IMF hit by 'sophisticated cyberattack,' says report
The IMF suffered a 'very major breach,' but it's unclear what data was accessed
IDG News Service - The International Monetary Fund (IMF) has reportedly been hit with a "large and sophisticated cyberattack" that potentially puts sensitive, confidential data about national economies at risk of exposure.
The scope of the attack remains unknown, according to the New York Times, which broke news of the incident Saturday.
The newspaper noted that the IMF, which helps manage financial crises around the world, is "the repository of highly confidential information about the fiscal condition of many nations."
The attack took place over the last several months and was disclosed internally by the IMF on Wednesday to its staff and board of directors, said the Times, which cited unnamed senior officials as its source.
An IMF spokesman confirmed to the paper that the fund is investigating an "incident" but declined to give details. The spokesman said the fund remains "fully functional."
One unnamed official told the Times it had been a "very major breach."
The incident is apparently unrelated to the arrest of Dominique Strauss-Kahn, the former head of the IMF who was arrested in New York last month for allegedly sexually assaulting a hotel maid. It also appears unrelated to a March break-in at RSA Security that compromised its SecurID access system, the Times reported.
The IMF's computer systems include communications with national leaders who have been negotiating the terms of international bailouts, the Times said. One official referred to those agreements as "political dynamite."
The paper emphasized that it was unclear what information the hackers were able to access, however.
The IMF has not said where the attack originated.
- Michaels breach exposes nearly 3M payment cards
- Teen nabbed in Heartbleed attack against Canadian tax site
- Heartbleed bug can expose private server encryption keys
- FTC can sue companies hit with data breaches, court says
- 5-year-old hacks Xbox, now he's a Microsoft 'security researcher'
- State AGs probe Experian subsidiary's data breach
- NSA sniffing prompts Yahoo to encrypt traffic between its data centers
- Banks withdraw data breach claim against Target
- Bank abandons place in class-action suit against Target, Trustwave
- Banks' suit in Target breach a 'wake-up call' for companies hiring PCI auditors
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts