Lone hacker 'Guccifer 2.0' claims responsibility for DNC breach

Lone Hacker 'Guccifer 2.0' Claims Responsibility for DNC Breach

You've probably heard by now that the Democratic National Committee was hacked. But there still seems to be some uncertainty over the true identity of the hacker or hackers.

The DNC enlisted CrowdStrike, a cybersecurity firm, to look into its systems breach. That company determined two well-known Russian hacking groups were responsible.

SEE ALSO: Hillary Clinton's vice presidential picks revealed

But then a "lone hacker" who goes by Guccifer 2.0 posted some documents from the "many thousands" he or she claims to have extracted from DNC servers..

Among those documents is reportedly more than 260 internal files largely focused on Hillary Clinton. The documents outline criticism of the presumptive nominee and possible defenses on a number of issues, including the 2012 attack in Benghazi and her email controversy.

CrowdStrike stands by its initial findings. It says that Guccifer 2.0's claims don't necessarily lessen the firm's analysis, at least not as far as a connection to the Russian government is concerned.

Outside parties, like Ars Technica, looked into the documents posted online. One of the documents had metadata that led the publication to believe the hacker going by Guccifer 2.0 may still be tied to the Russian government. And at the very least, the hacker is likely a "Russian-speaking [male] with a nostalgia for the country's lost Soviet era."

The name Guccifer is a reference to the hacker who claimed responsibility for hacking Clinton's private email server.

RELATED: Notable recent data breaches:

9 PHOTOS
Notable data breaches in the US recently
See Gallery
Notable data breaches in the US recently
LONDON, ENGLAND - AUGUST 19: A detail of the Ashley Madison website on August 19, 2015 in London, England. Hackers who stole customer information from the cheating site AshleyMadison.com dumped 9.7 gigabytes of data to the dark web on Tuesday fulfilling a threat to release sensitive information including account details, log-ins and credit card details, if Avid Life Media, the owner of the website didn't take Ashley Madison.com offline permanently. (Photo by Carl Court/Getty Images)
Katherine Archuleta, director of the U.S. Office of Personnel Management (OPM), speaks during a House Oversight and Government Reform Committee hearing on the OPM data breach in Washington, D.C., U.S., on Wednesday, June 24, 2015. U.S. senators said yesterday they doubt the government's personnel office understands the breadth of a computer hack that exposed the records of more than 4 million federal workers, or that the agency can stop another breach. Photographer: Andrew Harrer/Bloomberg via Getty Images
WASHINGTON, DC - JUNE 05: The entrance to the Theodore Roosevelt Federal Building that houses the Office of Personnel Management headquarters is shown June 5, 2015 in Washington, DC. U.S. investigators have said that at least four million current and former federal employees might have had their personal information stolen by Chinese hackers. (Photo by Mark Wilson/Getty Images)
SCHAUMBURG, IL - AUGUST 04: A statue of a horse stands at the entrance to a P.F. Chang's restaurant on August 4, 2014 in Schaumburg, Illinois. P.F. Chang's China Bistro Ltd. said today that the company experienced a data breach involving customers' credit and debit card information which affected 33 restaurants in 16 states, including the Schaumburg, Illinois location. (Photo by Scott Olson/Getty Images)
PORTLAND, ME - AUGUST 15: Shaws on Congress Street on Friday, July 15, 2014. Shaws parent company is investigating a possible data breach. (Photo by Logan Werlinger/Portland Press Herald via Getty Images)
COLMA, CA - APRIL 18: Customers enter a Michaels art and crafts store on April 18, 2014 in Colma, California. Michaels, the largest arts and crafts chain in the U.S., announced that an estimated 2.6 million cards used at its stores across the country may have been affected by a security breach. Aaron Brothers, a subsidiary of Michaels, was also affected by the breach. (Photo by Justin Sullivan/Getty Images)
CORAL GABLES, FL - FEBRUARY 28: A checkout keypad is seen at a Sears store on February 28, 2014 in Coral Gables, Florida. According to reports the U.S. Secret Service is investigating a possible digital attack at Sears Holdings Corp. (Photo by Joe Raedle/Getty Images)
A couple of shoppers leave a Target store on a rainy afternoon in Alhambra, California on December19, 2013, as the US retail giant said some 40 million customers may have had bank card data compromised by hackers who broke into its database as holiday shopping got underway. Target said there had been 'unauthorized access' to its payment system in US stores affecting credit and debit cards with approximately 40 million credit and debit cards possibly affected by the breach between November 27 and December 15, the company said in a statement. AFP PHOTO / Frederic J. Brown (Photo credit should read FREDERIC J. BROWN/AFP/Getty Images)
HIDE CAPTION
SHOW CAPTION
of
SEE ALL
BACK TO SLIDE

Read Full Story

Sign up for Breaking News by AOL to get the latest breaking news alerts and updates delivered straight to your inbox.

Subscribe to our other newsletters

Emails may offer personalized content or ads. Learn more. You may unsubscribe any time.