All the latest UK technology news, reviews and analysis


Federal Reserve unsure of data hack damage as FBI investigates

08 Feb 2013
federal reserve

The US Federal Reserve is still unsure of the extent of the damages caused by a recent raid on its networks, according to reports.

Federal Reserve spokesman Jim Strader said law enforcement was still unsure what information was compromised during the attack, according to Reuters.

"We are in the process of a comprehensive assessment to determine what information might have been obtained in this incident," Strader is reported to have said.

"We remain confident that this incident did not affect critical operations of the Federal Reserve."

The comments come as it's been revealed the FBI is investigating the attack to try and uncover more clues as to what was taken and who was responsible.

"This incident is the subject of an active criminal investigation with the FBI and we cannot comment further," Strader said.

At the time of publishing the Federal Reserve had not responded to V3's request for comment.

The US Federal Reserve admitted that one of its internal websites was briefly hacked earlier in the week, promising no critical functions or key data had been compromised.

The admission came just as the Anonymous collective posted statements claiming the hackers had successfully stole the personal information of more than 4,000 US bank executives.

The statements contained a link to a Pastebin post purportedly included an employee's login information, credentials, IP addresses and contact information.

Trend Micro security director, Rik Ferguson told V3 it was good to see the FBI and Federal Reserve are already investigating the extent of the damage.

"It is really not unusual for an investigation of this nature to take a relatively considerable amount of time, they will be making forensic examinations of systems, trawling to log data, interviewing employees and contractors and making sure it is all done in a way that will be admissible as evidence should that be required," Ferguson told V3.

"It's great to see that victims of cybercrime understand the need to provide acceptable evidence and do not rush to jump to conclusions. That kind of reaction could leave weaknesses undiscovered and systems would remain vulnerable in future."

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

Windows 7 end of mainstream support

What are your plans for when Microsoft ends mainstream support for Windows 7 in January 2015?
10%
9%
3%
64%
14%

Popular Threads

Powered by Disqus
LG G3 in gold black and white

LG G3 vs Galaxy S5 video

We pit the two Korean firms' flagship smartphones against each other

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv3may

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Java eFX Developer - Front Office - Top Tier Investment Bank

Java eFX Developer - Front Office - Top Tier Investment...

Project Manager/Business Analyst

Project Manager/Business Analyst I have an exciting...

C# WPF Developer - Risk Systems

C# WPF Developer - Risk Systems C# WPF developer is...

BUSINESS INTELLIGENCE ARCHITECT - MÜNICH - CONTRACT

The successful candidate will join a leading IT consultancy...
To send to more than one email address, simply separate each address with a comma.