A computer hacker who boasted last week of breaching the Democratic National Committee has published a new round of documents concerning Hillary Clinton, the party’s presumptive presidential nominee.
The hacker, “Guccifer 2.0,” distributed the files Tuesday through the same blog on which a cache of DNC documents — including opposition research on Republican hopeful Donald Trump — was released one week earlier.
The most recent files distributed by the hacker include documents with titles such as “HRC Defense Master Doc” and “Attacks on Clinton Family Members,” as well as a spreadsheet purportedly containing the names of individuals who donated $25,000 or more to the the Clinton Foundation, a nonprofit organization overseen by the former secretary of state and her husband.
The 78-megabyte cache is composed of thousands of pages that originated from “a big folder of docs devoted to Hillary Clinton that I found on the DNC server,” according to the hacker.
“The DNC collected all info about the attacks on Hillary Clinton and prepared the ways of her defense, memos, etc., including the most sensitive issues like email hacks,” the hacker wrote.
The authenticity of the documents could not immediately be verified, and DNC did not respond to a request for comment made Tuesday by Fox News, the network reported.
“Guccifer 2.0” published the initial DNC document dump on June 15 — the same day cybersecurity firm CrowdStrike issued a statement claiming that the committee’s servers had been infiltrated by no fewer than two hacker groups operating on behalf of Russian intelligence.
Speaking to Vice’s Motherboard this week, Guccifer 2.0 described himself as Romanian and said that he gained access to the DNC documents after hacking into the committee’s computers last summer.
“I don’t like Russians and their foreign policy. I hate being attributed to Russia,” he told Motherboard.
A senior DNC official told Motherboard Tuesday that “our experts are confident in their assessment that the Russian government hackers were the actors responsible for the breach detected in April, and we believe that the subsequent release and the claims around it may be a part of a disinformation campaign by the Russians.”
• Andrew Blake can be reached at ablake@washingtontimes.com.
Please read our comment policy before commenting.