WASHINGTON — Hillary Clinton’s private e-mail server, which stored some 55,000 pages of e-mails from her time as secretary of state, was the subject of attempted cyberattacks originating in China, South Korea and Germany after she left office in early 2013, according to a congressional document obtained by The Associated Press.
While the attempts apparently were blocked by a “threat monitoring” product that Clinton’s employees connected to her network in October 2013, there was a period of more than three months from June to October 2013 when that protection had not been installed, according to a letter from Sen. Ron Johnson, R-Wis., chairman of the Homeland Security and Government Affairs Committee.
Johnson’s letter to Victor Nappe, CEO of SECNAP, the company that provided the threat monitoring product, seeks a host of documents relating to the company’s work on Clinton’s server and the nature of the cyber intrusions detected.
Clinton has not said what, if any, firewall or threat protection was used on her e-mail server before June 2013, while the server was kept in her home in the New York City suburbs.
A February 2014 e-mail from SECNAP reported that malicious software based in China “was found running an attack against” Clinton’s server. In total, Senate investigators have found records describing three attempts linked to China, one based in Germany and one from South Korea. The attacks occurred in 2013 and 2014.
In June 2013, after Clinton had left office, the server was moved from her Chappaqua, N.Y., home to a data center in northern New Jersey, where it was maintained by a Denver company, Platte River Networks.
In June 2013, Johnson’s letter says, Platte River hired SECNAP Network Security Corp. to use a product called CloudJacket SMB, designed to block hackers. The product was not up and running until October.



