11/15/2021 / By News Editors
America’s top law enforcement agency has been hacked.
(Article by Jack Davis republished from WesternJournal.com)
Hackers managed to get into the Federal Bureau of Investigation’s external email system on Saturday, sending out thousands of spam emails warning about a cyberattack, according to The Washington Post.
The FBI admitted the hack, though the number of inboxes that received the emails was unclear Sunday. Some outlets like NBC News and The Hill reported at least 100,000 email addresses had received the messages.
“The FBI and CISA are aware of the incident this morning involving fake emails from an @ic.fbi.gov email account,” the FBI said in a statement. CISA is the acronym for the federal Cybersecurity and Infrastructure Security Agency.
“This is an ongoing situation, and we are not able to provide any additional information at this time. The impacted hardware was taken offline quickly upon discovery of the issue. We continue to encourage the public to be cautious of unknown senders and urge you to report suspicious activity to ic3.gov or cisa.gov,” the statement said.
The fake emails were first reported by The Spamhaus Project, an international nonprofit organization that tracks spam activity.
These emails look like this:
Sending IP: 153.31.119.142 (https://t.co/En06mMbR88)
From: [email protected]
Subject: Urgent: Threat actor in systems pic.twitter.com/NuojpnWNLh— Spamhaus (@spamhaus) November 13, 2021
The emails carried the subject line, “Urgent: Threat actor in systems” and were signed by a branch of the Department of Homeland Security that hasn’t existed for at least two years, NBC reported.
Some experts said the lack of malicious attachments on the phony emails could mean that the FBI was hacked by someone who did not have a plan to exploit the vulnerability.
“It could have just been a group or individuals looking to get some street cred to tout on underground forums,” Austin Berglas, a former assistant special agent in charge of cyber investigations conducted by the FBI’s New York office, told the Post.
“I would think that it would be some sort of criminal group or some sort of ‘hacktivist’ group” rather than a state backer, he said.
The server hacked was an external unclassified one used by FBI employees to communicate externally, said Berglas, who is now with the cybersecurity company BlueVoyant, according to the Post.
Hackers did not appear to have gained access to internal files containing classified information, he said.
The email cited a group called Dark Overlord, which is alleged to be involved in ransomware, and specifically named cybersecurity expert Vinny Troia, whose company, Night Lion Security, last year published an investigation of the Dark Overlord group, NBC reported.
Troia commented about the attack on Twitter.
“Should I be flattered that the kids who hacked the @FBI email servers decided to do it in my name?” he wrote.
Should I be flattered that the kids who hacked the @FBI email servers decided to do it in my name? https://t.co/U4wti1mNNI
— Vinny Troia, PhD (@vinnytroia) November 13, 2021
Berglas told the Post the incident is a scare, but not deeply damaging.
“It could have been a lot worse,” he told the newspaper. “When you have ownership of a trusted dot-gov account like that, it can be weaponized and used for pretty nefarious purposes. [The FBI] probably dodged a bullet.”
Read more at: WesternJournal.com
Tagged Under: big government, CISA, conspiracy, cyberattack, cybersecurity, cyberwar, deception, emails, fake emails, FBI, Glitch, Hacked, Homeland Security, national security
COPYRIGHT © 2017 FBICORRUPTION.NEWS
All content posted on this site is protected under Free Speech. FBICorruption.news is not responsible for content written by contributing authors. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. FBICorruption.news assumes no responsibility for the use or misuse of this material. All trademarks, registered trademarks and service marks mentioned on this site are the property of their respective owners.