Menu
US Joint Chiefs of Staff emails targeted by Russian hackers

US Joint Chiefs of Staff emails targeted by Russian hackers

Reports say it was the same group that targeted the State Department and White House

The hacking group that targeted unclassified email systems at the U.S. Department of State and the White House is believed to have also compromised a network used by the Joint Chiefs of Staff, a body of senior U.S. military leaders.

The email system used by the group was compromised in the last week of July, according to reports by NBC News and the Daily Beast. NBC said it affected around 4,000 staff who work at the Joint Chiefs of Staff.

Targets were said to have been sent spear phishing emails -- customized messages that likely appeared to come from trusted contacts with embedded links to documents or other content. When clicked, those links would have resulted in the download of malware that compromised their computers.

The Joint Chiefs of Staff has not said anything publically about the breach, but news reports said investigators believe it to be the work of a Russian hacker group. The same group got inside the State Department's unclassified system last year and also accessed parts of the White House network, gaining access to some correspondence sent and received by President Obama.

Within the U.S. government, classified material is carried on networks physically separate from the Internet and there is no suggestion that these were compromised. Still, access to an unclassified network could still allow attackers to gain access to material that is sensitive.

Last week, the Daily Beast reported that the Department of Defense had warned at least five Department of Defense computer users had been targeted by hackers in recent weeks.

The email apparently came from the National Endowment for Democracy and contained a link to a compromised server on its network where the malware was hosted.

Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is martyn_williams@idg.com

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags intrusionsecurityDesktop securitygovernmentmalwareJoint Chiefs of Staff

Featured

Slideshows

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
​What are the top 10 tech trends for New Zealand in 2017?

​What are the top 10 tech trends for New Zealand in 2017?

Digital Transformation (DX) has been a critical topic for business over the last few years and IDC is now predicting a step change as DX reaches macroeconomic levels. By 2020 a DX economy will emerge and it will become the core of what New Zealand industries focus on. From the board level through to the C-Suite, Kiwi organisations must be prepared to think and act digital when the DX economy emerges in 2017.

​What are the top 10 tech trends for New Zealand in 2017?
Show Comments