FBI probes cyber-attack emails sent from internal server

The FBI is now investigating an "ongoing situation" in which thousands of emails were sent by an outside party using the FBI's own email servers.

ADVERTISEMENT
ADVERTISEMENT

The FBI is now investigating an "ongoing situation" in which thousands of emails were sent by an outside party using the FBI's own email servers.

The messages pretended to be from the US Department of Homeland Security (DHS), and all went out with the subject line: "Urgent: Threat actor in systems." In the email body, recipients were told that they were being targeted by a chain attack by a hacker group identified in the emails as "Dark Overlord."  

The FBI released a statement early on Saturday advising the public of the situation. The FBI statement reads:

"The FBI and CISA are aware of the incident this morning involving fake emails from an @ic.fbi.gov email account. This is an ongoing situation, and we are not able to provide any additional information at this time."

"The impacted hardware was taken offline quickly upon discovery of the issue. We continue to encourage the public to be cautious of unknown senders and urge you to report suspicious activity to ic3.gov or cisa.gov."

The statement was then updated Sunday, with an addendum that goes into further detail about the incident: "The FBI is aware of a software misconfiguration that temporarily allowed an actor to leverage the Law Enforcement Enterprise Portal (LEEP) to send fake emails. LEEP is FBI IT infrastructure used to communicate with our state and local law enforcement partners."

"While the illegitimate email originated from an FBI operated server, that server was dedicated to pushing notifications for LEEP and was not part of the FBI’s corporate email service. No actor was able to access or compromise any data or PII on the FBI’s network," the updated statement reads. "Once we learned of the incident, we quickly remediated the software vulnerability, warned partners to disregard the fake emails, and confirmed the integrity of our networks."

High-profile hacks are getting more common in the past year or so. Just last month, in mid October, a group of Russian hackers was linked to a shocking ransomware attack that crippled Sinclair Broadcast Group stations.

ADVERTISEMENT
ADVERTISEMENT

Join and support independent free thinkers!

We’re independent and can’t be cancelled. The establishment media is increasingly dedicated to divisive cancel culture, corporate wokeism, and political correctness, all while covering up corruption from the corridors of power. The need for fact-based journalism and thoughtful analysis has never been greater. When you support The Post Millennial, you support freedom of the press at a time when it's under direct attack. Join the ranks of independent, free thinkers by supporting us today for as little as $1.

Support The Post Millennial

Remind me next month

To find out what personal data we collect and how we use it, please visit our Privacy Policy

ADVERTISEMENT
ADVERTISEMENT
By signing up you agree to our Terms of Use and Privacy Policy
ADVERTISEMENT
© 2024 The Post Millennial, Privacy Policy | Do Not Sell My Personal Information