Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

Russian Hackers Hit Pentagon Email System: Report

Hackers based in Russia penetrated the email network of the Pentagon’s Joint Chiefs of Staff, leading to a two-week shutdown of the system, NBC News reported Thursday.

The Pentagon confirmed that the Joint Chiefs’ email system was taken offline pending an investigation but declined to elaborate.

Hackers based in Russia penetrated the email network of the Pentagon’s Joint Chiefs of Staff, leading to a two-week shutdown of the system, NBC News reported Thursday.

The Pentagon confirmed that the Joint Chiefs’ email system was taken offline pending an investigation but declined to elaborate.

“We continue to identify and mitigate cybersecurity risks across our networks,” Pentagon spokeswoman Lieutenant Colonel Valerie Henderson said.

“With those goals in mind, we have taken the Joint Staff network down and continue to investigate. Our top priority is to restore services as quickly as possible.

“As a matter of policy and for operational security reasons, we do not comment on the details of cyber incidents or attacks against our networks.”

NBC, citing unnamed sources, said it was not clear if the attack had been sanctioned by the Russian government. But the sources told the network that the cyberattack relied on an automated system that rapidly gathered massive amounts of data.

According to officials who declined to be identified, the intrusion occurred around July 25 and affected some 4,000 military and civilian personnel, NBC said.

The officials said no classified information was seized or compromised but that the Pentagon decided to shut down the entire email system during its investigation.

The news comes after US officials confirmed some 21 million US government employees, contractors and others had personal information compromised in two breaches.

Officials have declined to identify the source of the hack of personnel records but it is widely believed to be part of a Chinese espionage program.

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Funding/M&A

Identity and access governance vendor Saviynt has closed a $205 million financing round.

Security Infrastructure

XDR's fully loaded value to threat detection, investigation and response will only be realized when it is viewed as an architecture

ICS/OT

Security orchestration, automation and response (SOAR) provider Swimlane on Monday announced the launch of a security automation solution ecosystem for operational technology (OT) environments.

Incident Response

Created and maintained by MITRE, MITRE D3FEND is a framework that provides a library of defensive cybersecurity countermeasures and technical components to help organizations...

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.