After Three Suggestions of Doctored Data, Alfa Bank Claims They’re Being Framed

Remember this article from CNN that renewed the Alfa Bank funny server story? It totally pissed me off for the way it cited about seven people telling it there was no there there, and then reporting that there was based off one identified source (a US official, who could be a member of Congress) and other non-identified ones.

In addition, it claimed that Dick DeVos leads Spectrum Health — my local hospital. DeVos is currently Chairman of the Board, but the company is “led” by CEO and President Rick Breon. DeVos “leads” a company called Windquest Group, which invests in boutique things like an excellent wine bar and the fancy gym I belonged to before I joined the Y. The DeVos family “owns” a lot more, notably RDV Corporation, through which they own and mismanage the Orlando Magic. There are probably a jillion servers associated with RDV corporation that could (and probably do!) conduct secret communications. Which is another way of saying that if Dick DeVos wanted to conduct secret conversations with Donald Trump at a time when he was attracting attention because he was not yet even donating money to the candidate, he might have done it via a server more directly operated by his family. Hell, since DeVos spooked up brother-in-law Erik Prince was supporting Trump at that time of the weird server activity, why wouldn’t we expect spooky conversations to happen from one of Prince’s far-flung spook properties?

But perhaps the funniest part of the CNN story is that it pointed to evidence the story had been packaged — but it didn’t seem to understand that.

Other computer experts said there could be additional lookups that weren’t captured by the original leak. That could mean that Alfa’s presence isn’t as dominant as it seems. But Dyn, which has a major presence on the internet’s domain name system, spotted only two such lookups — from the Netherlands on August 15.

If there were lookups not recorded in the publicly released data — even if there were just two of them — then it shows that the publicly released data is incomplete.

Other outlets say was even more data sometimes excluded from the public story. The Intercept cataloged how different sets of material purportedly backing this story include different sets of IP addresses.

On Tea Leaves’ WordPress site, he claimed that “only two networks resolved the host.” This is contradicted by the very works of analysis furnished by Tea Leaves’ collaborators: The author of the white paper found that at least 19 IP addresses, all belonging to different networks except for the two that belong to Alfa Bank, had looked up Trump’s server. And these are only the 19 the author was able to observe in a short time period — it can’t be ruled out that there were many more, which quickly deflates the portrait of a shady Russian backchannel.

The white paper included DNS look-up data, but not nearly enough to reproduce the results. Rather than the 19 IP addresses we expected to see, the data only included three, and the DNS look-ups were not for the same time period that the paper described. Tea Leaves published a different set of data on the dark web, which we also looked at, but this set of data only included a total of four IP addresses. When we pressed Tea Leaves for the complete set of data so we could attempt to reproduce the analysis, he gave us a new, more comprehensive set of data, but still that included a total of only eight IP addresses, and it was missing an IP address belonging to a VPN service in Utah that accounted for a significant portion of the DNS look-ups described in the paper.

And Robert Graham states that a source of his says the data for June — one of the key months in question — was altered.

Tea Leaves and Jean Camp are showing logs of private communications. Where did these logs come from? This information isn’t public. It means somebody has done something like hack into Alfa Bank. Or it means researchers who monitor DNS (for maintaing DNS, and for doing malware research) have broken their NDAs and possibly the law.

The data is incomplete and inconsistent. Those who work for other companies, like Dyn, claim it doesn’t match their own data. We have good reason to doubt these logs. There’s a good chance that the source doesn’t have as comprehensive a view as “Tea Leaves” claim. There’s also a good chance the data has been manipulated.

Specifically, I have as source who claims records for were changed in June, meaning either my source or Tea Leaves is lying.

Until we know more about the source of the data, it’s impossible to believe the conclusions that only Alfa Bank was doing DNS lookups.

Here’s his latest post on this issue.

All the different sets of data (and the way the data was culled without evidence about how that was done), plus the fact that the entity behind this story goes by the name “Tea Leaves” and now refuses to talk to anyone about it, really ought to raise questions about a hoax. But not CNN. For CNN it was all proof of something there.

Now CNN reports that once in February and increasingly since CNN’s story about a non-story, someone has been spoofing lookups from Trump to Alfa.

[O]n Friday, Alfa Bank claimed hackers are now trying to perpetuate that suspicion by tricking the Trump Organization into sending communication toward the bank.


One attack happened on February 18, the bank said. (The bank did not mention that to CNN before its story published on March 10.)

After CNN published its story about the puzzling Trump-Alfa situation, hackers stepped up their attack on the Trump Organization with “spoofed” signals for five hours, which were then directed back towards the bank, Alfa Bank said.

Hackers continued this attack on March 13, the bank said.

The bank contacted the FBI and offered “complete co-operation in finding the people behind attempted cyberattacks.” A US law enforcement official confirmed that the FBI was contacted.


According to Alfa Bank’s description of recent events, hackers have recently tricked a Trump Organization computer server into sending internet traffic to Alfa Bank.

Hackers have “manufactured this deceit by ‘spoofing’ or falsifying DNS lookups to create the impression of communication between Alfa Bank and the Trump Organization,” the bank said in a statement.

Alfa Bank offered this analogy: “A simple analogy would be someone in the U.S. sending an empty envelope… to a Trump office… addressed to Trump, but on the back of the envelope the return address is Russia… instead of its own real address.”

“So, on cursory examination, Alfa Bank appears to have been receiving responses to queries it never actually sent.”

Alex McGeorge, head of threat intelligence at cybersecurity firm Immunity, said this is a prank “that is simple to do from pretty much any internet connected computer. We could probably manufacture this from a Starbucks.”

That someone is trying to manufacture something out of nothing here should not be surprising. There’s abundant reason to believe that’s what was always happening. And now that the FBI has been called back in by Alfa, I do hope they find an explanation about whether this is a Hillary person trying to taint Trump or Russia trying to do a limited hangout on other more damaging Alfa stuff. Maybe both have been faking this story at different times?

In any case, at this point, the story should be about why this story got packaged in the way it did, as much as any questions about how Trump sends spam around the world.

Update: Here’s the press release from Alfa. They’re also calling the larger story a hoax.

Alfa Bank’s working hypothesis is that an individual — possibly well known in internet research circles — may have fed selected DNS data to an anonymous cyber group to ensure they reached a specific (and erroneous) conclusion. Alternatively, the cyber group may have been complicit in the deceit. In the most recent cases, unknown individuals demonstrably attempted to insert falsified records onto Alfa Bank’s computer systems designed to create the same impression.

An Alfa Bank spokesperson said: «The anonymous cyber group, which is led according to news accounts by ‘Tea Leaves,’ cannot produce evidence of a link because there never has been one. Alfa Bank believes that it is under attack and has pledged its complete cooperation to U.S. authorities to find out who is behind these malicious attacks and false stories.»

19 replies
  1. seedeevee says:

    “That someone is trying to manufacture something out of nothing here should not be surprising.”


    Not surprising at all.

    • SpaceLifeForm says:

      I do not want to be redundant, but I must!

      You CAN NOT TRUST the internet.

      Especially DNS.

      (Picture old man hollering at clouds)

      But DNS is really, really bad. 99% of DNS lookups are over UDP and it is not secured.

      *ANY* upstream router (And I mean *ANY*) can intercept your DNS lookup and return forged results (Think fake news on steroids).

      Then with an attacker that clones and forges your website, redirects via the MITM on DNS to their fake site…

      (the list of possible problems too long)

      • SpaceLifeForm says:

        OT? I can not tell if this is coming from the ew server or cloudflare. (note that cf is intercepting the dns so …)

        Been seeing this periodically lately:

        Error establishing a database connection

  2. PeasantParty says:

    I’ve said this before, but need to say it again.  No matter how you feel about Trump, this back stabbing, back door, in the dark take down is VERY dangerous.  Yes, I do believe it is a group running around in the dark trying to remove the President.  If he is assassinated, or framed, after the JFK history the public will never believe it.  Every Elite/CIA take down of a leader has always resulted in a Military Junta rule, or Despot leader in other countries.  Why would we think it would be different in the US?  I certainly don’t.  Whatever is done, clearly they see Trump as a threat to their mode of operation.

  3. SpaceLifeForm says:

    OT: The ZeroDayInitiative (pwn2own) results by platform.

    Windows – 13
    OSX – 6
    Linux – 1

    Note that a low score is better.

  4. SpaceLifeForm says:

    SS7 (the Mother of Metadata)
    “Last year, researchers demonstrated an attack on the phone of Rep. Ted Lieu (D-Calif.) using this technique, prompting Lieu to call on congressional leaders to address the issue.
    Now, a year later, Lieu and Sen. Ron Wyden (D-Ore.) have sent a letter to John F. Kelly, secretary of Homeland Security, to detail what the department has done to address the SS7 problem and whether the federal government understands how this vulnerability could be used for surveillance.”

  5. SpaceLifeForm says:

    Sen. Rand Paul does not understand the technology.  He does not realize that any phone can be tapped in seconds if you have access to the SS7 signaling network.  There is no ‘handful of people’.  Likely thousands.

    He may be familiar with three-way calling.

    He probably is not aware that it can be more than three.  He probably does not even know what SS7 is.  He will not be able to ‘bring them all in’.  He has been snowed by IC and their previous “testimony”.

    “It is very, very important that whoever released that go to jail, because you cannot have members of the intelligence community listening to the most private and highly classified information and then releasing that to the New York Times,” Paul said. “There can only be a certain handful of people who did that. I would bring them all in. They would have to take lie-detector tests.



  6. martin says:

    Alexa.. reup my order for popcorn. Same delivery schedule, by drone. *makes tin foil hat, pours first drink at 7am* gonna be a looooong day.

    • greengiant says:

      9:15 AM EDT,  Trump tweets again,  about 400 replies a minute,  the majority of them resistance or neocon bots.  WTF.   What happened to all the Putin twitter bots?  Where’s the beef?  Like nothing real is happening this morning.

  7. qpl23 says:

    I saw a link to the log data I think these claims are based on, at

    One of the pages linked from there: has some interesting log entries referring to a hostname:

    The explanation given on the site is:

    “This query is unusual in that is merges two hostnames into one. It makes the most sense as a human error in inserting a new hostname in some dialog window, but neglected to hit the backspace to delete the old hostname. Of course, this runon hostname doesn’t exist; it’s just two hostnames run together. Some 90 seconds later, the networks stopped talking about this host (at 2016-09-23T13:56:29.000Z), and further queries were not seen. But the brief minute life of the query associates the trump-email server to a new zone: the Alfa Bank intranet network. “

    But to anyone familiar with how dns and mail work, the most (overwhelmingly) likely cause of such a “run-on” hostname being looked up is a misconfiguration in the MTA (mail transfer agent, or ‘mail server software’) – a common class of error well known to systems administrators.

    See, for example, “why is sendmail appending my hostname to an unknown destination domain?” at

    So, I would be wondering: if this is obvious to a lowly ex-sysadmin like me, why do all the security experts consulted by the owner of not point it out? It kind of reeks of selective treatment of evidence somewhere along the line.

    • lefty665 says:

      From EW’s initial post through the links you provide it looks like TRUMP RUSSIAN BANK is hysterical Dem propaganda. Poor little Lititz, Pa, mislocated into Trump tower, and like Rodney Dangerfield, can’t get no respect. Makes one wonder if “Tea Leaves” real name might be “Hillary” or one of her disciples.

  8. SpaceLifeForm says:

    Comey and what he did NOT say:

    Comey: “I have no information that supports those tweets”

    [Maybe because you are out the loop?]

    Comey: “we need to make sure we don’t give other people clues to where we are going.”

    [Maybe because you are swamped with misinformation and do not know how to proceed?]

    [Most likely, his testimony is misdirection]






    • lefty665 says:

      Think you’re right. “Out of the loop”, and in more ways than one.

      Perhaps high level (DNI/CIA/NSA) encouragement for GCHQ to root around in NSA’s intercept data they share. It is not a violation of British law to examine US communications. If requested discreetly there is not much chance it will show up in FBI bumbling or Congressional hearings. Curious that GCHQ chief Hannigan abruptly decided to spend more time with his family, perhaps just after Downing St. figured out what was up.

      I’m sure it’s just a coincidence that Obama is as far away from D.C. as he can be in French Polynesia, about half way around the globe, while this is going on.


Comments are closed.