Categories: Hacking

Federal Reserve computers targeted by Anonymous

The hacktivists of Anonymous group are still very active and are continuing their campaign dubbed  #OpLast Resort, this time hitting US financial world. The hackers have published private information and credentials of around 4,000 American bank executive accounts to protest on actual U.S. computer crime law reform judged unfair.

The hacktivists have published on Pastebin and on a government site, the Alabama Criminal Justice Information Center (ACJIC) site, a file containing stolen data, what is concerning is that some of the information could be connected to Federal Reserve computers, including personal information such as cell phone numbers for U.S. bank high management (Presidents, Vice Presidents and other managers). The password contained in the file aren’t in plain text, it contains only hashed passwords. The page extension URL is titled, “oops-we-did-it-again.”:

http://acjic.alabama.gov/documents/oops-we-did-it-again.html

Following Anonymous style the news has been widespread using various channels such as social media account on Twitter and Facebook. The situation is embarrassing for Federal Reserve because the file appears to have been stolen from its network and all the information reported are updated. The Fed provides various critical services called Fedline that allows the execution of reserved operations across the U.S. banking system such as money and funding transfers via the U.S. Federal Reserve. Financial institutions in fact could transfer funds between member participants accessing to the service, Fedline is considered the primary U.S. network for high value, time-critical and international payments and imagine a leak in the system is frightening.

Last week Anonymous revealed to have infiltrated various federal websites and the events seems confirm it, probably the group still had access to government websites. Let’s remind that the Anonymous’s rage is exploded after the Swartz tragedy and February 4, 2013 is the deadline for Attorney General Eric Holder to answer specific questions regarding the Aaron Swartz prosecution.

According some experts the deadline is an important date for the followers of the group and more striking offensives could be conducted if the requests of the collective are ignored.

Democratic congresswoman Rep. Zoe Lofgren is promoting a bill called “Aaron’s Law” that aims to rejuvenate the 1984 Computer Fraud and Abuse Act used to persecute the young talent, she used Reddit to spread various versions of its proposal in most democratic mode asking for suggestions to improve the draft.

Events such as the death of the young Swartz should lead us a series of reflections on human and legal perspectives. A cyber crime has a multitude of facets profoundly different and for which it must assign punishment proportional, an cyber attack against a critical infrastructure is different from a DDoS against a web site.

Pierluigi Paganini

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

3 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

15 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

22 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

1 day ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

1 day ago

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

2 days ago

This website uses cookies.