WASHINGTON: The internet world is not save for any of the organization, if one does not have any suitable methods to tackle it out. One such case has been revealed. The Federal Reserve has said that one of its internal websites had been briefly breached by hackers. Although, no critical functions of the US central bank were affected by the intrusion.
“The Federal Reserve system is aware that information was obtained by exploiting a temporary vulnerability in a website vendor product,” a Fed spokeswoman said.
“Exposure was fixed shortly after discovery and is no longer an issue. This incident did not affect critical operations of the Federal Reserve system,” the spokeswoman said, adding that all individuals effected by the breach had been contacted.
The admission follows a claim that hackers linked to the activist group Anonymous had struck the Fed on Sunday, that has accessed personal information of more than 4,000 US bank executives, which it published on the Web.
The claim was made via Twitter over an account registered to OpLastResort, which is linked to Anonymous, a loosely organized group of hacker activists who have claimed responsibility for scores of attacks on government and corporate sites over the past several years.
A copy of the message sent by the Fed to members of its Emergency Communication System (ECS), which was obtained by Reuters, warned that mailing address, business phone, mobile phone, business email, and fax numbers had been published.
The Fed declined to identify which website had been hacked. The website’s purpose is to allow bank executives to update the Fed if their operations have been flooded or otherwise damaged in a storm or other disaster. That helps the Fed to assess the overall impact of the event on the banking system.
Cyber-security specialists said that any organization’s computer systems could be breached, and that it was up to an organization like the Fed to prioritize its security needs, in order to protect its most sensitive information from attack.
“Every system is going to have some vulnerability to it. You cannot set up a system that will survive all possible attacks,” said Mark Rasch, director of Privacy and security consulting at CSC and a former federal cyber crimes prosecutor.
Latest posts by Mohit Arora (see all)
- What You May Not Know About MD5 Hash Generator 2? - February 19, 2017
- Revive Old Post Plugin Review: Share Old Blog Posts on Social Sites - January 9, 2017
- LSI Keywords – What Are They & Tools To Find Them - December 23, 2016