The DNC hacking story just took another strange turn. According to the BBC, alleged Russian hackers responsible for infecting DNC systems, used servers linked to a company based in Pakistan.

“BBC says a server whose IP was hard-coded into the virus found on the DNC’s server traces to a company called Crookservers that is based in PAKISTAN, run by a guy named Usman Ashraf,” tweeted the Daily Caller’s Luke Rosiak.

BBC says a server whose IP was hard-coded into the virus found on the DNC's server traces to a company called Crookservers that is based in PAKISTAN, run by a guy named Usman Ashrafhttps://t.co/uQvYVvYjso — Luke Rosiak (@lukerosiak) December 22, 2017

BBC reports:

TRENDING: OUTRAGEOUS! Ohio State University President Sends Ignorant Text Message to Students Following Breonna Taylor Decision -- And a Crazy-Ass Video!

When Russia’s most notorious hackers hired servers from a UK-registered company, they left a trove of clues behind, the BBC has discovered. The hackers used the computers to attack the German parliament, hijack traffic meant for a Nigerian government website and target Apple devices. […] The group played a key role in 2016’s attack on the US’s Democratic National Committee (DNC), according to security experts. Indeed an internet protocol (IP) address that once belonged to a dedicated server hired via Crookservers was discovered in malicious code used in the breach But after a short period, the listing switched to Pakistan. The BBC has seen no evidence the shop or its employees knew how the address was being used or that Crookservers had any real connection to the newsagent’s. […] The BBC identified Crookservers’s operator as Usman Ashraf.

At this point, little is known as to why Crookservers was later moved to Pakistan.

Ashraf refused to participate in a telephone interview with the BBC, instead writing via email that the hackers were eventually banned from using Crookservers.

“We never know how a client is using the server,” Ashraf claimed.

In November, WikiLeaks released ‘Vault 8,’ a series of documents detailing how the CIA developed code to impersonate Russian anti-virus giant ‘Kaspersky Labs.’ The mainstream media refuses to include WikiLeaks’ findings in its reporting on alleged Russian hackers breaching the DNC’s network.

New WikiLeaks publication reveals CIA wrote code to impersonate Kaspersky Labs anti-virus company https://t.co/EvE8GdyAmM pic.twitter.com/geigDgIDsk — WikiLeaks (@wikileaks) November 9, 2017

RT reports:

WikiLeaks says it has published the source code for the CIA hacking tool ‘Hive,’ which indicates that the agency-operated malware could mask itself under fake certificates and impersonate public companies, namely Russian cybersecurity firm Kaspersky Lab.