Saturday Dec 6, 2025
NEWSLETTER
www.israelhayom.com
  • Home
  • News
    • Israel
    • Israel at War
    • Middle East
    • United States
  • Opinions
  • Jewish World
    • Archaeology
    • Antisemitism
  • Lifestyle
    • Food
    • Travel
    • Fashion
    • Culture
  • Magazine
    • Feature
    • Analysis
    • Explainer
  • In Memoriam
www.israelhayom.com
  • Home
  • News
    • Israel
    • Israel at War
    • Middle East
    • United States
  • Opinions
  • Jewish World
    • Archaeology
    • Antisemitism
  • Lifestyle
    • Food
    • Travel
    • Fashion
    • Culture
  • Magazine
    • Feature
    • Analysis
    • Explainer
  • In Memoriam
www.israelhayom.com
Home News World News United States US Election Coverage

'Dumb mistake' exposed Iranian hand in threatening emails to US voters

"Either they made a dumb mistake or wanted to get caught," says senior US government official. "We are not concerned about this activity being some kind of false flag due to other supporting evidence. This was Iran."

by  Reuters and ILH Staff
Published on  10-23-2020 10:41
Last modified: 10-23-2020 10:41
Iranians, Russians receive texts seeking US election hacking info

Attribution to Iranian hackers does not necessarily mean a group is working at the behest of Tehran | Screenshot

Share on FacebookShare on Twitter

Government analysts and private sector investigators were able to rapidly attribute to Iranian hackers a wave of thousands of threatening emails aimed at US voters because of mistakes made in a video attached to some of the messages, according to four people familiar with the matter.

Those failures provided a rare opportunity for the US government to identify and publicly announce blame for a malicious cyber operation in a matter of days, something that usually requires months of technical analysis and supporting intelligence.

Follow Israel Hayom on Facebook and Twitter 

"Either they made a dumb mistake or wanted to get caught," said a senior US government official. "We are not concerned about this activity being some kind of false flag due to other supporting evidence. This was Iran."

Attribution to Iranian hackers does not necessarily mean a group is working at the behest of the government there. Iranian officials denied the US allegations.

"These accusations are nothing more than another scenario to undermine voter confidence in the security of the US election, and are absurd," said Alireza Miryousefi, spokesman for Iran's mission to the United Nations in New York.

On Wednesday, US Director of National Intelligence John Ratcliffe said Russia and Iran have both tried to interfere in the campaign for the Nov. 3 election. US intelligence agencies are still analyzing exactly who in Iran commanded the operation and its intent, three of the sources said.

Within hours of the video being circulated this week, which purported to come from a American far-right group known as The Proud Boys, intelligence officials and major email platform providers, such as Alphabet Inc's GOOGL.O Google and Microsoft Corp MSFT.O, began closely analyzing computer code that appeared in the hackers' video.

US Director of National Intelligence John Ratcliffe (AFP)

While the emails, which demanded that voters change their party affiliation to the Republican Party and vote for President Donald Trump or "we will come after you," appeared to come from an official-looking Proud Boys email address, the address was inauthentic, security analysts said. The Proud Boys denied they were behind the messages.

How security analysts used intelligence from the video to attribute the email scheme has not been previously reported.

A Microsoft spokesperson declined to comment on the company's collaboration with law enforcement. A Google statement on Wednesday night said the activity was "linked to Iran." A Google spokesperson said on Thursday the company was in contact with the FBI.

Despite attempts to blur aspects of the video to hide their identity, the hackers were unable to obfuscate all of the incriminating information, the sources said.

The video showed the hackers' computer screen as they typed in commands and pretended to hack a voter registration system. Investigators noticed snippets of revealing computer code, including file paths, file names and an internet protocol (IP) address.

Security analysts found that the IP address, hosted through an online service called Worldstream, traced back to previous Iranian hacking activity, the sources said.

Analysts then cross-referenced those clues left in the video with data from other intelligence streams, including communications interceptions, the government official said.

"This public disclosure of attribution to Iran by the government has been done with breakneck speed, compared to the usual process that takes months and often years," said Dmitri Alperovitch, a co-founder and former CTO of cybersecurity company CrowdStrike.

Two cybersecurity experts, who spoke on condition of anonymity because they were not authorized to talk to the press, independently said they had seen Iranian hackers use infrastructure from Dutch-based Worldstream to launch cyberattacks in recent months.

Worldstream's chief legal operations officer Wouter van Zwieten said in a statement that the account associated with the IP in question was suspended after Reuters got in touch and that the Dutch National Cyber Security Center was looking into the matter.

Iranian President Hassan Rouhani (EPA/ Office of the Iranian President) EPA/ Office of the Iranian President

"They've just informed us that the particular IP address is now officially registered by them and ready for investigation under Dutch Law," van Zwieten said. The National Cyber Security Center confirmed that Worldstream had been in touch and that it had logged the case but declined further comment.

Van Zwieten said the server used by the hackers was only commissioned on Oct. 6 and had not drawn any complaints until now. The company said it had no access to the content on its servers.

In addition to sending thousands of emails to voters in states including Florida, the hackers also attempted to share links to the video via fake accounts on Facebook and Twitter.

Social media analytics firm Graphika said two Twitter accounts began posting links to the video on Tuesday evening and attempted to get the attention of some media and political organizations.

One account described itself as "Trump's Soldier" and shared a link to the video with the comment "It seems they hacked voting system."

A Twitter spokeswoman said: "We acted quickly to proactively and permanently suspend a small number of accounts and limit the sharing of media specific to this coordinated campaign."

Facebook said: "We disrupted an attempt by a single fake account to seed information related to what appears to be an influence operation primarily focused on spreading false claims via email."

Subscribe to Israel Hayom's daily newsletter and never miss our top stories!

Related Posts

Inside the cover-up: Biden aides feared wheelchair optics, hid decline, book revealsAP/Andrew Harnik

Inside the cover-up: Biden aides feared wheelchair optics, hid decline, book reveals

by Miri Weissman

"They were trying to kill him, I'm trying to keep him alive" – Biden's doctor fought with political aides over...

The right man for the jobAP/Chris Carlson

Trump sues Iowa pollster over 'election interfering fiction'

by Erez Linn

Former president claims 'doctored Harris poll' deceived millions and constitutes consumer fraud under Iowa law

Trump's final hurdle? Most crucial vote gets underwayAP/Yuki Iwamura

Trump's final hurdle? Most crucial vote gets underway

by Erez Linn

The Electoral College convenes on Dec. 17 and outcome will determine the official winner of November vote. Enshrined in the...

Menu

Analysis 

Archaeology

Blogpost

Business & Finance

Culture

Exclusive

Explainer

Environment

 

Features

Health

In Brief

Jewish World

Judea and Samaria

Lifestyle

Cyber & Internet

Sports

 

Diplomacy 

Iran & The Gulf

Gaza Strip

Politics

Shopping

Terms of use

Privacy Policy

Submissions

Contact Us

About Us

The first issue of Israel Hayom appeared on July 30, 2007. Israel Hayom was founded on the belief that the Israeli public deserves better, more balanced and more accurate journalism. Journalism that speaks, not shouts. Journalism of a different kind. And free of charge.

All rights reserved to Israel Hayom

Hosted by sPD.co.il

  • Home
  • News
    • Israel at War
    • Israel
    • United States
    • Middle East
    • Sports
  • Opinions
  • Jewish World
    • Archaeology
    • Antisemitism
  • Lifestyle
    • Food
    • Travel
    • Fashion
    • Culture
  • Magazine
    • Feature
    • Analysis
    • Explainer
    • Environment & Wildlife
    • Health & Wellness
  • In Memoriam
  • Subscribe to Newsletter
  • Submit your opinion
  • Terms and conditions

All rights reserved to Israel Hayom

Hosted by sPD.co.il

Newsletter

[contact-form-7 id=”508379″ html_id=”isrh_form_Newsletter_en” title=”newsletter_subscribe”]

  • Home
  • News
    • Israel at War
    • Israel
    • United States
    • Middle East
    • Sports
  • Opinions
  • Jewish World
    • Archaeology
    • Antisemitism
  • Lifestyle
    • Food
    • Travel
    • Fashion
    • Culture
  • Magazine
    • Feature
    • Analysis
    • Explainer
    • Environment & Wildlife
    • Health & Wellness
  • In Memoriam
  • Subscribe to Newsletter
  • Submit your opinion
  • Terms and conditions

All rights reserved to Israel Hayom

Hosted by sPD.co.il