FBI Official Warning, Hackers Attacking Corporations

The FBI Most Wanted hackers. Law enforcement is willing to pay $4.2 million to get them

Cybercrime represents one of the most serious threat to Governments and private industries worldwide, law enforcement hunt down this emerging class of criminals who are able to influence the social context like drug traffickers and terrorists.

The FBI has published the lists of most wanted cyber criminals and the rewards for their capture. According to FBI data these individuals are responsible for hundreds of millions of dollars in losses, for this reason, the Feds are willing to pay a combined $4.2 million for information leading to their arrest.

U.S. Retailer giants Target and Home Depot are just a couple of samples of companies that suffered major cyber attacks, we cannot avoid mentioning other illustrious victims of the cybercrime like the Sony Pictures and government agencies, including the Office of Personnel Management.

Recently Trustwave firm published a report related to 2014 incidents that revealed cyber criminal activities are paying with 1,425% return on investment. More details here.


But the warning bells are sounding from the FBI

FBI Warns U.S. Companies to Be Ready for Chinese Hack Attacks

by Shane Harris:
In a message obtained by The Daily Beast, the bureau strongly implies Beijing was behind the massive hack that exposed U.S. government employees’ secrets—and U.S. companies are next.
Within the U.S. government, there’s a debate about who’s responsible for the massive hack of federal employees’ darkest secrets. The FBI on Wednesday weighed in with its own answer, strongly implying that it was the work of China.

The FBI is warning U.S. companies to be on the lookout for a malicious computer program that has been linked to the hack of the Office of Personnel Management. Security experts say the malware is known to be used by hackers in China, including those believed to be behind the OPM breach.

The FBI warning, which was sent to companies Wednesday, includes so-called hash values for the malware, called Sakula, that can be used to search a company’s systems to see if they’ve been affected.

The warning, known as an FBI Liaison Alert System, or FLASH, contains technical details of the malware and describes how it works. While the message doesn’t mention the OPM hack, the Sakula malware is used by Chinese hacker groups, according to security experts. And the FBI message is identical to one the bureau sent companies on June 5, a day after the Obama administration said the OPM had been hacked, exposing millions of government employees’ personal information. Among the recipients of both alerts are government contractors working on sensitive and classified projects.

Director of National Intelligence James Clapper has publicly called China the “leading suspect” in the OPM hack, but he hasn’t offered any evidence publicly to substantiate those claims. Devin Nunes, the chairman of the House Intelligence Committee, has said the jury is still out on whether China is to blame.

In an email obtained by The Daily Beast, the FBI said it was sending the alert again because of concerns that not all companies had received it the first time. Apparently, some of their email filters weren’t configured to let the FBI message through.

The FLASH alert says the bureau has identified “cyber actors who have compromised and stolen sensitive business information and personally identifiable information.”
The FLASH alert says the bureau has identified “cyber actors who have compromised and stolen sensitive business information and personally identifiable information,” which includes names, dates of birth, and Social Security Numbers. The message notes that this information was a “priority target” of the hackers and that such data are frequently used for financial fraud. But “the FBI is not aware of such activity by these groups,” the message says.

Experts believe the data stolen from OPM is being compiled for espionage purposes, including targeting U.S. government employees and contractors who have access to classified information and could be blackmailed or recruited as spies.

The message also described the malware as being designed to copy information and send it to another computer, presumably being operated by a hacker. The Sakula malware has been linked to a breach of patient records at the health insurer Anthem. Some experts now believe the hackers who pulled off that breach are the same ones who penetrated the OPM’s computers.

The alert comes as Obama administration officials have been briefing members of Congress and their staff about the extent of the OPM hack. The Daily Beast reported earlier that the hackers had compromised so-called adjudication information, which includes revealing details, gleaned from background investigations, about government employees’ sex lives, their history of drug and alcohol use, and their financial problems. The OPM hack has also raised questions about whether the personnel records of intelligence agency employees, including covert operatives, were compromised.


Posted in China aggression, Choke Point, Citizens Duty, Cyber War, Department of Defense, DOJ, DC and inside the Beltway, Failed foreign policy, Gangs and Crimes, Insurgency, NSA Spying, Russia, Terror, Treasury, Whistleblower.

Denise Simon