Hackers have managed to breach the U.S. Government’s computer systems and have leaked thousands of personal details belonging to the U.S. Department of Homeland Security and the Federal Bureau of Investigation employees.

The hacker group named the DotGovs, claims to have hacked into the Department of Justices’ computer system through a simple spear phishing email attack. He stated he initially gained access to an internal DoJ network through an email account and a phone call made to a member of DoJ staff.

The DotGovs first posted a database online Sunday morning containing 9,355 names, job titles, locations, phone numbers and email addresses of Department of Homeland Security staff. On Monday, the group threatened to publish the FBI staff directory containing information on over 20,000 employees, and within a few hours, the directory was published. The details were published on an encrypted text-sharing website called Cryptobin.

In addition to these personal details, the group has told Motherboard that they also have over 200GB of data from the DoJ, including sensitive information like credit card numbers and military email addresses.

The DotGovs described themselves as pro-Palestine, and posted the Department of Homeland Security’s data under the message: “This is for Palestine, Ramallah, West Bank, Gaza, this is for the child that is searching for an answer.”

This attack is the latest in a series of foreign policy-motivated attacks against U.S. Government employees. Back in October of 2015, John Brennan, CIA Director, had his personal email account hacked by a teenager who then posted a list of email addresses online from his contact list. That same teenager forwarded every call made to James Clapper, the U.S. Director of National Intelligence, to the Free Palestine Movement.

As attacks on national governments continue growing at an unprecedented rate, it’s time for all government agencies dealing with sensitive data to really reflect on why this information was so easily accessed in the first place, and what can be done now to ensure their digital doors are secure from hackers. The spear phishing attack is one of the easiest ways a hacker can infiltrate your IT system so user education, SPAM blockers, anti-virus tools, and other security applications can help prevent employees from falling victim to a phishing attack.

With anti-virus tools only covering the bare surface, it’s important to implement a layered security approach to your IT estate. By working with NNT, your organization will be able to adopt a ‘layered and integrated approach’ to security that incorporates the right process, methodology and set of tools in order to guard your IT environment against today’s ever-evolving threat landscape.

Here are Just a Few Things You can Achieve with NNT-

  • Continuously monitor and quantify all system activity in real-time pinpointing genuine security threats
  • 'Lockdown' IT systems using expert-sourced, consensus-based system hardening best practices from The Center for Internet Security: CIS Benchmark Checklists
  • Protect your IT infrastructure against both internal and external threats, including ‘zero-day’ threats and Advanced Persistent Threats where Anti-Virus and Intrusion Protection technologies are ineffective
  • Maintain your compliance obligations, such as PCI DSS, NIST SP 800-53, DISA STIG, HIPAA, NERC CIP, ISO 27001 or SOX
  • Provide host intrusion detection systems (HIDS) contingency so that if a breach is effective, you will still be alerted in real-time and know who was responsible



Read this article on the Telegraph

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.