Fed Breach: Attackers Exploited Website Product Vulnerability

  /     /     /  
Publicated : 22/11/2024   Category : security


Fed Breach: Attackers Exploited Website Product Vulnerability


Federal Reserve confirms breach of database with banking executive contact information for use in a natural disaster.



The Federal Reserve confirmed that it suffered a successful hack attack, but said attackers didnt breach critical systems.
The confirmation from the countrys central banking system appeared to validate assertions made by the hacktivist group Anonymous, which
claimed credit for the Sunday breach
and subsequent data dump of what it described as over 4,000 U.S. bank executive credentials.
Despite confirming the breach had occurred, however, the Fed offered scant additional details, except to note that attackers exploited a vulnerability in one of its products. The Federal Reserve System is aware that information was obtained by exploiting a temporary vulnerability in a website vendor product, a spokeswoman from the Federal Reserve Bank of Richmond said in an emailed statement.
The exposure was fixed shortly after discovery and is no longer an issue. This incident did not affect critical operations of the Federal Reserve System, according to the statement.
[ How do you define cyberwarfare? Read
Uncertain State Of Cyberwar
. ]
A Fed spokeswoman didnt immediately respond to an emailed request for more detailed information about the breach. But the Anonymous-delivered data dump, a.k.a. dox, included about 4,600 records, including peoples names, email addresses, IP addresses, login IDs, salted and hashed -- not plain text -- passwords, as well password salts.
Reuters reported that the hacked database included
contact information for banking personnel
, and was designed to be used in the event of natural disaster. In particular, it allows banks that have been affected by tornados or flooding to alert the Fed, which can assess the potential impact to the countrys banking system.
According to a message distributed by the Fed to its employees, the breached database was part of its Emergency Communication System (ECS), and warned that personal information, including mailing addresses, business and cellphone numbers, as well as business email addresses and fax numbers, were contained in the database. Some registrants also included optional information consisting of home phone and personal email. Despite claims to the contrary, passwords were not compromised, according to the Feds message, a copy of which was obtained by Reuters. It reported that the Fed later verified the authenticity of the message to ECS members.
Claims that no passwords were compromised suggests that officials at the Fed dont believe that the salted and hashed passwords included in the data dump could be decrypted by attackers.
The Fed data was leaked by Anonymous as part of its
Operation Last Resort
, which seeks reform of computer crime laws, and the overzealous prosecutors. The campaign was launched last month after Internet activist Aaron Swartz committed suicide. He faced significant jail time after prosecutors indicted him on 13 felony counts, including violating the Computer Fraud and Abuse Act (CFAA), for downloading millions of academic journal articles without authorization.
But prosecutors
application of CFAA
in the case has been widely criticized for being too heavy handed. It also sparked questions from the House Oversight and Government Reform Committees chairman Darrell Issa (R-Calif.), and ranking member Elijah Cummings (D-Md.), who wrote to attorney general Eric Holder requesting that he brief Congress on the case, as well as the use of CFAA by prosecutors. The legislators gave Holder a Monday deadline for scheduling the briefing.
According to Anonymous, its Federal Reserve minidrop -- referring to the dox -- was meant to focus attention on the Monday deadline, as well as broader efforts to
reform CFAA
.
Anonymous appeared to be keeping a close eye on the Justice Departments response: 6pm: tick tock, tick tock on the Holder clock. Really think you can brush off the House Oversight Committee AND Anonymous?! read a Monday
tweet
posted by the Operation Last Resort account on Twitter.
A Department of Justice spokeswoman Wednesday, however, confirmed via email that the department has been in contact with the committee and plans to brief them on the matter, although she didnt specify when the briefing was set to occur.
Likewise, a
tweet from Rep. Issa
said, For those who missed my earlier #AaronSwartz update: @TheJusticeDept has agreed to brief @GOPoversight @OversightDems on Swartz case. A spokesman for Rep. Issa, reached by phone, wasnt immediately able to confirm when the briefing was scheduled to take place.
In this all-day InformationWeek and Dark Reading Virtual Event, experts and vendors will offer a detailed look at how enterprises can detect the latest malware, analyze the most current cyber attacks, and even identify and take action against the attackers. Attendees of the
Hackers Unmasked
event will also get a look at how cybercriminals operate, how they are motivated -- and what your business can do to stop them. It happens Feb. 7. (Free registration required.)

Last News

▸ Google has three months to comply with privacy law. ◂
Discovered: 26/12/2024
Category: security

▸ Firefox improves Do Not Track feature. ◂
Discovered: 26/12/2024
Category: security

▸ Crime Scene Investigation: Atlanta? No, its Phone Fingerprinting. ◂
Discovered: 26/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Fed Breach: Attackers Exploited Website Product Vulnerability