The U.S. Federal Bureau of Investigation has confirmed that it’s investigating malicious cyber activity on its own network.
CNN reported on Friday that hackers compromised an FBI computer system at the agency’s New York field office, citing people briefed with the matter. The brief report added that the incident involved a computer system used in investigations of images of child sexual exploitation.
In a statement given to TechCrunch, FBI spokesperson Manali Basu confirmed that the agency had contained the “isolated incident,” which it continues to investigate.
“The FBI is aware of the incident and is working to gain additional information,” the spokesperson said. “This is an isolated incident that has been contained. As this is an ongoing investigation the FBI does not have further comment to provide at this time.”
There remains a number of unknowns about the incident. It’s not immediately clear when the intrusion occurred, or how the FBI was compromised. The nature of the incident, which doesn’t appear to have yet been claimed by any major cybercriminal organization, also remains unclear at the time of publication.
Last week, the video game giant Riot Games revealed that hackers had compromised its “development environment” — where the company stores its source code — with a social engineering attack. While the company reassured its users that “there is no indication that player data or personal information was obtained,” the hack could still be damaging, as hackers […]
Thousands of Norton LifeLock customers had their accounts compromised in recent weeks, potentially allowing criminal hackers access to customer password managers, the company revealed in a recent data breach notice. In a notice to customers, Gen Digital, the parent company of Norton LifeLock, said that the likely culprit was a credential stuffing attack — where previously […]
Twitter’s direct messages have always been a security liability. The DMs you send to friends and internet strangers aren’t end-to-end encrypted, making your conversations potentially accessible if Twitter suffers a data breach, or to company staffers with the right permissions to access them. Both scenarios are arguably more likely in Elon Musk’s version of Twitter, where key security and […]
Leave a Reply