Menu
US Joint Chiefs of Staff emails targeted by Russian hackers

US Joint Chiefs of Staff emails targeted by Russian hackers

Reports say it was the same group that targeted the State Department and White House

The hacking group that targeted unclassified email systems at the U.S. Department of State and the White House is believed to have also compromised a network used by the Joint Chiefs of Staff, a body of senior U.S. military leaders.

The email system used by the group was compromised in the last week of July, according to reports by NBC News and the Daily Beast. NBC said it affected around 4,000 staff who work at the Joint Chiefs of Staff.

Targets were said to have been sent spear phishing emails -- customized messages that likely appeared to come from trusted contacts with embedded links to documents or other content. When clicked, those links would have resulted in the download of malware that compromised their computers.

The Joint Chiefs of Staff has not said anything publically about the breach, but news reports said investigators believe it to be the work of a Russian hacker group. The same group got inside the State Department's unclassified system last year and also accessed parts of the White House network, gaining access to some correspondence sent and received by President Obama.

Within the U.S. government, classified material is carried on networks physically separate from the Internet and there is no suggestion that these were compromised. Still, access to an unclassified network could still allow attackers to gain access to material that is sensitive.

Last week, the Daily Beast reported that the Department of Defense had warned at least five Department of Defense computer users had been targeted by hackers in recent weeks.

The email apparently came from the National Endowment for Democracy and contained a link to a compromised server on its network where the malware was hosted.

Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is martyn_williams@idg.com


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags governmentmalwareintrusionDesktop securityJoint Chiefs of Staff

Featured

Slideshows

Tech industry comes out in force as Lancom turns 30

Tech industry comes out in force as Lancom turns 30

A host of leading vendors and customers came together to celebrate the birthday of Lancom Technology in New Zealand, as the technology provider turned 30.

Tech industry comes out in force as Lancom turns 30
The making of an MSSP: a blueprint for growth in NZ

The making of an MSSP: a blueprint for growth in NZ

Partners are actively building out security practices and services to match, yet remain challenged by a lack of guidance in the market. This exclusive Reseller News Roundtable - in association with Sophos - assessed the making of an MSSP, outlining the blueprint for growth and how partners can differentiate in New Zealand.

The making of an MSSP: a blueprint for growth in NZ
Reseller News Platinum Club celebrates leading partners in 2018

Reseller News Platinum Club celebrates leading partners in 2018

The leading players of the New Zealand channel came together to celebrate a year of achievement at the inaugural Reseller News Platinum Club lunch in Auckland. Following the Reseller News Innovation Awards, Platinum Club provides a platform to showcase the top performing partners and start-ups of the past 12 months, with more than ​​50 organisations in the spotlight.​​​

Reseller News Platinum Club celebrates leading partners in 2018
Show Comments