Yahoo under scrutiny after latest hack, Verizon seeks new deal terms

Yahoo logo on smartphone

By Greg Roumeliotis and Jessica Toonkel

NEW YORK (Reuters) – Yahoo Inc <YHOO.O> came under renewed scrutiny by federal investigators and lawmakers on Thursday after disclosing the largest known data breach in history, prompting Verizon Communications Inc <VZ.N> to demand better terms for its planned purchase of Yahoo’s internet business.

Shares of the Sunnyvale, California-based internet pioneer fell more than 6 percent after it announced the breach of data belonging to more than 1 billion users late on Wednesday, following another large hack reported in September.

Verizon, which agreed to buy Yahoo’s core internet business in July for $4.8 billion, is now trying to persuade Yahoo to amend the terms of the acquisition agreement to reflect the economic damage from the two hacks, according to people familiar with the matter.

The U.S. No. 1 wireless carrier still expects to go through with the deal, but is looking for “major concessions” in light of the most recent breach, according to another person familiar with the situation.

Asked about the status of the deal, a Yahoo spokesperson said: “We are confident in Yahoo’s value and we continue to work towards integration with Verizon.”

Verizon had already said in October it was reviewing the deal after September’s breach disclosure. Late on Wednesday, it said it would “review the impact of this new development before reaching any final conclusions” about whether to proceed.

The company declined to comment beyond that statement on Thursday.

Verizon has threatened to go to court to get out of the deal if it is not repriced, citing a material adverse effect, said the people familiar with the matter, who asked not to be identified because the negotiations are confidential.

No court in Delaware, where Yahoo is incorporated, has ever found that a material adverse effect has occurred that would allow companies to terminate a merger agreement.

Nevertheless, the threat of a court case on the issue has been successfully used by companies to renegotiate deals, and experts said that some concessions from Yahoo are likely, given the magnitude of the cyber security breaches.

Renegotiating the deal’s price tag would be the simplest but also least likely scenario because the impact of the data breaches will not be apparent for some time, according to Erik Gordon, a professor at the University of Michigan’s Ross School of Business.

A more likely concession would be for Yahoo to agree to compensate Verizon after the close of the deal, based on the liabilities that occur. The two companies may also agree to extend the close of the deal to allow for more time for information to come in on the impact of the breaches, Gordon suggested.

Verizon shares rose 0.4 percent to close at $51.81, in line with the S&P 500 Index <.SPX>. Yahoo closed down 6.1 percent at $38.41.

BIGGEST BREACH

Yahoo said late on Wednesday that it had uncovered a 2013 cyber attack that compromised data of more than 1 billion user accounts, the largest known breach on record.

It said the data stolen may have included names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers.

The company added that some of its partners were affected. One such partner, Europe’s Sky Plc <SKYB.L>, said Yahoo provides email services to its 2.1 million Sky.com email account holders, but it was unclear how many of those accounts were affected.

The announcement followed Yahoo’s disclosure in September of a separate breach that affected over 500 million accounts, which the company said it believed was launched by different hackers.

The White House said on Thursday the U.S. Federal Bureau of Investigation was probing the breach. Several lawsuits seeking class-action status on behalf of Yahoo shareholders have been filed, or are in the works.

Meanwhile, Democratic Senator Mark Warner of Virginia said he was looking into Yahoo’s cyber security practices.

“This most-recent revelation warrants a separate follow-up and I plan to press the company on why its cyber defenses have been so weak as to have compromised over a billion users,” he said in a statement.

Warner, who will become the top Democrat on the Senate Intelligence Committee next year, described the hacks as “deeply troubling.”

New York Attorney General Eric Schneiderman urged anyone with a Yahoo account to change their passwords and security questions and said he is examining the breach’s circumstances and the company’s disclosures to law enforcement.

Germany’s cyber security authority, the Federal Office for Information Security (BSI), advised German consumers to consider switching to safer alternatives for email, and criticized Yahoo for failing to adopt modern encryption techniques to protect users’ personal data.

“Considering the repeated cases of data theft, users should look more closely at which services they want to use in the future and security should play a part in that decision,” BSI President Arne Schoenbohm said in a statement.

The latest breach drew widespread criticism from security experts, several advising consumers to close their Yahoo accounts.

“Yahoo has fallen down on security in so many ways I have to recommend that if you have an active Yahoo email account, either direct with Yahoo of via a partner like AT&T, get rid of it,” Stu Sjouwerman, chief executive of cyber security firm KnowBe4 Inc, said in a broadly distributed email.

A Yahoo spokesperson, in response to criticism of the company’s security measures, said on Thursday: “We’re committed to keeping our users secure, both by continuously striving to stay ahead of ever-evolving online threats and to keep our users and platforms secure.”

(Reporting by Greg Roumeliotis and Jessica Toonkel in New York and Dustin Volz in Washington; Additional reporting by Liana Baker, Anna Driver, Eric Auchard and Michael Erman; Writing by Jim Finkle and Jonathan Weber; Editing by Bill Trott and Bill Rigby)

Germany sees increase in Russian propaganda, cyber attacks

hand in front of computer

BERLIN (Reuters) – Germany’s domestic intelligence agency on Thursday said it had seen a striking increase in Russian propaganda and disinformation campaigns aimed at destabilizing German society, and targeted cyber attacks against political parties.

“We see aggressive and increased cyber spying and cyber operations that could potentially endanger German government officials, members of parliament and employees of democratic parties,” Hans-Georg Maassen, head of the domestic BfV intelligence agency, said in statement.

Maassen, who raised similar concerns about Russian efforts to interfere in German elections in an interview with Reuters last month, cited what he called increasing evidence about such efforts and said further cyber attacks were expected.

The agency said it had seen a wide variety of Russian propaganda tools and “enormous use of financial resources” to carry out “disinformation” campaigns aimed at the Russian-speaking community in Germany, political movements, parties and other decision makers.

The goal of the effort was to spread uncertainty in society,”to weaken or destabilize the Federal Republic of Germany,” and to strengthen extremist groups and parties, complicate the work of the federal government and influence political dialogue.

The agency said it had seen a “striking increase” in spea-phishing attacks attributed to a Russian hacking group APT 28, also known as “Fancy Bear” or Strontrium, the same group blamed for the hack of the U.S. Democratic National Committee this year and a cyber attack on the German parliament in 2015.

The attacks were directed against German parties and members of parliament, the agency said, adding they were carried out by government bodies posing as “hacktivists”.

“Propaganda and disinformation, cyber attacks, cyber espionage and cyber sabotage are part of the hybrid threat facing western democracies,” Maassen said.

German officials have accused Moscow of trying to manipulate German media to fan popular angst over issues like the migrant crisis, weaken voter trust and breed dissent within the European Union so that it drops sanctions against Moscow.

But intelligence officials have stepped up their warnings in recent weeks, alarmed about the number of attacks.

Last month, German Chancellor Angela Merkel said she could not rule out Russia interfering in Germany’s 2017 election through Internet attacks and misinformation campaigns.

Russian officials have denied all accusations of manipulation and interference intended to weaken the European Union or to affect the U.S. presidential election.

U.S. intelligence officials had warned in the run-up to the Nov. 8 presidential election of efforts to undermine the credibility of the vote that they believed were backed by the Russian government.

(Reporting by Andrea Shalal and Sabine Siebold; Editing by Janet Lawrence)

FBI to gain expanded hacking powers as Senate effort to block fails

Password on Computer Screen

By Dustin Volz

WASHINGTON (Reuters) – A last-ditch effort in the Senate to block or delay rule changes that would expand the U.S. government’s hacking powers failed Wednesday, despite concerns the changes would jeopardize the privacy rights of innocent Americans and risk possible abuse by the incoming administration of President-elect Donald Trump.

Democratic Senator Ron Wyden attempted three times to delay the changes, which will take effect on Thursday and allow U.S. judges will be able to issue search warrants that give the FBI the authority to remotely access computers in any jurisdiction, potentially even overseas. His efforts were blocked by Senator John Cornyn of Texas, the Senate’s second-ranking Republican.

The changes will allow judges to issue warrants in cases when a suspect uses anonymizing technology to conceal the location of his or her computer or for an investigation into a network of hacked or infected computers, such as a botnet.

Magistrate judges can currently only order searches within the jurisdiction of their court, which is typically limited to a few counties.

In a speech from the Senate floor, Wyden said that the changes to Rule 41 of the federal rules of criminal procedure amounted to “one of the biggest mistakes in surveillance policy in years.”

The government will have “unprecedented authority to hack into Americans’ personal phones, computers and other devices,” Wyden said.

He added that such authority, which was approved by the Supreme Court in a private vote earlier this year, but was not subject to congressional approval, was especially troubling in the hands of an administration of President-elect Trump, a Republican who has “openly said he wants the power to hack his political opponents the same way Russia does.”

Democratic Senator Chris Coons of Delaware and Republican Senator Steve Daines of Montana also delivered speeches voicing opposition to the rule changes.

The U.S. Justice Department has pushed for the changes to the federal rules of criminal procedure for years, arguing they are procedural in nature and the criminal code needed to be modernized for the digital age.

In an effort to address concerns, U.S. Assistant Attorney General Leslie Caldwell wrote a blog post this week arguing that the benefits given to authorities from the rule changes outweighed any potential for “unintended harm.”

“The possibility of such harm must be balanced against the very real and ongoing harms perpetrated by criminals – such as hackers, who continue to harm the security and invade the privacy of Americans through an ongoing botnet, or pedophiles who openly and brazenly discuss their plans to sexually assault children,” Caldwell wrote.

A handful of judges in recent months had dismissed evidence brought as part of a sweeping FBI child pornography sting, saying the search warrants used to hack suspects’ computers exceeded their jurisdiction.

The new rules are expected to make such searches generally valid.

Blocking the changes would have required legislation to pass both houses of Congress, then be signed into law by the president.

(Reporting by Dustin Volz, editing by G Crosse)

Worldwide cyber-crime network hit in coordinated raids

Logo of the Cybercrime Intelligence Unit of Germany's Bundeskriminalamt (BKA) Federal Crime Office is pictured during a media day in Wiesbaden, Germany,

BERLIN (Reuters) – One of the world’s biggest networks of hijacked computers, which is suspected of being used to attack online banking customers, has been taken down following police swoops in 10 countries, German police said on Thursday.

In an internationally coordinated campaign, authorities carried out the raids on Wednesday, seized servers and website domains and arrested suspected leaders of a criminal organization, said police and prosecutors in northern Germany.

Officials said they had seized 39 servers and several hundred thousand domains, depriving criminals of control of more than 50,000 computers in Germany alone. These hijacked computers were used to form a “botnet” to knock out other websites.

Two people who are believed to have been the administrators of the botnet infrastructure known as “AVALANCHE” were arrested in Ukraine, investigators said. Another person was arrested in Berlin, officials added.

The strike came in the same week that hackers tried to create the world’s biggest botnet, or an army of zombie computers, by infecting the routers of 900,000 Deutsche Telekom with malicious software.

The attack failed but froze the routers, causing outages in homes, businesses and government offices across Germany on Sunday and Monday, Deutsche Telekom executives said.

Police said criminals had used the “AVALANCHE” botnet targeted in Wednesday’s international raids since 2009 to send phishing and spam emails. More than a million emails were sent per week with malicious attachments or links.

When users opened the attachment or clicked on the link, their infected computers became part of the botnet.

Investigators said the suspects had operated the commandeered network and made it available to other criminal groups, who had used it to send spam and phishing mails, defraud online banking user and to spread ransomware, a form of online extortion scheme.

Officials estimated worldwide damages at upward of several hundred million euros.

Authorities have identified 16 suspected leaders of the organization from 10 different countries.

A court in Verden, northern Germany, has issued arrest warrants for seven people on suspicion of forming a criminal organization, commercial computer fraud and other criminal offences.

The raids came after more than four years of intensive investigation by specialists in 41 countries.

(Reporting by Caroline Copley; Editing by Alison Williams)

China urges cooperation in governance of global internet

Attendees listen to a speech by China's President Xi Jinping shown on a screen during the opening ceremony of the third annual World Internet Conference in Wuzhen town of Jiaxing, Zhejiang province, China

By Catherine Cadell

WUZHEN, China (Reuters) – Chinese President Xi Jinping on Wednesday called for greater cooperation among nations in developing and governing the internet, while reiterating the need to respect so-called “cyber sovereignty”.

Speaking at an internet conference in Wuzhen, in the eastern province of Zhejiang, Xi and propaganda chief Liu Yunshan signaled a willingness to step up China’s role in global internet governance, seeking to rectify “imbalances” in the way standards across cyberspace are set.

“The development of the internet knows no international boundaries. The sound use, development and governance of the internet thus calls for closer cooperation,” Xi said in a video message at the start of China’s third World Internet Conference.

While China’s influence in global technology has grown, its ruling Communist Party led by Xi has presided over broader and more vigorous efforts to control, and often censor, the flow of information online.

China infamously operates the so-called “Great Firewall”, the world’s most sophisticated online censorship system, to block and attack Internet services the government deems unsavory.

Xi repeated China’s pledge to “promote equitable global internet governance” while upholding “cyber sovereignty”, or the right of countries to determine how they want to manage the internet.

China’s rubber stamp parliament adopted a controversial cybersecurity law this month that overseas critics say could shut foreign businesses out of various sectors in China.

More than 40 international groups and technology organizations have condemned the law, which introduces sweeping surveillance measures and local data storage requirements.

Beijing says the law was designed to root out cybercecurity threats in “critical” industries, and not to target foreign businesses.

China hopes to cooperate with other countries to develop international rules and standards for the internet “in a more balanced way”, said Liu, a member of the Party’s leading Politburo Standing Committee.

Insecurity in one corner of the internet was a risk to all, he warned.

“There can’t be national security for one country while there is insecurity in another. (Countries) can’t seek their own so-called ‘absolute security’ while sacrificing the security of another country,” Liu said.

(Editing by John Ruwitch and Clarence Fernandez)

Hired experts support claims St. Jude heart devices can be hacked

St. Jude Logo

By Jim Finkle

(Reuters) – Short-selling firm Muddy Waters said in a legal brief filed on Monday that outside cyber security experts it hired have validated its claim that St. Jude Medical Inc cardiac implants are vulnerable to potentially life-threatening cyber attacks.

Boutique cyber security firm Bishop Fox disclosed its findings in a 53-page report that was attached to a legal brief filed on Monday in U.S. district court in Minnesota on behalf of the short-sellers, who hired the firm to perform the work as they defend themselves in a lawsuit filed by St. Jude.

A representative for St. Jude was not immediately available for comment.

St. Jude filed the suit on Sept. 7 against Muddy Waters, cyber research firm MedSec Holdings and individuals affiliated with those companies. The suit accused the group of intentionally disseminating false information about St. Jude heart devices to manipulate its stock price, which fell 5 percent on the day they revealed their claims.

The defendants said in a filing released on Monday that the lawsuit is without merit, reiterating their claim that St. Jude Medical’s heart devices have “significant security vulnerabilities.”

The report from Bishop Fox said the firm was able to validate those claims.

“I found that Muddy Waters’ and MedSec’s statements regarding security issues in the St. Jude Medical implant ecosystem were, by and large, accurate,” Bishop Fox Partner Carl Livit said in an introduction to the report.

The report said that the wireless communications protocol used in St. Jude cardiac devices is vulnerable to hacking, making it possible for hackers to convert the company’s Merlin@home patient monitoring devices into “weapons” that can cause cardiac implants to stop providing care and deliver shocks to patients.

Bishop Fox tested the attacks from 10 feet (3 meters) away, but said that might be extended to 45 feet (13.7 meters) with an antenna, or 100 feet (30.5 meters) with a transmitting device known as a software defined radio.

(Reporting by Jim Finkle; Editing by Will Dunham)

U.S. vote authorities warned to be alert to Russian hacks faking fraud: officials

Sample ballot

By David Rohde and Mark Hosenball

(Reuters) – U.S. intelligence and law enforcement officials are warning that hackers with ties to Russia’s intelligence services could try to undermine the credibility of the presidential election by posting documents online purporting to show evidence of voter fraud.

The officials, who spoke on condition of anonymity, said however, that the U.S. election system is so large, diffuse and antiquated that hackers would not be able to change the outcome of the Nov. 8 election.

But hackers could post documents, some of which might be falsified, that are designed to create public perceptions of widespread voter fraud, the officials said.

They said that they did not have specific evidence of such a plan, but state and local election authorities had been warned to be vigilant for hacking attempts.

On Oct. 7, the U.S. government formally accused Russia for the first time of a campaign of cyber attacks against Democratic Party organizations to interfere with the election process.

U.S. officials familiar with hacking directed against American voting systems said evidence indicates that suspected Russian government-backed hackers have so far tried to attack voter registration databases operated by more than 20 states. Tracing the attacks can be difficult but breaches of only two such databases have been confirmed, they said.

The officials said there is no evidence that any hackers have succeeded in accessing equipment or databases used to record votes. Many states use systems that would be difficult to hack or defraud, including paper ballots which initially are tallied by machines.

U.S. elections are run by state and local officials, not the federal government. On Nov. 8, votes will be cast in hundreds of thousands of polling stations in 9,000 different jurisdictions, according to the National Association of Secretaries of State.

The U.S. officials declined to comment on Republican candidate Donald Trump’s contention that the election is being “rigged.” Trump said in the third and final presidential debate with Democratic candidate Hillary Clinton on Wednesday night that he would not say until the election results were known whether or not he would accept the outcome.

Trump and his campaign officials have repeatedly said that the potential for voter fraud remains high but they have not provided any evidence.

On Thursday, Trump said he would accept the results of the election “if I win.” He said he reserved the “right to contest or file a legal challenge in the case of a questionable result.”

Clinton supporters said Trump is unwittingly aiding an effort by Russian President Vladimir Putin to undercut the credibility of the vote. Washington and Moscow are at odds over several issues, from Russian involvement in the Ukraine conflict, the war in Syria and cyber attacks.

“Trump does not even know he is being manipulated,” said Michael Morell, a former deputy CIA director who has endorsed Clinton. “Trump is an unwitting agent of Putin.”

(Reporting By David Rohde in New York and Mark Hosenball; in Washington; editing by Grant McCool)

British banks keep cyber attacks under wraps to protect image

worker going to Canary Wharf Businesses

By Lawrence White

LONDON (Reuters) – Britain’s banks are not reporting the full extent of cyber attacks to regulators for fear of punishment or bad publicity, bank executives and providers of security systems say.

Reported attacks on financial institutions in Britain have risen from just 5 in 2014 to 75 so far this year, data from Britain’s Financial Conduct Authority (FCA) show.

However, bankers and experts in cyber-security say many more attacks are taking place. In fact, banks are under almost constant attack, Shlomo Touboul, Chief Executive of Israeli-based cyber security firm Illusive Networks said.

Touboul cites the example of one large global financial institution he works with which experiences more than two billion such “events” a month, ranging from an employee receiving a malicious email to user or system-generated alerts of attacks or glitches.

Machine defenses filter those down to 200,000, before a human team cuts that to 200 “real” events a month, he added.

Banks are not obliged to reveal every such instance as cyber attacks fall under the FCA’s provision for companies to report any event that could have a material impact, unlike in the U.S. where forced disclosure makes reporting more consistent.

“There is a gray area…Banks are in general fulfilling their legal obligations but there is also a moral requirement to warn customers of potential losses and to share information with the industry,” Ryan Rubin, UK Managing Director, Security & Privacy at consultant Protiviti, said.

SWIFT ACTION

Banks are not alone in their reluctance to disclose every cyber attack. Of the five million fraud and 2.5 million cyber-related crimes occurring annually in the UK, only 250,000 are being reported, government data show.

But while saving them from bad publicity or worried customers, failure to report more serious incidents, even when they are unsuccessful, deprives regulators of information that could help prevent further attacks, the sources said.

A report published in May by Marsh and industry lobby group TheCityUK concluded that Britain’s financial sector should create a cyber forum comprising bank board members and risk officers to promote better information sharing.

Security experts said that while reporting all low level attacks such as email “phishing” attempts would overload authorities with unnecessary information, some banks are not sharing data on more harmful intrusions because of concerns about regulatory action or damage to their brand.

The most serious recent known attack was on the global SWIFT messaging network in February, but staff from five firms that provide cyber security products and advice to banks in Britain told Reuters they have seen first-hand examples of banks choosing not to report breaches, despite the FCA making public pleas for them to do so, the most recent in September.

“When I moved from law enforcement to banking and saw what banks knew, the amount of information at their disposal, I thought ‘wow’, I never had that before,” Troels Oerting, Group Chief Information Security Officer at Barclays and former head of Europol’s Cyber Crime Unit, said.

Oerting, who joined Barclays in February last year, said since then banks’ sharing of information with authorities has improved dramatically and Barclays shares all its relevant information on attacks with regulators.

Staff from five firms that provide cyber security products and advice to banks in Britain told Reuters they have seen first-hand examples of banks choosing not to report breaches.

“Banks are dramatically under-reporting attacks, they do what’s legally required but out of embarrassment or fear of punishment they aren’t giving the whole picture,” one of the sources, who declined to be named because he did not want to be identified criticizing his firm’s customers, said.

Apart from Barclays, the other major British banks all declined to comment on their disclosures.

The Bank of England declined to comment and the FCA did not respond to requests for comment.

KEEPING SECRETS

Companies that use external security systems also do not always inform them of attacks, the sources said.

“Our customers sometimes detect attacks but don’t tell us,” Touboul, whose firm helps protect banks’ SWIFT payment networks by luring attackers to decoy systems, said.

Hackers used the bank messaging system that helps transmit billions of dollars around the world every day to steal $81 million in one of the largest reported cyber-heists.

Targeted attacks, in which organized criminals penetrate bank systems and then lurk for months to identify and profile key executives and accounts, are becoming more common, David Ferbrache, technical director Cybersecurity at KPMG and former head of cyber and space at the UK Ministry of Defended, said.

“The lesson of the SWIFT attack is that the global banking system is heavily interconnected and dependent on the trust and security of component members, so more diligence in controls and more information sharing is vital,” Ferbrache said.

“Big banks are spending enormous amounts of money, $400-500 million a year, but there are still vulnerabilities in their supply chains and in executives’ home networks, and organized crime groups are shifting their focus accordingly,” Yuri Frayman, CEO of Los Angeles-based cyber security provider Zenedge, said.

BRAND DAMAGE

Banks are increasingly sensitive to the brand damage caused by IT failings, perceiving customers to care just as deeply about security and stable service as loan or deposit rates.

Former RBS Chief Executive Stephen Hester waived his bonus in 2012 over a failed software update which caused chaos for thousands of bank customers.

And HSBC issued multiple apologies to customers after its UK personal banking websites were shuttered by a distributed denial of service (DDoS) attack, following earlier unrelated IT glitches.

“People don’t care about a 0.1 percent interest rate change but ‘will this bank do the utmost to keep my money and information safe?'” Oerting said.

(Editing by Sinead Cruise and Alexander Smith)

Dozens of U.S. lawmakers request briefing on Yahoo email scanning

Yahoo Mail logo

By Dustin Volz

WASHINGTON (Reuters) – A bipartisan group of 48 lawmakers in the U.S. House of Representatives on Friday asked the Obama administration to brief Congress “as soon as possible” about a 2015 Yahoo <YHOO.O> program to scan all of its users’ incoming email at the behest of the government.

The request comes amid scrutiny by privacy advocates and civil liberties groups about the legal authority and technical nature of the surveillance program, first revealed by Reuters last week. Custom software was installed to search messages to hundreds of millions of accounts under an order issued by the secretive Foreign Intelligence Surveillance Court.

“As legislators, it is our responsibility to have accurate information about the intelligence activities conducted by the federal government,” according to the letter, organized by Republican Representative Justin Amash of Michigan and Democratic Representative Ted Lieu of California.

“Accordingly, we request information and a briefing as soon as possible for all members of Congress to resolve the issues raised by these reports.”

Investigators searched for messages that contained a single piece of digital content linked to a foreign state sponsor of terrorism, sources have told Reuters, though the nature of the content remains unclear.

Intelligence officials said Yahoo modified existing systems used to stop child pornography and filter spam messages on its email service.

But three former Yahoo employees told Reuters the court-ordered search was done by a module buried deep near the core of the company’s email server operation system, far below where mail sorting was handled.

The Senate and House intelligence committees were given a copy of the order when it was issued last year, sources said, but other members of Congress have express concern at the scope of the email scanning.

Some legal experts have questioned the breadth of the court order and whether it runs afoul of the U.S. Constitution’s Fourth Amendment protections against unreasonable searches.

Half of registered U.S. voters believe the Yahoo program violated the privacy of customers, according to a poll of 1,989 people conducted last week by Morning Consult, a polling and media company.

Twenty-five percent were supportive of the program because of its potential to stop criminal acts, the survey found, while another quarter did not know or had no opinion.

The congressional letter is addressed to Attorney General Loretta Lynch and Director of National Intelligence James Clapper.

(Additional reporting by Mark Hosenball and Joseph Menn; Editing by Jeffrey Benkoe)

Putin says U.S. hacking scandal not in Russia’s interests

Russian President Vladimir Putin delivers a speech during the annual VTB Capital "Russia Calling!" Investment Forum in Moscow, Russia,

MOSCOW (Reuters) – The scandal that erupted in the United States over allegations Russia hacked Democratic Party emails has not been in Moscow’s interests and both sides in the U.S. election campaign are just using Russia to score points, Vladimir Putin said on Wednesday.

The U.S. government on Friday formally accused Russia for the first time of a campaign of cyber attacks against Democratic Party organizations ahead of the Nov. 8 presidential election.

And the White House said on Tuesday it would consider a variety of responses to the alleged hacks.

“They started this hysteria, saying that this (hacking) is in Russia’s interests. But this has nothing to do with Russia’s interests,” President Putin told a business forum in Moscow.

Putin said the accusations were a ploy to divert U.S. voters’ attention at a time when public opinion was being manipulated.

“Everyone is talking about ‘who did it’ (the hacking),” said Putin. “But is it that important? The most important thing is what is inside this information.”

The Kremlin said earlier on Wednesday it took a negative view of White House statements about a planned “proportional” response to the alleged cyber attacks.

Putin complained that all sides in the U.S. presidential race were misusing rhetoric about Russia for their own ends, but said Moscow would work with whoever won the election “if, of course, the new U.S. leader wishes to work with our country”.

“About a decade ago, they wouldn’t mention Russia at all, because it was not even worth talking about, such a third-rate regional power and not interesting at all. Now Russia is problem number one in the entire election campaign,” said Putin.

“All they do is keep talking about us. Of course it’s pleasant for us, but only partly because all participants are misusing anti-Russian rhetoric and poisoning our bilateral relations.”

(Reporting by Katya Golubkova and Alexander Winning; Writing by Christian Lowe; Editing by Andrew Osborn)