Latest news with #Mail.ru
Yahoo
29-03-2025
- Politics
- Yahoo
Investigating rumor claiming Pete Hegseth owned Russian email address
A rumor that several users circulated online in March 2025 claimed U.S. Secretary of Defense Pete Hegseth once owned the Russian email address phegseth@ The Russian technology company VK owns (archived) the email-provider website. (The domain name extension .ru pertains to Russia.) This rumor involved several pieces of data, all broken down in this article, including the latest chapter of rumors about Trump's association with Russian interests, the email address, information and passwords provided in past data breaches, a Princeton University email address matching Hegseth's first initial and last name, and the details of a user agreement. As of this writing, we were unable to locate enough evidence to conclusively link the Russian email address to the defense secretary. The Ukrainian publication Kyiv Post also extensively reported the facts of this matter. A White House spokesperson told Snopes by email, regarding the rumor, "That is fake." The Defense Department, Princeton University and VK did not yet respond to emails asking various questions that might yield more facts. On March 27, the German publication Der Spiegel reported a new development regarding the controversy of high-level members of U.S. President Donald Trump's administration, including Hegseth, using the Signal messaging app to discuss detailed plans to strike Houthi rebel targets in Yemen. The attack occurred on March 15. Der Spielgel published, "Now, reporting by DER SPIEGEL has found that the contact data of some of those officials, including mobile phone numbers, is freely accessible on the internet." The Atlantic's editor-in-chief, Jeffrey Goldberg, first reported the news of the Signal messages on March 24, after a member of the chat group accidentally added him to the highly-sensitive conversations. Two days following its initial reporting, The Atlantic published the messages from the chat group after Hegseth and other Trump administration officials attempted to discredit both Goldberg and his reporting, and after attempts to downplay the sensitive nature of the exchanges. Pekka Kallioniemi, whom the International Centre for Defence and Security in Estonia credits as an expert on social media and disinformation, posted (archived) on X of Der Spiegel's reporting, "Interesting article about how the Trump administration's security advisors' mobile numbers, emails, and passwords can be found in commercial databases and publicly available leaks." He then added, "My question is, why does Pete Hegseth have a Russian email address?" His post featured a screenshot of the email address phegseth@ with a blacked-out password. In another X user's post (archived), they remarked that, upon attempting to initiate a recovery of the account, displayed a partially obscured phone number with the +7 Russian country calling code, and ending in "83." They said, "The email is linked to a Russian phone number (+7) and a Proton inbox. Concerning. Looking into this." They also added (archived) that, according to the LeakPeek data breach search engine, the email address displayed the same password as phegseth@ Hegseth graduated from Princeton University in 2003, and "@ is an authentic (archived) email suffix for the institution. (One user noted the purported password matched some publicly available information pertaining to the initials and birth year for Hegseth's first wife.) Hours following Kallioniemi's post and minutes after the other user's posts, another user named Timofey V, whose X bio credited him as a member of the Global Fact-Checking Network, posted (archived) he had just registered the email address phegseth@ earlier on the same day, meaning it was available and not taken. His registration of the email address suggested that other users reporting about ties to a Russian phone number referenced the one Timofey V used to create the account just hours earlier. He told us in a direct message on X, "The one ending with 83 is mine." Timofey V, credited on his own website as a Russian international expert on anti-crisis communications and countering disinformation, confirmed with evidence in a message to Snopes — from phegseth@ — that he owned the email address. Searches of BreachDirectory, also a data breach search engine, identified both phegseth@ and phegseth@ as appearing in the data breach. The October 2016 hacking incident purportedly affected the data of 593 million people. Kallioniemi made note (archived) of the data breach materials showing the matching passwords. He wrote he believed Timofey V's new registration of the account indicated either that "the account was deleted by the owner or scrapped by the service," or that "the data itself is garbage, red herring, and it was added there by someone as a decoy." In a direct message on X, he said he would comment further about the matter on a later date. Assuming for a moment the authenticity of the 2016 data breach information, the observed password correlation potentially suggested an individual named P. Hegseth owned both email addresses at some point during or before 2016. This purported association theoretically could have persisted until the account was either deleted by the user or terminated by the email provider, potentially due to inactivity or other reasons, enabling Timofey V to register the same email address in March 2025. Or would it? page (archived) titled "User Agreement for the Mail service" specifically states in Section 5.4 that the email provider does not allow a second registration of an email address, even past a five-year period pertaining to a similar policy. The agreement reads, "The Service does not provide for the possibility of re-registering an electronic mailbox with a similar unique name, including after the expiration of the period specified in this paragraph." This policy suggested Hegseth never owned the email address. Aric Toler, a reporter for The New York Times' visual investigations team, expressed caution about the rumor in a thread on X. Toler posted (archived), in part, "Be a bit wary of these claims of Hegseth having a secret Russian email. I've ran into ghost and accounts made with usernames and passwords previously found in data leaks." He also added (archived) that the phegseth@ email address displayed in a list that "auto-populates ghost email addresses with previously leaked credentials," for example potentially drawing the information from the Princeton email address to create the account, even if it never existed. Snopes attempted to conduct an experiment in creating a account, deleting it entirely and then attempting to create the same email address a second time. However, failed to successfully delete the test account, even though the website displayed messages indicating a successful removal, thus not allowing us to complete the test. This article will receive updates should any further correspondence or facts come our way. For further reading, we have also broken down the story about Trump administration officials using a Signal group chat that included Goldberg to discuss the strikes in Yemen. Beuth, Patrick, et al. "Pete Hegseth, Mike Waltz, Tulsi Gabbard: Private Data and Passwords of Senior U.S. Security Officials Found Online." Der Spiegel, 27 Mar. 2025, BreachDirectory. Copp, Tara. "The Atlantic Releases the Signal Chat Showing Hegseth's Detailed Attack Plans against the Houthis." The Associated Press, 26 Mar. 2025, ---. "The Signal Attack Plan Messages: What We Do (and Don't) Know." The Associated Press, 25 Mar. 2025, Gambrell, Jon. "Suspected US Strikes Pummel Houthi-Controlled Areas of Yemen." The Associated Press, 28 Mar. 2025, Goldberg, Jeffrey. "The Trump Administration Accidentally Texted Me Its War Plans." The Atlantic, 24 Mar. 2025, Goldberg, Jeffrey, and Shane Harris. "Here Are the Attack Plans That Trump's Advisers Shared on Signal." The Atlantic, 26 Mar. 2025, "Increase in Spear-Phishing Attempts in Utah." Utah Department of Public Safety, 30 July 2018, LeakPeek - Home. " Group Rebranding into VK." VK, Orlova, Alisa. "Does Pentagon Chief Hegseth Have a Russian Email Account?" Kyiv Post, 28 Mar. 2025, "Pekka Kallioniemi." International Centre for Defence and Security (ICDS), "Princeton Updates Email Forwarding Service." Princeton Alumni, ".Ru Domain Name - Russia." Netim, "Russia Country Code 7." Worldometer, Tikkanen, Amy. "Pete Hegseth | Defense Secretary, Military Career, Tattoos, Book, & Wife." Britannica, Timofey V. Toosi, Nahal. "'This Is Completely Insane': A Reality Check About the Signal Chat Leak." Politico, 27 Mar. 2025, Twingate Team. "What Happened in the Data Breach?" Twingate, "User Agreement for the Mail Service — Help with Mail Services."


Telegraph
18-03-2025
- Business
- Telegraph
Analyst accused of ‘using home-working rules' to make almost £1m from insider trading
An analyst has been accused of using working-from-home rules to make nearly £1 million from insider trading. Redinel Korfuzi, 37, a former Janus Henderson research analyst, denies money laundering and conspiracy to commit insider dealing. His sister Oerta Korfuzi, 36, Rogerio de Acquini, 63, and Dema Almeziad, 40, also stand accused. Tom Forster, prosecuting for the Financial Conduct Authority, told the court that working from home allowed Mr Korfuzi to run the scheme from the Marylebone flat he shared with his sister. Mr Forster claimed the defendants took advantage of the 'cloak afforded by national-lockdown restrictions' to hatch their plan to carry out insider trading between January 2019 and March 2021. They are said to have netted £963,000 in relation to 11 companies' shares including Daimler, Jet2 and THG and Russian tech firm now known as VK. Mr Korfuzi is accused of misusing confidential information on these companies. Jamie Ross, who worked with Mr Korfuzi at Janus Henderson on European equities, told the court that company systems could be accessed remotely on personal desktops through a platform called Citrus. 'I used the Citrus platform from my own desktop device at home, and I think that Mr Korfuzi did the same', he said. 'Communication was one of the big challenges,' according to Mr Ross, who said he mostly spoke to Mr Korfuzi on WhatsApp. 'When you are quite literally beside each other [at the office] you discuss investments and potential investments routinely,' Mr Ross added. 'Once you're separated and [both working from home], those discussions [are] migrated to WhatsApp and to phone conversations, and to a certain extent to email or even instant messaging.' 'I would have expected him to drop it and move on' The fund manager was then taken through a list of the potential transactions through which Korfuzi is said to have profited through confidential information. Asked about a transaction involving a personal email service, between September 22 and October 2, 2020, Mr Ross said he had 'initial interest' in the transaction but 'would have quickly lost that interest when I found out the aim of the company'. Mr Forster asked: 'In terms of Mr Korfuzi's interest, would you have expected him to show much interest in this, in your view of it?' Mr Ross replied: 'It would have been very clear to him this was not something I would have sanctioned, and was an investment I would not have been interested in.' The prosecutor then asked Mr Ross about a transaction involving Jet2, between February 4 and February 12, 2021. Mr Ross replied that Janus Henderson did not have a position on the package holiday company, adding that the proposed transaction would not have interested him at all. 'What would you have expected him to have done?', Mr Forster asked. 'Drop it, move on - carry on with other research work he was conducting,' Mr Ross replied.