Russian Hackers behind the White House Cyber Attack

According to the investigation of U.S. officials, Russian hackers damaged cyber security system of the State Department in recent months and were able to penetrate sensitive parts of the White House’s computer system and even gained access to President Barack Obama’s personal schedule and call records.

Ben Rhoden, White House deputy national security adviser said, “We do not believe that our classified systems were compromised.”

The FBI, Secret Service and U.S. intelligence agencies consider it the most sophisticated attack ever instigated against U.S. government systems and are involved in investigating the breach. The investigators are suspicious that to get to White House, the hackers first broke into the State Department.

The hackers intruded through computers around the world in order to hide their tracks, but investigators found tell-tale codes and other markers that they believe point to hackers working for the Russian government.

However, the news network affirmed that the hackers were able to reach only an unclassified area of the system – information that would still be considered sensitive and valuable to foreign intelligence agencies.

The State Department computer system has been oppressed by hackers many times and despite efforts to lock them out, the Russian hackers have been able to reenter the system. One official says the Russian hackers have “owned” the State Department system for months and it is still not evident whether the hackers have been fully eradicated from the system.

National Security Council spokesman Mark Stroh didn’t confirm the Russian hack, but he did say that “any such activity is something we take very seriously.”

“In this case, as we made clear at the time, we took immediate measures to evaluate and mitigate the activity,” he said.

The U.S. State Department as well as the Russian Embassy immediately responded to a request for comment.
There is potential risk that in the future, the Russian hackers might be able to re-use their access to the State Department to invade the White House systems.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Become a spy in your own right with Xnspy Android spying app

Having become widely popular among parents and employers, spying apps have become quite the norm nowadays. Android spying apps have made it a lot...

e-Services Portals Potentially Expose Government Infrastructure to File-based Attacks

More and more users are embracing technology to perform their day-to-day activities. It’s not only private businesses that are forced to establish digital channels...

What is Nmap? How to use Nmap for Information Gathering

Nmap stands for Network Mapper, a powerful network scanning and host detection tool that is being used to perform reconnaissance in a very first...

Digital Forensics Investigation using Autopsy In Kali Linux

Autopsy is one of the digital forensics tools use to investigate what happened on a computer. It offers a GUI access to variety of...