Federal Reserve confirms its system was breached
A group claiming affiliation to the Anonymous hacktivist collective posted contact info for more than 4,000 banking executives
IDG News Service - Malicious attackers gained entry to internal Federal Reserve System computers, illegally copying a database of banking executive contact information, the banking system has confirmed.
"The Federal Reserve System is aware that information was obtained by exploiting a temporary vulnerability in a website vendor product. The vulnerability was fixed shortly after discovery and is no longer an issue," a Federal Reserve spokesman wrote in an email. "This incident did not affect critical operations of the Federal Reserve System."
The Federal Reserve did not identify the attackers, however, on Sunday, a group claiming to be affiliated with Anonymous, the loose collective of malicious hackers, posted the personal information of more than 4,000 bank executives, stating the information came from the Federal Reserve.
The Emergency Communications System (ECS), run by the Federal Reserve Bank of St. Louis, was the system attacked, according to a memo that the banking system sent out to the system's users. ECS provides financial institutions with status updates of the Federal Reserve during times of natural disaster. Attackers gained access to a database with bank executive contact information, including mailing addresses, business and phone numbers, email and fax numbers.
The Federal Reserve stated that no passwords were compromised, despite press reports to the contrary. The organization reset the contact's passwords to the system anyway as a precaution.
The group, Operation Last Resort, posted the contact information it had on the website for the Alabama Criminal Justice Information Center, after breaking into that site. Operation Last Resort is protesting what it considers to be overly severe U.S. Department of Justice prosecution of Internet activist and innovator Aaron Swartz, who recently committed suicide. Swartz faced a 35-year jail sentence and a $1 million fine for allegedly illegally downloading millions of scholarly articles from a Massachusetts Institute of Technology network.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- 10 Things Your Next Firewall Must do Next-Generation Firewalls Defined
- Firewall Buyers Guide Operate as the core of your network security infrastructure
- Getting Started With a Zero Trust Approach to Network Security The Traditional Approach to Network Security is Failing. View Now>>
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts