FBI email system hacked
FBI email system hacked

Hackers targeted the FBI's messaging system and sent thousands of fake messages claiming that their recipients were victims of sophisticated chain attacks.

These emails were posted by Project Spamhaus, a non-profit organization that investigates spammers.

These emails claimed that Vinnie Troya was behind the fake attack. He also falsely stated that Troy is associated with the hacker group The Dark Overlord.

Troia is a respected cybersecurity researcher, founder and director of security research at Shadowbyte.

The hackers were able to send emails to more than 100,000 addresses collected from the database of ARIN, the US Internet Numbers Registry.

A Bloomberg report says hackers are using the FBI's public messaging system to make email more legitimate.

Cybersecurity researcher Kevin Beaumont also confirmed the email's legal appearance.

It was found that the address is validated as coming from an FBI server through the DKIM process, which is part of the Gmail system for attaching a brand logo to verified emails.

So the FBI responded to the incident in a press release. They say it continues to work and the affected device is no longer connected to the Internet.

Hacking the FBI system

Additionally, the FBI said there is currently no other information to share.

A spam campaign was launched to discredit Troy. Troia speculated in a tweet that Pomporin may have started the attack.

It is said that the same person similarly tried to damage the reputation of Troy in the past. A report by computer security reporter Brian Krebs also linked Pomporin to the incident.

When the attack began, Pomporin sent a message from the FBI's email address to Krebs. The message reads: Check this email address, it's from the FBI server.

Cancer has the opportunity to speak to Pomporin. He claimed that the hack was aimed at exposing security vulnerabilities in the office's email system.

Pomporin said in a statement to Krebs that I could have sent more seemingly legitimate messages, had the company been sharing data, etc.

Pomporin stated that he was exploiting a vulnerability in the LEEP portal. Can sign up for an account using a one-time password embedded in the page's HTML code.

Additionally, he claimed to be able to manipulate the sender's address and email format. and implement large-scale spam campaigns.

Previous Post Next Post