SecureWorks managed to track their spearphishing operation because they used Bitly to shorten their links and left their accounts public. King's College professor Thomas Rid analyzed the data and told Motherboard that 3,134 people who got the phishing email clicked the link inside. It opened a website that mimicked the Google log-in page, most likely to take advantage of the fact that Clinton's campaign staffers used Gmail. 470 people ended up giving away their passwords. Based on the firm's information, Clinton herself didn't click the malicious links. However, SecureWorks only counted clicks made on the same day the links were sent, so the scheme might have tricked more people, including the nominee.
Motherboard says 12 out of all the victims who clicked the link had their emails leaked to the public via the DCLeaks website and WikiLeaks or by Guccifer 2.0. Rid, who examined the list of recipients, said the target selection is "what you'd expect from a military intelligence agency."
In a statement he prepared for a US Senate Intelligence Committee hearing, he wrote:
"The publicly available evidence that implicates Russian intelligence agencies in the 2016 active measures campaign is extraordinarily strong. The DNC hack can be compared to a carefully executed physical break-in in which the intruders used uniquely identical listening devices; uniquely identical envelopes to carry the stolen files past security; and uniquely identical getaway vehicles."
Meanwhile, Senate Intelligence Committee chairman Mark Warner has also revealed that Kremlin employed over a thousand people to create fake anti-Clinton stories during the campaign period. According to The Independent, the fake stories targeted key swing states, particularly Wisconsin, Michigan and Pennsylvania. He said at a press event:
"We know about the hacking, and selective leaks, but what really concerns me as a former tech guy is at least some reports -- and we've got to get to the bottom of this -- that there were upwards of a thousand internet trolls working out of a facility in Russia, in effect taking over a series of computers which are then called botnets, that can then generate news down to specific areas...
An outside foreign adversary effectively sought to hi-jack the most critical democratic process, the election of a President, and in that process, decided to favor one candidate over another."