{"id":36690,"date":"2020-08-19T16:35:25","date_gmt":"2020-08-19T16:35:25","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31499\/Senate-Committee-Finds-Trump-Campaign-Welcomed-Russian-Hacking-Help.html"},"modified":"2020-08-19T16:35:25","modified_gmt":"2020-08-19T16:35:25","slug":"senate-committee-finds-trump-campaign-welcomed-russian-hacking-help","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/","title":{"rendered":"Senate Committee Finds Trump Campaign Welcomed Russian Hacking Help"},"content":{"rendered":"<figure class=\"image image-large pull-none hasCaption shortcode\" section=\"shortcodeImage\"><span class=\"imageContainer\"><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet2.cbsistatic.com\/img\/yt0WdqmHmbL6atPpvntlkGpAw0Y=\/1092x0\/2020\/08\/18\/67261f45-2277-4222-bbaf-fa38e9359192\/gettyimages-1152460290.jpg\" class alt=\"gettyimages-1152460290\" height=\"0\" width=\"1092\"><\/span><\/span><figcaption readability=\"1.5\"><span class=\"caption\" readability=\"3\"><\/p>\n<p>US President Donald Trump greets Russian President Vladimir Putin during their meeting at the G20 Osaka Summit in 2019.<\/p>\n<p><\/span><span class=\"credit\"> Mikhail Svetlov\/Getty Images <\/span><\/figcaption><\/figure>\n<p> <a class=\"c-packageUnit\" href=\"https:\/\/www.cnet.com\/elections-2020\/\" section=\"package-cta|elections\" data-ad-ready=\"null\">This story is part of <span class=\"c-packageUnit_link\">Elections 2020<\/span>, CNET&#8217;s coverage of the run-up to voting in November. <\/a><\/p>\n<p class=\"speakableTextP1\">In June 2016, shortly after a leak of <a href=\"https:\/\/www.cnet.com\/news\/us-charges-12-russian-hackers-tied-to-dnc-cyberattack\/\">stolen documents tied to the Democratic National Committee<\/a>, a Trump campaign staffer asked higher-ups if election rules prevented the campaign from obtaining material that had been hacked and published online. John Marshburn, the campaign&#8217;s policy director in 2016, responded: &#8220;I don&#8217;t see a problem. Just like WikiLeaks material.&#8221;&nbsp;<\/p>\n<p class=\"speakableTextP2\">That exchange, detailed Tuesday in a <a href=\"https:\/\/www.intelligence.senate.gov\/sites\/default\/files\/documents\/report_volume5.pdf\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">966-page report on Russia&#8217;s 2016 presidential election interference<\/a>, from the US Senate Select Committee on Intelligence, reflected the Trump campaign&#8217;s willingness to use hacked documents during the contest for the White House against Democratic nominee Hillary Clinton.&nbsp;<\/p>\n<p>The report highlights multiple instances where the Trump campaign promoted stolen material provided by Russian hackers, even after the US intelligence community warned that the data came from the Kremlin. It also showed a coordinated effort between the Trump campaign and WikiLeaks, an organization that publicly released many of the documents stolen by Russian hackers.&nbsp;<\/p>\n<div class=\"newsletter-subscribe-form desktop -inline \" section=\"subscribeNewsletter\" data-track=\"newsletter\" readability=\"6\">\n<div class=\"newsletterTitle \">\n<p><h2>CNET Daily News <\/h2>\n<\/p><\/div>\n<div class=\"newsletter\" readability=\"7\">\n<p class=\"description\">Stay in the know. Get the latest tech stories from CNET News every weekday.<\/p>\n<\/p><\/div>\n<\/div>\n<p>&#8220;The Trump campaign publicly undermined the attribution of the hack-and-leak campaign to Russia, and was indifferent to whether it and WikiLeaks were furthering a Russian election interference effort,&#8221; the report stated.&nbsp;<\/p>\n<p>The Trump campaign didn&#8217;t respond to a request for comment.&nbsp;<\/p>\n<p>Russia&#8217;s <a href=\"https:\/\/www.cnet.com\/news\/how-the-russian-hackers-infiltrated-the-dnc-a-timeline\/\">cyberattacks against Clinton&#8217;s campaign and the DNC<\/a> left a lasting impression on US politics and tech companies, and <a href=\"https:\/\/www.cnet.com\/news\/election-security-in-2020-means-a-focus-on-county-officials-dhs\/\">election officials<\/a> and <a href=\"https:\/\/www.cnet.com\/news\/microsoft-found-iranian-hackers-targeting-a-us-presidential-campaign\/\">campaigns<\/a> have ramped up security measures to prevent a repeat. Google, Facebook and Twitter <a href=\"https:\/\/www.cnet.com\/news\/facebook-google-twitter-team-up-on-election-security-ahead-of-rnc-and-dnc\/\">now regularly meet with government agencies<\/a> to prevent the spread of election disinformation on their platforms.<\/p>\n<p><svg class=\"svg-symbol playerControls\"><symbol id=\"play\" viewBox=\"0 0 26.6 32\"><path d=\"M0,2.6c0-2.4,1.6-3.3,3.7-2L25,13.7c2,1.3,2,3.2,0,4.5L3.7,31.4c-2,1.3-3.7,0.3-3.7-2C0,29.4,0,2.6,0,2.6z\" \/><\/symbol><symbol id=\"pause\" viewBox=\"0 0 26.6 32\"><g><polygon points=\"16,32 26.5,32 26.5,8.8 26.5,0 16,0\" \/><rect x=\"0.1\" y=\"0\" width=\"10.6\" height=\"32\" \/><\/g><\/symbol><symbol id=\"playlist\" viewBox=\"0 0 32 22.9\"><g><circle class=\"st11\" cx=\"2.3\" cy=\"20.6\" r=\"2.3\" \/><circle class=\"st11\" cx=\"2.3\" cy=\"11.4\" r=\"2.3\" \/><circle class=\"st11\" cx=\"2.3\" cy=\"2.3\" r=\"2.3\" \/><path class=\"st11\" d=\"M32,1.1C32,0.5,31.5,0,30.9,0H10.3C9.7,0,9.1,0.5,9.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V1.1z\" \/><path class=\"st11\" d=\"M32,10.3c0-0.6-0.5-1.1-1.1-1.1H10.3c-0.6,0-1.1,0.5-1.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V10.3z\" \/><path class=\"st11\" d=\"M32,19.4c0-0.6-0.5-1.1-1.1-1.1H10.3c-0.6,0-1.1,0.5-1.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V19.4z\" \/><\/g><\/symbol><symbol id=\"speaker-on\" viewBox=\"0 0 32 28.1\"><g><g><path d=\"M12.6,5L6.3,8.7H0.6C0.3,8.7,0,9,0,9.3V19c0,0.4,0.3,0.7,0.6,0.7h5.9l6.1,3.4c1.3,0.8,1.5,0.2,1.5-1.5V6.5C14.2,4.8,13.9,4.2,12.6,5z\" \/><\/g><path d=\"M18,23.1v-2.8c2.6,0,4.7-2.8,4.7-6.2S20.6,7.8,18,7.8V5c4.2,0,7.5,4,7.5,9S22.1,23.1,18,23.1z\" \/><path d=\"M21.3,28.1v-2.8c4.4,0,7.9-5,7.9-11.2S25.6,2.8,21.3,2.8V0C27.2,0,32,6.3,32,14C32,21.8,27.2,28.1,21.3,28.1z\" \/><\/g><\/symbol><symbol id=\"speaker-off\" viewBox=\"0 0 32 18.8\"><g><g><path d=\"M12.6,0.4L6.3,4H0.6C0.3,4,0,4.3,0,4.7v9.7c0,0.4,0.3,0.7,0.6,0.7h5.9l6.1,3.4c1.3,0.8,1.5,0.2,1.5-1.5V1.8C14.2,0.2,13.9-0.5,12.6,0.4z\" \/><\/g><polygon points=\"32,4.5 30.2,2.7 25.3,7.6 20.4,2.7 18.6,4.5 23.5,9.4 18.6,14.3 20.4,16.1 25.3,11.2 30.2,16.1 32,14.3 27.1,9.4 \" \/><\/g><\/symbol><symbol id=\"captions\" viewBox=\"0 0 32 16.2\"><g><path d=\"M8.6,16.2c-1.2,0-2.4-0.2-3.4-0.6c-1.1-0.4-2-0.9-2.7-1.6c-0.8-0.7-1.4-1.6-1.8-2.6C0.2,10.4,0,9.3,0,8.1c0-1.2,0.2-2.3,0.7-3.3s1-1.8,1.8-2.6C3.2,1.5,4.1,1,5.2,0.6S7.4,0,8.6,0c1,0,1.9,0.1,2.7,0.4c0.8,0.3,1.4,0.6,2,1.1c0.6,0.4,1.1,0.9,1.4,1.5c0.4,0.5,0.7,1.1,0.9,1.6l-4.1,1.9c-0.1-0.3-0.2-0.6-0.4-0.9C11,5.3,10.8,5,10.5,4.8c-0.3-0.2-0.6-0.4-0.9-0.5c-0.3-0.1-0.7-0.2-1-0.2C8,4.2,7.5,4.3,7,4.5C6.6,4.7,6.2,5,5.8,5.3C5.5,5.7,5.2,6.1,5.1,6.5C4.9,7,4.8,7.5,4.8,8.1c0,0.5,0.1,1.1,0.3,1.5c0.2,0.5,0.4,0.9,0.8,1.2c0.3,0.4,0.7,0.6,1.2,0.8C7.5,11.9,8,12,8.6,12c0.3,0,0.7-0.1,1-0.2c0.3-0.1,0.6-0.3,0.9-0.5c0.3-0.2,0.5-0.4,0.7-0.7c0.2-0.3,0.3-0.6,0.4-0.9l4.1,1.9c-0.2,0.5-0.5,1-0.9,1.6c-0.4,0.5-0.9,1-1.4,1.5c-0.6,0.4-1.2,0.8-2,1.1C10.5,16,9.6,16.2,8.6,16.2z\" \/><path d=\"M24.9,16.2c-1.2,0-2.4-0.2-3.4-0.6c-1.1-0.4-2-0.9-2.7-1.6c-0.8-0.7-1.4-1.6-1.8-2.6c-0.4-1-0.7-2.1-0.7-3.3c0-1.2,0.2-2.3,0.7-3.3c0.4-1,1-1.8,1.8-2.6c0.8-0.7,1.7-1.3,2.7-1.7C22.6,0.2,23.7,0,24.9,0c1,0,1.9,0.1,2.7,0.4c0.8,0.3,1.4,0.6,2,1.1c0.6,0.4,1.1,0.9,1.4,1.5C31.5,3.5,31.8,4,32,4.5l-4.1,1.9c-0.1-0.3-0.2-0.6-0.4-0.9c-0.2-0.3-0.4-0.5-0.7-0.7c-0.3-0.2-0.6-0.4-0.9-0.5c-0.3-0.1-0.7-0.2-1-0.2c-0.6,0-1.1,0.1-1.5,0.3c-0.5,0.2-0.9,0.5-1.2,0.8c-0.3,0.4-0.6,0.8-0.8,1.2c-0.2,0.5-0.3,1-0.3,1.5c0,0.5,0.1,1.1,0.3,1.5c0.2,0.5,0.4,0.9,0.8,1.2c0.3,0.4,0.7,0.6,1.2,0.8c0.5,0.2,1,0.3,1.5,0.3c0.3,0,0.7-0.1,1-0.2c0.3-0.1,0.6-0.3,0.9-0.5c0.3-0.2,0.5-0.4,0.7-0.7c0.2-0.3,0.3-0.6,0.4-0.9l4.1,1.9c-0.2,0.5-0.5,1-0.9,1.6c-0.4,0.5-0.9,1-1.4,1.5c-0.6,0.4-1.2,0.8-2,1.1C26.8,16,25.9,16.2,24.9,16.2z\" \/><\/g><\/symbol><symbol id=\"share\" viewBox=\"0 0 32 20\"><path d=\"M20,6c0,0-7.9-0.1-13.2,3.3C1.6,12.7,0,20,0,20s5.1-5.4,9.8-7.2C14.9,10.9,20,12,20,12v6l12-8L20,0V6z\" \/><\/symbol><symbol id=\"fullscreen\" viewBox=\"0 0 32 32\"><g><g><polygon class=\"st11\" points=\"11.4,0 0,0 0,11.4 3.4,8 9.1,13.7 13.7,9.1 8,3.4 \" \/><\/g><g><polygon class=\"st11\" points=\"20.6,32 32,32 32,20.6 28.6,24 22.9,18.3 18.3,22.9 24,28.6 \" \/><\/g><g><polygon class=\"st11\" points=\"32,11.4 32,0 20.6,0 24,3.4 18.3,9.1 22.9,13.7 28.6,8 \" \/><\/g><g><polygon class=\"st11\" points=\"0,20.6 0,32 11.4,32 8,28.6 13.7,22.9 9.1,18.3 3.4,24 \" \/><\/g><\/g><\/symbol><symbol id=\"video\" viewBox=\"0 0 32 22\"><g><path d=\"M29,2.2c-0.7,0.2-4.6,3-7.9,5.3V2.1C21.1,1,20.1,0,19,0H2.1C1,0,0,1,0,2.1v17.7C0,21,1,22,2.1,22H19c1.2,0,2.1-1,2.1-2.1v-5.9c3.3,2.4,7.4,5.4,8.2,5.6c1.4,0.4,2.7-0.1,2.7-0.1V2.2C32,2.2,30.1,1.8,29,2.2z\" \/><\/g><\/symbol><\/svg> <!-- video not found --><\/p>\n<p>The attacks haven&#8217;t stopped. Countries like China, Iran and Russia are <a href=\"https:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/item\/2139-statement-by-ncsc-director-william-evanina-election-threat-update-for-the-american-public\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">actively working to influence the 2020 presidential election through cyberattacks and social media<\/a>, the office of the director of national intelligence warned in a statement on Aug. 7.&nbsp;<\/p>\n<figure class=\"image image-medium pull-right hasCaption shortcode\" section=\"shortcodeImage\"><span class=\"imageContainer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cnet.com\/news\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/\" data-original=\"https:\/\/cnet2.cbsistatic.com\/img\/zIv2lXgEKznqjuvLQDx4V2k3XCk=\/644x0\/2020\/08\/18\/2d976a3b-d666-443b-8a06-3367f54e3bd5\/trump-by-getty-crop.jpg\" class=\" lazy\" alt=\"President Donald Trump\" height=\"0\" width=\"644\"><noscript><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet2.cbsistatic.com\/img\/zIv2lXgEKznqjuvLQDx4V2k3XCk=\/644x0\/2020\/08\/18\/2d976a3b-d666-443b-8a06-3367f54e3bd5\/trump-by-getty-crop.jpg\" class alt=\"President Donald Trump\" height=\"0\" width=\"644\"><\/noscript><\/span><figcaption><span class=\"caption\"><\/p>\n<p>President Donald Trump<\/p>\n<p><\/span><span class=\"credit\"> Doug Mills-Pool\/Getty Images <\/span><\/figcaption><\/figure>\n<p>The Senate committee&#8217;s report, published Tuesday, points out the extent of how intertwined the Trump campaign was with Russia&#8217;s interference efforts, as &#8220;campaign leadership reacted positively to the news that the DNC had been hacked by the Russians.&#8221;&nbsp;<\/p>\n<p>&#8220;At nearly 1,000 pages, Volume 5 stands as the most comprehensive examination of ties between Russia and the 2016 Trump campaign to date &#8212; a breathtaking level of contacts between Trump officials and Russian government operatives that is a very real counterintelligence threat to our elections,&#8221; Sen. Mark Warner, vice chairman of the committee, said in a statement.&nbsp;<\/p>\n<h3>Campaign links<\/h3>\n<p>Despite denials from Trump and his campaign about reaching out to WikiLeaks, the report found that the president had directed campaign officials to keep in touch with the organization for documents that would help his election bid.<\/p>\n<p>The coordination included the timing of leaking documents. In October 2016, when the Trump campaign learned of an Access Hollywood tape being made public, in which the <a href=\"https:\/\/www.washingtonpost.com\/politics\/trump-recorded-having-extremely-lewd-conversation-about-women-in-2005\/2016\/10\/07\/3b9ce776-8cb4-11e6-bf8a-3d26847eeed4_story.html\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">president described groping women<\/a>, Trump operative Roger Stone called for the &#8220;Podesta stuff&#8221; to be released to &#8220;balance the news cycle,&#8221; according to the report.&nbsp;<\/p>\n<p>Stone was referring to the <a href=\"https:\/\/www.cnet.com\/news\/hillary-clinton-goldman-sachs-speeches-leaked-paid-wikileaks-john-podesta-julian-assange\/\">thousands of emails stolen from Clinton adviser John Podesta<\/a>, which <a href=\"https:\/\/www.cbsnews.com\/news\/the-phishing-email-that-hacked-the-account-of-john-podesta\/\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">Russian hackers obtained in a spear-phishing attack<\/a>.&nbsp;<\/p>\n<p>About 30 minutes after the Access Hollywood tape was released, WikiLeaks published 2,050 emails from Podesta, which the Trump campaign used in its press releases and speeches.&nbsp;<\/p>\n<p>In multiple remarks, Trump praised WikiLeaks, calling the leaked documents a &#8220;treasure trove&#8221; and encouraging people to read the stolen documents.&nbsp;<\/p>\n<p>The campaign continued to use the stolen documents even after the US intelligence community assessed that they came from Russian hackers looking to interfere with the election.&nbsp;<\/p>\n<p>The report also found that then-campaign chairman Paul Manafort worked closely with Russian intelligence officer Konstantin Kilimnik, who the committee said was likely linked with the hacking efforts against the DNC.&nbsp;<\/p>\n<p>&#8220;While the GRU and WikiLeaks were releasing hacked documents, the Trump campaign sought to maximize the impact of those leaks to aid Trump&#8217;s electoral prospects,&#8221; the report said. &#8220;Staff on the Trump campaign sought advance notice about WikiLeaks releases, created messaging strategies to promote and share the materials in anticipation of and following their release, and encouraged further leaks.&#8221; &nbsp;<\/p>\n<h3>Russian denial&nbsp;<\/h3>\n<p>Even after learning that the leaked documents came from Russian hackers, the Trump campaign publicly denied the intelligence community&#8217;s findings.&nbsp;<\/p>\n<p>During a 2016 presidential debate, Trump <a href=\"https:\/\/www.cnet.com\/news\/russia-vs-400-pound-hacker-hillary-clinton-donald-trump-cyber-security-1st-presidential-debate\/\">suggested it could&#8217;ve been China behind the cyberattack<\/a>, a theory <a href=\"https:\/\/www.cnet.com\/news\/donald-trump-election-hack-claims-china-russia\/\">he echoed into 2017<\/a>.&nbsp;<\/p>\n<p>The president has also pushed a false narrative that Ukraine was behind the DNC hack, which <a href=\"https:\/\/www.cnet.com\/news\/cybersecurity-firm-crowdstrike-called-out-in-trump-ukraine-call-transcript\/\">he asked about during a 2019 call with Ukraine&#8217;s president<\/a>. The push to pin Russia&#8217;s hacking on Ukraine stemmed from Kilimnik, and made its way into the Trump campaign from his work with Manafort, according to the report.&nbsp;<\/p>\n<p>That effort continued on social media through Russia&#8217;s disinformation network, the committee said.&nbsp;<\/p>\n<p>WikiLeaks has also <a href=\"https:\/\/www.cnet.com\/news\/wikileaks-founder-julian-assange-calls-russia-hacking-report-embarrassing\/\">denied that it knew the documents came from Russia<\/a>, but the committee&#8217;s report noted that the organization &#8220;very likely knew it was assisting a Russian intelligence influence effort.&#8221; The evidence detailing that is redacted in the report.&nbsp;<\/p>\n<p>The report reveals the many ways Russian hackers were able to influence the 2016 presidential election, as a warning for future campaigns. While it was able to steal sensitive documents on its own, it relied on social networks like Twitter to spread the material, and a cooperative campaign to use the hacked emails.<\/p>\n<p>&#8220;This cannot happen again. As we head into the heat of the 2020 campaign season, I strongly urge campaigns, the executive branch, Congress and the American people to heed the lessons of this report in order to protect our democracy,&#8221; Warner said.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31499\/Senate-Committee-Finds-Trump-Campaign-Welcomed-Russian-Hacking-Help.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36691,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[2118],"class_list":["post-36690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusarussiafraudcyberwar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Senate Committee Finds Trump Campaign Welcomed Russian Hacking Help 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Senate Committee Finds Trump Campaign Welcomed Russian Hacking Help 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-19T16:35:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1092\" \/>\n\t<meta property=\"og:image:height\" content=\"787\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Senate Committee Finds Trump Campaign Welcomed Russian Hacking Help\",\"datePublished\":\"2020-08-19T16:35:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/\"},\"wordCount\":1000,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help.jpg\",\"keywords\":[\"headline,hacker,government,usa,russia,fraud,cyberwar\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/\",\"name\":\"Senate Committee Finds Trump Campaign Welcomed Russian Hacking Help 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help.jpg\",\"datePublished\":\"2020-08-19T16:35:25+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help.jpg\",\"width\":1092,\"height\":787},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,russia,fraud,cyberwar\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentusarussiafraudcyberwar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Senate Committee Finds Trump Campaign Welcomed Russian Hacking Help\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Senate Committee Finds Trump Campaign Welcomed Russian Hacking Help 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/","og_locale":"en_US","og_type":"article","og_title":"Senate Committee Finds Trump Campaign Welcomed Russian Hacking Help 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-19T16:35:25+00:00","og_image":[{"width":1092,"height":787,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Senate Committee Finds Trump Campaign Welcomed Russian Hacking Help","datePublished":"2020-08-19T16:35:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/"},"wordCount":1000,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help.jpg","keywords":["headline,hacker,government,usa,russia,fraud,cyberwar"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/","url":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/","name":"Senate Committee Finds Trump Campaign Welcomed Russian Hacking Help 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help.jpg","datePublished":"2020-08-19T16:35:25+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help.jpg","width":1092,"height":787},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/senate-committee-finds-trump-campaign-welcomed-russian-hacking-help\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,russia,fraud,cyberwar","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusarussiafraudcyberwar\/"},{"@type":"ListItem","position":3,"name":"Senate Committee Finds Trump Campaign Welcomed Russian Hacking Help"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36690"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36690\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36691"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}