{"id":11912,"date":"2018-09-07T00:22:00","date_gmt":"2018-09-07T00:22:00","guid":{"rendered":"http:\/\/786d124c-b9cf-424c-9f53-bc6a167cb525"},"modified":"2018-09-07T00:22:00","modified_gmt":"2018-09-07T00:22:00","slug":"alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/","title":{"rendered":"Alex Stamos: Pretty clear GRU&#8217;s goal was to weaken a future Clinton presidency"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2018\/09\/07\/6ba72cab-1030-4f19-8834-3f7e73181f35\/1438b7343977348c2bba0627194c32a9\/alex-stamos.jpg\" class=\"\" alt=\"alex-stamos.jpg\"\/><\/span><\/p>\n<p><span class=\"caption\">Former Facebook CSO, Alex Stamos<\/span><\/p>\n<p><span class=\"credit\">TechCrunch Disrupt YouTube feed<\/span><\/p>\n<p>Speaking at the TechCrunch Disrupt tech conference today, former Facebook CSO Alex Stamos reflected on his time dealing with fake news and Russian intelligence interference ahead and after the 2016 US presidential election.<\/p>\n<p>The former Facebook security head said &#8220;it [was] pretty clear the GRU&#8217;s goal was to weaken a future Hillary presidency.&#8221;<\/p>\n<p>&#8220;Putin has a [you know, it&#8217;s been well-documented] like a personal antipathy towards her and believes that she was behind the protests against him in the 2012 Russian election, and so, the GRU activity was specifically focused on weakening her.&#8221;<\/p>\n<p>&#8220;I think it was less about actually electing Trump,&#8221; Stamos added. &#8220;I find it unlikely that the Russians are better than Nate Silver at predicting elections.&#8221;<\/p>\n<p><strong>See also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/facebooks-fake-account-crackdown-our-ai-spots-nudity-hate-terror-before-you-do\/\"><strong>Facebook&#8217;s fake account crackdown: Our AI spots nudity, hate, terror before you do<\/strong><\/a><\/p>\n<p>Stamos said his security team first detected Russia&#8217;s influence campaign in the spring of 2016, intervened to stop the spreading of some material obtained through the DNC hacks, but didn&#8217;t have the big picture until after the election.<\/p>\n<p>&#8220;After the election, we really dove into the whole fake news problem, and a big question was what was behind this?<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>&#8220;It turns out that the vast majority of [fake news] it&#8217;s actually financially motivated. You know, <a href=\"https:\/\/www.occrp.org\/en\/spooksandspin\/the-secret-players-behind-macedonias-fake-news-sites\" target=\"_blank\" rel=\"noopener noreferrer\">stereotypical Macedonian teenagers<\/a> who actually do exist and who are living the good life, as long with folks in Romania, Pakistan, and a bunch of other places with kind of good English comprehension technical skills.&#8221;<\/p>\n<p>Stamos then explains in the first half of the 20-minute interview how his team was able to distinguish pretty easily between fake news campaigns and political influence campaigns.<\/p>\n<p>He says most fake news items that spread on either Facebook and Twitter will take users off-site so the operator of the fake news site can earn revenue through ads or ad fraud.<\/p>\n<p>Stamos says his team was able to separate political influence campaigns, such as the ones carried out by GRU (one of Russia&#8217;s intelligence agencies) and the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_Research_Agency\" target=\"_blank\" rel=\"noopener noreferrer\">Internet Research Agency<\/a>, from classic run-of-the-mill fake news because they weren&#8217;t focused on monetization, but on sowing chaos in the American public life.<\/p>\n<p>&#8220;What the Internet Research Agency and the other government trolls want to do is they want to get you to reshare the content on social media and so they what they especially like to do is image memes,&#8221; Stamos said.<\/p>\n<p>&#8220;That makes them no money. There&#8217;s no way they can make money of you resharing this meme over and over again, and that&#8217;s a good indication that somebody&#8217;s paying them other than advertisers.&#8221;<\/p>\n<p><strong>See also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/senator-proposes-google-facebook-outline-what-your-data-is-worth-to-their-platforms\/\"><strong>Senator proposes Google, Facebook outline what your data is worth to their platforms<\/strong><\/a><\/p>\n<p>Stamos then goes on to explain the difference between the influence campaigns carried out by GRU intelligence officers and the IRA paid-trolls.<\/p>\n<p>&#8220;If you look at the Russian campaign against [the] 2016 [election], there&#8217;s really two different buckets,&#8221; the former Facebook exec said.<\/p>\n<p>&#8220;There&#8217;s the GRU-led work, which is about a bunch of [hacked] data from the DNC, from John Podesta, from Colin Powell, from other folks, and they used that hacked information to create the news stories they wanted to see in the media.<\/p>\n<p>They amplified it using their trolls, but in that case, it was the legitimate newspapers and cable news networks and legitimate journalists who were carrying the message of the GRU and kind of washing it through the respectability of their outlets that then changed the entire conversation.&#8221;<\/p>\n<p>Stamos says the GRU model is &#8220;a very different kind of model than the IRA model, which is to directly push messages to Americans.&#8221;<\/p>\n<p>&#8220;The IRA model is much less about this candidate or not. The GRU was specifically targeted at Hillary. [&#8230;] The IRA activity, which started well before the election and has lasted well after the election, is really about driving wedges in American society.&#8221;<\/p>\n<p>Alex Stamos left his position as Facebook CSO in August for a <a href=\"https:\/\/www.bbc.com\/news\/technology-45040289\" target=\"_blank\" rel=\"noopener noreferrer\">teaching post at Standford University<\/a>.<\/p>\n<p>Just before he left, at the end of July, <a href=\"https:\/\/www.zdnet.com\/article\/facebook-reveals-new-covert-efforts-to-sway-2018-midterm-elections\/\" target=\"_blank\">Facebook banned 32 accounts<\/a> it believed were associated with the Internet Research Agency.<\/p>\n<p>For the rest of his TechCrunch Disrupt session, Stamos also hit on the interesting fact that <a href=\"https:\/\/techcrunch.com\/2018\/09\/06\/alex-stamos-facebook-yahoo-security-officer\/\" target=\"_blank\" rel=\"noopener noreferrer\">being a CSO is a crappy job<\/a> nowadays because good CSOs will have bad decisions made by others stapled to their resumes, just like he&#8217;s now associated with the Yahoo hacks and the Facebook Cambridge Analytica scandal. The full session is available below.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facebook CSO breaks down differences between fake news, GRU operations, and IRA troll farms<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":11913,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-11912","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Alex Stamos: Pretty clear GRU&#039;s goal was to weaken a future Clinton presidency 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Alex Stamos: Pretty clear GRU&#039;s goal was to weaken a future Clinton presidency 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-07T00:22:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"470\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Alex Stamos: Pretty clear GRU&#8217;s goal was to weaken a future Clinton presidency\",\"datePublished\":\"2018-09-07T00:22:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/\"},\"wordCount\":773,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/\",\"name\":\"Alex Stamos: Pretty clear GRU's goal was to weaken a future Clinton presidency 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency.jpg\",\"datePublished\":\"2018-09-07T00:22:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency.jpg\",\"width\":1000,\"height\":470},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alex Stamos: Pretty clear GRU&#8217;s goal was to weaken a future Clinton presidency\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Alex Stamos: Pretty clear GRU's goal was to weaken a future Clinton presidency 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/","og_locale":"en_US","og_type":"article","og_title":"Alex Stamos: Pretty clear GRU's goal was to weaken a future Clinton presidency 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-09-07T00:22:00+00:00","og_image":[{"width":1000,"height":470,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Alex Stamos: Pretty clear GRU&#8217;s goal was to weaken a future Clinton presidency","datePublished":"2018-09-07T00:22:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/"},"wordCount":773,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/","url":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/","name":"Alex Stamos: Pretty clear GRU's goal was to weaken a future Clinton presidency 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency.jpg","datePublished":"2018-09-07T00:22:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency.jpg","width":1000,"height":470},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/alex-stamos-pretty-clear-grus-goal-was-to-weaken-a-future-clinton-presidency\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Alex Stamos: Pretty clear GRU&#8217;s goal was to weaken a future Clinton presidency"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/11912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=11912"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/11912\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/11913"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=11912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=11912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=11912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}