Federal Reserve confirms its system was breached
A group claiming affiliation to the Anonymous hacktivist collective posted contact info for more than 4,000 banking executives
IDG News Service - Malicious attackers gained entry to internal Federal Reserve System computers, illegally copying a database of banking executive contact information, the banking system has confirmed.
"The Federal Reserve System is aware that information was obtained by exploiting a temporary vulnerability in a website vendor product. The vulnerability was fixed shortly after discovery and is no longer an issue," a Federal Reserve spokesman wrote in an email. "This incident did not affect critical operations of the Federal Reserve System."
The Federal Reserve did not identify the attackers, however, on Sunday, a group claiming to be affiliated with Anonymous, the loose collective of malicious hackers, posted the personal information of more than 4,000 bank executives, stating the information came from the Federal Reserve.
The Emergency Communications System (ECS), run by the Federal Reserve Bank of St. Louis, was the system attacked, according to a memo that the banking system sent out to the system's users. ECS provides financial institutions with status updates of the Federal Reserve during times of natural disaster. Attackers gained access to a database with bank executive contact information, including mailing addresses, business and phone numbers, email and fax numbers.
The Federal Reserve stated that no passwords were compromised, despite press reports to the contrary. The organization reset the contact's passwords to the system anyway as a precaution.
The group, Operation Last Resort, posted the contact information it had on the website for the Alabama Criminal Justice Information Center, after breaking into that site. Operation Last Resort is protesting what it considers to be overly severe U.S. Department of Justice prosecution of Internet activist and innovator Aaron Swartz, who recently committed suicide. Swartz faced a 35-year jail sentence and a $1 million fine for allegedly illegally downloading millions of scholarly articles from a Massachusetts Institute of Technology network.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!