Friday, March 29, 2024

FBI-affiliated Websites Hacked – Hackers Steals Agents Personal data From Websites and Published Online

Hackers have breached FBI-affiliated websites and published the personal data of federal agents and law enforcement officers online.

The hackers published sensitive data that contains 4,000 unique records after duplicates were removed, including member names, a mix of personal and government email addresses, job titles, phone numbers, and their postal addresses, learned TechCrunch.

Hackers exploited a flaw in three websites associated with the FBI National Academy Association and exfiltrated the data from the web servers. They have published the stolen data online.

FBINAA said, that they are working with Federal authorities to investigate the incident. “We believe we have identified the three affected Chapters that have been hacked and they are currently working on checking the breach with their data security authorities.”

FBINAA confirms that national database is safe and secure and the intrusion occurs in the chapters where the third-party software was being used and the impact of the breach is unknown.

TechCrunch spoke to one of the hackers, “We hacked more than 1,000 sites, Now we are structuring all the data, and soon they will be sold. I think something else will publish from the list of hacked government sites.”

Hackers said that they use public exploits, which indicates the sites are not up-to-date and also they provided evidence that they have compromised a number of websites including a sub-domain of manufacturing giant Foxconn.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated. 

FBI Uncovered North Korean Malware Attack KEYMARBLE on U.S Government Entities to Stealing Sensitive Data

DHS and FBI Issued Security alert on Cyber Attacks Targeting Energy Firms and Critical Infrastructure

Website

Latest articles

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles