fbpx

Russian Hackers behind the White House Cyber Attack

According to the investigation of U.S. officials, Russian hackers damaged cyber security system of the State Department in recent months and were able to penetrate sensitive parts of the White House’s computer system and even gained access to President Barack Obama’s personal schedule and call records.

Ben Rhoden, White House deputy national security adviser said, “We do not believe that our classified systems were compromised.”

The FBI, Secret Service and U.S. intelligence agencies consider it the most sophisticated attack ever instigated against U.S. government systems and are involved in investigating the breach. The investigators are suspicious that to get to White House, the hackers first broke into the State Department.

The hackers intruded through computers around the world in order to hide their tracks, but investigators found tell-tale codes and other markers that they believe point to hackers working for the Russian government.

However, the news network affirmed that the hackers were able to reach only an unclassified area of the system – information that would still be considered sensitive and valuable to foreign intelligence agencies.

The State Department computer system has been oppressed by hackers many times and despite efforts to lock them out, the Russian hackers have been able to reenter the system. One official says the Russian hackers have “owned” the State Department system for months and it is still not evident whether the hackers have been fully eradicated from the system.

National Security Council spokesman Mark Stroh didn’t confirm the Russian hack, but he did say that “any such activity is something we take very seriously.”

“In this case, as we made clear at the time, we took immediate measures to evaluate and mitigate the activity,” he said.

The U.S. State Department as well as the Russian Embassy immediately responded to a request for comment.
There is potential risk that in the future, the Russian hackers might be able to re-use their access to the State Department to invade the White House systems.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What are Online Casinos doing to be as Safe and Secure as Possible?

Online casinos have continued to increase in popularity over recent years as more and more gamblers have turned to virtual options to further enhance...

Reconnaissance for Bug Bounty Hunters & Pentesters

New to the bug bounty and confused about where to start? Worry not! This reconnaissance for bug bounty hunters guides you to take the...

Access & Manage Android Phone Remotely – L3MON Tutorial

There is software available, like Metasploit, to gain remote access to any android phone. But other than that, we have the L3MON tool (A...

How to Hide Shellcode Behind Closed Port?

Every company has a variety of scanners for analyzing its network and identifying new or unknown open ports. It's unthinkable to disguise the potentially...