s emails – Anthony Weiner sexting affair – Democratic Party hack – US Elections 2016 Interference:
The Boshirov Petrov hacking attempt (GNews)
This means that the Salisbury Poisoning and the US Elections 2016 Interference might be the parts of the same large operation designed by the Demiurge, the New Abwehr, which uses the ostensibly GRU related groups as its covers. It might be the mixed or the purely the GRU groups but I strongly doubt it: the overall benefits of the Operation Dusseldorf Karnival are in the German and certainly not in Russian interests.
“Two suspects in the poison Poisoninging of an ex-Russian spy were briefly detained in the Netherlands earlier this year, according to research by Bellingcat, an investigative group.
Bellingcat quoted an unnamed security official saying that Alexander Petrov and Ruslan Boshirov were detained in the Netherlands earlier this year and released without being charged.”
“Dutch expelled Russians over alleged novichok lab hacking plot
Two men were arrested over alleged plan to infiltrate lab where Salisbury nerve agent was analysed…
The Swiss Federal Office for Civil Protection said in June that the Spiez laboratory had been targeted by hackers said to be from the Russian government-affiliated group Sandworm. It is not clear whether the expulsion of the two spies from the Netherlands was linked.”
M.N.: It is the same hacking group, “Sandform – APT28 – Fancy Bear, etc., etc.”. “It was involved in the operation to hack and release damaging information on the Democratic Party during the 2016 US presidential election, and has engineered a number of computer network disruptions in Ukraine”.
Is it also resposible for hacking Clinton’s emails, and for downloading emails to Abedin’s computer?
“The Justice Department said the “VPNFilter” botnet was set up by a hacking group variously called APT28, Pawn Storm, Sandworm, Fancy Bear and the Sofacy Group.”
The US Justice Department said Wednesday that it had seized an internet domain that directed a dangerous botnet of a half-million infected home and office network routers, controlled by hackers believed tied to Russian intelligence.
The move was aimed at breaking up an operation deeply embedded in small and medium-sized computer networks that could allow the hackers to take control of computers as well as easily steal data.
The Justice Department said the “VPNFilter” botnet was set up by a hacking group variously called APT28, Pawn Storm, Sandworm, Fancy Bear and the Sofacy Group.
The group is blamed for cyber attacks on numerous governments, key infrastructure industries like power grids, the Organization for Security and Co-operation in Europe, the World Anti-Doping Agency, and other bodies.
US intelligence agencies also say it was involved in the operation to hack and release damaging information on the Democratic Party during the 2016 US presidential election, and has engineered a number of computer network disruptions in Ukraine.
“According to cybersecurity researchers, the Sofacy Group is a cyber-espionage group believed to have originated from Russia,” the Department of Justice said in a court filing.
“Likely operating since 2007, the group is known to typically target government, military, security organizations, and other targets of intelligence value, through a variety of means,” it said.
The Justice filing did not say who was behind Sofacy Group, but US intelligence has in the past linked it to Russia’s GRU military intelligence agency, and numerous private computer security groups have made the same connection.