• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

FBI “Contains” Cyber-Incident on its Network

You are here: Home / General Cyber Security News / FBI “Contains” Cyber-Incident on its Network
February 20, 2023

The FBI has launched a temporary assertion about a the latest cyber-incident that occurred at a single of its highest profile industry offices, saying it is now beneath command.

Resources briefed on the make a difference advised CNN that a malicious incident impacted part of its network utilized in investigations of photos of kid sexual exploitation.

“The FBI is aware of the incident and is operating to acquire more information and facts,” the Feds said in a assertion sent to the news network. “This is an isolated incident that has been contained. As this is an ongoing investigation the FBI does not have even more remark to present at this time.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


It continues to be to be found what style of attack this was and exactly where it arrived from.

Nevertheless, it’s not the very first time the bureau has been targeted. In 2021, an formal email handle was reportedly compromised and made use of to spam at least 100,000 recipients. One intercepted information apparently cited the DHS Cybersecurity and Infrastructure Security Company (CISA) and claimed the recipients ended up on the getting conclusion of a important cyber-attack.

Later, the FBI confirmed that hackers had taken gain of a misconfiguration in an IT process it utilised to converse with condition and local regulation enforcement partners: the Law Enforcement Enterprise Portal (LEEP).

Austin Berglas, international head of qualified services at BlueVoyant is a former assistant specific agent in demand of the FBI’s New York Place of work Cyber Branch.

He explained that investigations into crimes from young children often require the assortment and examination of digital evidence.

“Once proof is acquired or seized via consent or legal approach, the digital media (mobile telephones, desktops, and external storage equipment) is offered to a member of the FBI’s Computer system Examination Response Staff (CART) – accredited unique brokers and forensic examiners,” he continued.

“All electronic proof is scanned for malware or malicious files prior to processing on personal computers with specialised forensic software package utilized to extract information contained on the devices. These forensic desktops are stand-alone and are not linked to any inside, classified procedure.”

This signifies that, even if a new malware variant designed its way from a seized unit on to a forensic computer system, it would be contained to the evaluation network, Berglas reported.

“The probable for that malware to spread and infect other investigative matters on the CART network is true, but, in buy to maintain the initial proof, forensic examiners make operating copies for assessment and evaluate,” he concluded.


Some components of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «darktrace calls in ey auditors to debunk ‘channel stuffing’ claims Darktrace calls in EY auditors to debunk ‘channel stuffing’ claims
Next Post: GoDaddy’s multi-year’ security breach a ‘damaging blow’ to user confidence godaddy’s multi year' security breach a 'damaging blow' to user confidence»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.