FBI’s email system was hacked to send fake cyber security warnings

The email servers of the Federal Bureau of Investigation (FBI), the federal law enforcement agency of the United States, were targeted by someone who sent spam emails to thousands of people warning of a serious cyberattack. The FBI acknowledged the issue in an official statement.

according to a report of sleeping computer, The fake email says its recipients have fallen victim to a “sophisticated chain attack”. Hackers used the FBI’s public-facing email system to legitimize emails. according to the report sleeping computer, The fake email claimed that the Advanced Threat actor was a man named Vinny Troia. It should be noted that Troya is the head of security research for dark web intelligence for companies such as NightLion and Shadowbyte, the report said.

Spamhaus Project, a non-profit intelligence organization, said the emails may have been sent to more than 100,000 email addresses. The report said that the hackers used legitimate FBI systems to plan the attack such as using email addresses scraped from the database for the American Registry for Internet Numbers (ARIN).

Spamhaus senior threat analyst Alex Grosjean told CNN that, while he didn’t think there was a malicious link attached to the email, it was probably a prank to scare recipients.

Meanwhile, KrebsOnSecurity has reported that the attacker was behind an actor named “Pompompurin”, who contacted him after the email was sent. The report said the attacker claimed the hack was “to point to an apparent vulnerability in the FBI’s system.”

Incidentally, Troia, targeted in the email, also tweeted about the issue, saying that it was likely that a person identifying as Pompompurin was responsible.

The FBI said in a statement that it was “aware of software misconfiguration that temporarily allowed an actor to take advantage of the Law Enforcement Enterprise Portal (LEEP) to send fake emails.” LEEP is the agency’s IT infrastructure that is used to communicate with state and local law enforcement partners, the statement said.

“While the illegal email originated from an FBI-operated server, that server was dedicated to forwarding notifications for LEEP and was not part of the FBI’s corporate email service. No actor could access or access any data or PII on the FBI’s network.” was not able to compromise. Once we became aware of the incident, we immediately fixed the software vulnerability, warned partners to disregard fake emails, and confirmed the integrity of our network,” The statement said.


Leave a Reply

Your email address will not be published. Required fields are marked *