All the latest UK technology news, reviews and analysis


Federal Reserve unsure of data hack damage as FBI investigates

08 Feb 2013
federal reserve

The US Federal Reserve is still unsure of the extent of the damages caused by a recent raid on its networks, according to reports.

Federal Reserve spokesman Jim Strader said law enforcement was still unsure what information was compromised during the attack, according to Reuters.

"We are in the process of a comprehensive assessment to determine what information might have been obtained in this incident," Strader is reported to have said.

"We remain confident that this incident did not affect critical operations of the Federal Reserve."

The comments come as it's been revealed the FBI is investigating the attack to try and uncover more clues as to what was taken and who was responsible.

"This incident is the subject of an active criminal investigation with the FBI and we cannot comment further," Strader said.

At the time of publishing the Federal Reserve had not responded to V3's request for comment.

The US Federal Reserve admitted that one of its internal websites was briefly hacked earlier in the week, promising no critical functions or key data had been compromised.

The admission came just as the Anonymous collective posted statements claiming the hackers had successfully stole the personal information of more than 4,000 US bank executives.

The statements contained a link to a Pastebin post purportedly included an employee's login information, credentials, IP addresses and contact information.

Trend Micro security director, Rik Ferguson told V3 it was good to see the FBI and Federal Reserve are already investigating the extent of the damage.

"It is really not unusual for an investigation of this nature to take a relatively considerable amount of time, they will be making forensic examinations of systems, trawling to log data, interviewing employees and contractors and making sure it is all done in a way that will be admissible as evidence should that be required," Ferguson told V3.

"It's great to see that victims of cybercrime understand the need to provide acceptable evidence and do not rush to jump to conclusions. That kind of reaction could leave weaknesses undiscovered and systems would remain vulnerable in future."

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Related jobs
Poll

Work location poll - office, remote or home?

Where do you spend most time working on your primary work device?
62%
4%
2%
0%
32%
0%

Popular Threads

Powered by Disqus
LG G Flex 2 hands-on review

CES 2015: LG G Flex 2 video

A closer look at LG's latest curved-screen smartphone

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
mubaloo2

Beacon technology: what are the opportunities and how does the technology work?

This paper seeks to provide education and technical insight to beacons, in addition to providing insight to Apple's iBeacon specification

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Java Software Engineer - Financial Trading - Greenfield

Java Software Engineer/Java Developer - Core Java, Web...

Senior Developer/Designer - Innovative Financial Technology

HTML5/CSS3 Developer/Web Developer - UX/UI, HTML5, CSS2...

Business Analyst

Business Analyst | Sussex | 6 Month Contract | £400/Day...

Scrum Master

Scrum Master | Up £60,000 + Benefits | London A growing...
To send to more than one email address, simply separate each address with a comma.