White House computer network ‘hacked’ Russia involved

A White House computer network has been breached by hackers, it
has been reported.

The unclassified Executive Office of the President network was
attacked, according to the Washington Post.

US authorities are reported to be investigating the breach, which
was reported to officials by an ally of the US, sources said.
White House officials believe the attack was state-sponsored but
are not saying what – if any – data was taken.

So who is behind the White House breach? The government is keeping
quiet on that front and is also refusing to comment on how much data
was stolen.
However, the Washington Post indicates that the Russian government
may be behind the White House breach, a theory based on recent
cyberespionage campaigns carried out by Russian hackers, which are
believed to be tied to the Russian government. The sources seem to
agree, saying that the White House breach is similar to a
“state-sponsored campaign.”

This wouldn’t be the first time the Russian intelligence service
was accused of breaking into a U.S. government network. The Russian
government supposedly broke into the U.S. military’s classified
networks back in 2008. This led to the formation of the U.S. Cyber
Command, which is now dedicated to defending critical computer
systems located in the government and the private sector.

What’s disturbing here is that an ally of the United States
informed the government of the White House breach. Even though the
hack supposedly took place on the unclassified network, it’s still
unnerving to think that the White House security didn’t detect a
thing. The White House may need to re-evaluate its cyber defense


Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...