Emails showed a subject line of “Urgent: Threat actor in systems” and appeared to end with a sign-off from the Department of Homeland Security.
Between raiding the home of Project Veritas’ James O’Keefe, attempting to entrap citizens at Capitol Hill demonstrations, and generally acting on behalf of the Deep State to push the progressive narrative, the Federal Bureau of Investigation has clearly forgotten its mission priorities.
- Protect the United States from terrorist attack.
- Protect the U.S. against foreign intelligence, espionage, and cyber operations.
- Protect the United States against cyber-based attacks and high-technology crimes.
- Combat significant cybercriminal activity.
- Combat public corruption at all levels.
- Protect civil rights.
- Combat transnational criminal enterprises.
- Combat significant white-collar crime.
- Combat significant violent crime.
The failure to focus on the actual mission has resulted in the FBI’s email server being hacked and sending spam emails to over 100,000 people.
Authorities have not determined the sender or motive behind the rambling, incoherent emails, filled with technological nonsense.
The emails warned receivers that their information may be under attack by Vinny Troia, famous hacker and owner of cybersecurity company Night Lion Security, in connection with notorious cybersecurity group TheDarkOverlord.
The FBI confirmed the incident on Saturday, but said the hacked systems were “taken offline quickly,” after it had been reported.
The fake emails appeared to be from a legitimate FBI email address ending in @ic.fbi.gov. Ironically, the spam is purported to come from the U.S. Department of Homeland Security’s Cyber Threat Detection and Analysis Group.
“They are causing a lot of disruption because the headers are real, they really are coming from FBI infrastructure,” anti-spam monitoring group Spamhaus said on Twitter early Saturday morning. “They have no name or contact information in the .sig. Please beware!”
Spamhaus said that while the emails came from a government server, they are fake. The emails the message was sent to were likely extracted from an online database, the group said.
The identity of the hacker is not currently known.
In an update issued on Sunday, the bureau said that a “software misconfiguration” allowed an actor to leverage an FBI system known as the Law Enforcement Enterprise Portal, or LEEP, to send the fake emails. The system is ordinarily used to by the agency to communicate with state and local law enforcement partners.
“No actor was able to access or compromise any data or PII [personal identifiable information] on the FBI’s network,” the bureau said. “Once we learned of the incident, we quickly remediated the software vulnerability, warned partners to disregard the fake emails, and confirmed the integrity of our networks.”
The spam emails went to 100,000 people, according to NBC News, and warned recipients of a cyberattack on their systems. The FBI and Department of Homeland Security routinely send legitimate emails to companies and others to warn them about cyber threats. This is the first known instance of hackers using that same system to send spam messages to a large group of people, NBC reports.
The Spamhaus Project, a threat-tracking organization, posted on Twitter what it said was a copy of one such email. It showed a subject line of “Urgent: Threat actor in systems” and appeared to end with a sign-off from the Department of Homeland Security.
These emails look like this:
— Spamhaus (@spamhaus) November 13, 2021
Clearly, the FBI’s current standards align with the Brandon Administration’s vision of low expectations. Therefore, unless there is a return to the original mission priorities, expect further hackings.DONATE
Donations tax deductible
to the full extent allowed by law.