A cyber attacker appears to have penetrated the Federal Bureau of Investigation (FBI) network.
Accordingly CNN (opens in new tab), citing two sources briefed on the matter. The still-unknown threat actor broke into a computer system at the New York Field Office used by the FBI to investigate cases of child sexual exploitation.
“The FBI is aware of the incident and is working to obtain additional information,” US law enforcement said in a statement to media. “This is an isolated incident that has been contained. As this is an ongoing investigation, the FBI is unable to comment further at this time.”
No details
This isn’t the first time the FBI has had to deal with a cyberattack on its own network. In late 2021, a threat actor managed to compromise the agency’s email address (opens in new tab) Inbox and send spam messages.
At that time, Beeping computer (opens in new tab) found that “tens of thousands” of spam messages were being sent out in waves [email protected]and that the messages reached at least 100,000 mailboxes.
> Here are the best endpoint protection services available today (opens in new tab)
> FBI email server hack was due to ‘bad code’ (opens in new tab)
> The FBI’s cyberthreat sharing portal stole member data (opens in new tab)
However, she took note of the suggestion from non-profit spam tracking organization SpamHaus that these numbers were rather conservative and that the reach was “potentially much, much larger”.
As a government agency, the FBI is subject to a constant barrage of cyberattacks. Government organizations are among the hardest hit in the world today, along with telecom companies, healthcare organizations and the education and learning industry.
Threat actors can attack these organizations with spam email messages that contain malware in attachments or offer phishing links where victims divulge their credentials and other sensitive information that can be used in the second phase of the attack.
- Check out the best SMB servers
Above: Beeping computer (opens in new tab)
This article was previously published on Source link