SolarWinds Actors Hacked 27 State Attorneys’ Offices in the U.S.

The Justice Department has claimed recently, that the threat actors behind SolarWinds cyberattack have managed to hack 27 state attorneys’ offices in the U.S. and gained access to the email accounts of their employees.

The Justice Department has acknowledged that at least 80% of employees of the department who were using Microsoft 365 accounts were compromised in this fresh cyber attack event.

And all these 80% employees mainly belong to the offices located in the:-

  • Eastern Districts of New York
  • Northern Districts of New York
  • Southern Districts of New York
  • Western Districts of New York

However, the Office of the Chief Information Officer identified the malicious activity and immediately terminated the method employed by the hackers to gain access to the data of the employees of the department.

Even, the department also notified the federal agencies, Congress, and the public as warranted according to the FISMA protocol.

Moreover, to reinforce homeland flexibility and make more transparency the Justice Department has also provided additional details about the SolarWinds cyberattack that took place in December 2020.

Compromised State Attorney Offices

Here we have mentioned the full list of compromised state attorney offices below:-

  1. Central District of California
  2. Northern District of California
  3. District of Columbia
  4. Northern District of Florida
  5. Middle District of Florida
  6. Southern District of Florida
  7. Northern District of Georgia
  8. District of Kansas
  9. District of Maryland
  10. District of Montana
  11. District of Nevada
  12. District of New Jersey
  13. Eastern District of New York
  14. Northern District of New York
  15. Southern District of New York
  16. Western District of New York
  17. Eastern District of North Carolina
  18. Eastern District of Pennsylvania
  19. Middle District of Pennsylvania
  20. Western District of Pennsylvania
  21. Northern District of Texas
  22. Southern District of Texas
  23. Western District of Texas
  24. District of Vermont
  25. Eastern District of Virginia
  26. Western District of Virginia
  27. Western District of Washington

While the employees whose accounts were breached in this cyber attack are guided by the U.S. Attorneys’ Executive Office. 

Apart from this, the security experts have asserted that the threat actors have used other methods along with the SolarWinds breach method to hack the U.S. federal government’s 9 agencies and other 100 private companies.

During that time frame, the security analysts identified that the hacked data includes the following things:-

  • All sent emails
  • All received emails
  • All stored emails
  • All email attachments

However, the Justice Department has acknowledged that they are continuing their investigation, and will continue to provide all the necessary guides and mitigations to evade and block such security breaches.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a colleague…

3 hours ago

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a grave…

5 hours ago

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS) advisories…

6 hours ago

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with a…

7 hours ago

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA pages…

7 hours ago

KEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates Revealed

In a recent technical investigation, researchers uncovered critical insights into the infrastructure linked to a…

7 hours ago