DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FBI Says a Mysterious Hacking Group Has Had Access to US Govt Files for Years

Posted on April 5, 2016 by Dissent

Lorenzo Franceschi-Bicchierai reports:

The feds warned that “a group of malicious cyber actors,” whom security experts believe to be the government-sponsored hacking group known as APT6, “have compromised and stolen sensitive information from various government and commercial networks” since at least 2011, according to an FBI alert obtained by Motherboard.

The alert, which is also available online, shows that foreign government hackers are still successfully hacking and stealing data from US government’s servers, their activities going unnoticed for years.

Read more on Motherboard.


Related:

  • Au: Qantas hackers gave airline 72-hour deadline
  • Average Brit hit by five data breaches since 2004
  • The day after XSS.is forum was seized, it struggles to come back online -- but is it really them?
  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Korea imposes 343 million won penalty on HAESUNG DS for data breach of 70,000 shareholders
Category: Commentaries and AnalysesGovernment SectorHackOf NoteU.S.

Post navigation

← Trump Hotels Investigating a Second Possible Breach: Krebs
Don’t let embarrassment about a data breach cost you even more →

1 thought on “FBI Says a Mysterious Hacking Group Has Had Access to US Govt Files for Years”

  1. Anonymous says:
    April 5, 2016 at 8:20 am

    Do as I say, not as I do.

    The government is quick to inspect other entities with a pressurized attack, scans and inflated cumulative results, but within the Federal side, its been the absolute worse for grades. They typically grade a D or an F for security.

    If a Hacker sees an article that points to a ripe target, one that is not STIG compliant, I am sure they are in within a short period of time. Places that have really high vulnerability scores typically have a staff that either doesn’t know what the hell they are doing, or they are simply not educated in security. They applied for a position that is nothing more than a grazing plot until retirement.

    This isn’t new news. The news reported that outside entities were in the state department probably in the past 1-2 years, and they are having a hard time getting the “unauthorized” out. The unauthorized probably have text files with username and passwords for multiple domains. Worse yet, its probably many breaches based on password reuse.

    Absolutely incredible that in a digital world, the antiquated networks of the most powerful government in the world could easily be its demise. The laws are simply weak and too generic. The government must be sitting on pins and needles all the time, scared that something might revolt and kick the incompetent out of there comfy-til-retirement seats

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Au: Qantas hackers gave airline 72-hour deadline
  • Honeywell vulnerability exposes building systems to cyber attacks
  • Recent public service announcements of note — parents should take special note of these
  • Au: Junior doctor faces fresh toilet spying charges as probe widens to other major hospitals
  • Average Brit hit by five data breaches since 2004
  • BlackSuit ransomware site seized as part of Operation Checkmate
  • The day after XSS.is forum was seized, it struggles to come back online — but is it really them?
  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Korea imposes 343 million won penalty on HAESUNG DS for data breach of 70,000 shareholders

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.