Menu
US Joint Chiefs of Staff emails targeted by Russian hackers

US Joint Chiefs of Staff emails targeted by Russian hackers

Reports say it was the same group that targeted the State Department and White House

The hacking group that targeted unclassified email systems at the U.S. Department of State and the White House is believed to have also compromised a network used by the Joint Chiefs of Staff, a body of senior U.S. military leaders.

The email system used by the group was compromised in the last week of July, according to reports by NBC News and the Daily Beast. NBC said it affected around 4,000 staff who work at the Joint Chiefs of Staff.

Targets were said to have been sent spear phishing emails -- customized messages that likely appeared to come from trusted contacts with embedded links to documents or other content. When clicked, those links would have resulted in the download of malware that compromised their computers.

The Joint Chiefs of Staff has not said anything publically about the breach, but news reports said investigators believe it to be the work of a Russian hacker group. The same group got inside the State Department's unclassified system last year and also accessed parts of the White House network, gaining access to some correspondence sent and received by President Obama.

Within the U.S. government, classified material is carried on networks physically separate from the Internet and there is no suggestion that these were compromised. Still, access to an unclassified network could still allow attackers to gain access to material that is sensitive.

Last week, the Daily Beast reported that the Department of Defense had warned at least five Department of Defense computer users had been targeted by hackers in recent weeks.

The email apparently came from the National Endowment for Democracy and contained a link to a compromised server on its network where the malware was hosted.

Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is martyn_williams@idg.com


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwareintrusionDesktop securityJoint Chiefs of Staff

Featured

Slideshows

How MSPs can capitalise on integrating AI into existing services

How MSPs can capitalise on integrating AI into existing services

​Given the pace of change, scale of digitalisation and evolution of generative AI, partners must get ahead of the trends to capture the best use of innovative AI solutions to develop new service opportunities. For MSPs, integrating AI capabilities into existing service portfolios can unlock enhancements in key areas including managed hosting, cloud computing and data centre management. This exclusive Reseller News roundtable in association with rhipe, a Crayon company and VMware, focused on how partners can integrate generative AI solutions into existing service offerings and unlocking new revenue streams.

How MSPs can capitalise on integrating AI into existing services
Access4 holds inaugural A/NZ Annual Conference

Access4 holds inaugural A/NZ Annual Conference

​Access4 held its inaugural Annual Conference in Port Douglass, Queensland, for Australia and New Zealand from 9-11 October, hosting partners from across the region with presentations on Access4 product updates, its 2023 Partner of the Year awards and more.

Access4 holds inaugural A/NZ Annual Conference
Show Comments