Cybersecurity

Russian-Speaking Hackers Gain Access To More Than 600,000 DOJ, DOD Email Addresses

In a major cybersecurity incident, Russian hackers have gained access to the email addresses of over 600,000 employees at the Department of Justice (DOJ) and Department of Defense (DOD).
File Photo

In a major cybersecurity incident, Russian-speaking hackers have gained access to the email addresses of over 600,000 employees at the Department of Justice (DOJ) and Department of Defense (DOD).

This expansive hack, which occurred in the spring of 2023, has raised concerns about the security of sensitive government information and the potential impacts on national security.

The hacking group responsible for this breach is believed to be CL0p, according to Bloomberg.

CL0p has been active since 2014 but gained notoriety for its ransomware attacks in 2019. Cybersecurity researchers suspect that CL0p operates with the unspoken backing of the Russian government.

Read: Nonviolent Activism Vs. Terrorism On U.S. College Campuses

Their targeting extends beyond government organizations, encompassing both government and private entities, with over 2,500 organizations likely falling victim to their attacks.

The hackers exploited a vulnerability in the MOVEit file transfer tool, which is used by various government agencies, including the DOJ and DOD.

This tool, provided by Westat Inc., was contracted by the Office of Personnel Management (OPM) to administer Federal Employee Viewpoint Surveys.

The breach allowed the hackers to gain unauthorized access to government email addresses, links to surveys, and internal employee tracking codes.

The DOJ, a critically important government agency responsible for enforcing federal laws, was one of the primary targets of this hack. The Cl0p hackers gained access to email addresses of DOJ employees, potentially compromising communication channels and sensitive information within the department.

The DOD, which encompasses various branches and defense agencies, also fell victim to this expansive hack. The Office of the Secretary of Defense, Air Force, Army, U.S. Army Corps of Engineers, Joint Staff, and other defense agencies and field activities were affected. The breach raises concerns about potential leaks of classified information and the compromise of national security protocols.

Read: Texas Border: Federal Judge Temporarily Blocks Biden Admin From Removing Border Wire

Apart from the DOJ and DOD, other government agencies also confirmed the compromise of email addresses and other information. The Department of Health and Human Services, Department of Agriculture, General Services Administration, and Department of Energy acknowledged that their email addresses and related data were accessed by the threat actors.

Despite the scale of the breach, the Office of Personnel Management (OPM) characterized the information obtained by the hackers as “generally of low sensitivity.” This assessment suggests that the compromised data might not pose a major threat to national security. However, the potential consequences of the breach cannot be fully assessed until a comprehensive analysis is conducted.

The OPM report indicates that there is “no indication” that any unauthorized person accessed the links to surveys leaked in the breach. This provides some reassurance that the sensitive survey data remains secure, although further investigation is required to confirm this.

The hackers exploited a weakness in the code of the MOVEit file transfer service, which allowed them to gain unauthorized access to sensitive information. The MOVEit service, provided by Progress Software Corp., facilitates the secure transfer of files within government organizations and between external parties. The breach highlights the importance of regularly updating and securing file transfer tools to prevent such vulnerabilities.

Westat Inc., a company contracted by the OPM, plays a crucial role in administering Federal Employee Viewpoint Surveys. The hackers targeted the code for the MOVEit file transfer service used by Westat Inc., leveraging this access to compromise the security of government email addresses and other data. This incident underscores the need for robust security measures when outsourcing critical services.

The Department of Health and Human Services confirmed that its email addresses and other information were accessed by the threat actors. This agency is responsible for vital healthcare services and the protection of sensitive medical data. The breach raises concerns about potential privacy violations and the integrity of healthcare systems.

Read: Kentucky Sen. Mitch McConnell’s Unprecedented Push For Ukraine Aid

The Department of Agriculture, which oversees agricultural policies and programs, also acknowledged that its email addresses and related data were compromised. This breach has implications for the security of food supply chains and the protection of agricultural research and development.

The General Services Administration, responsible for managing federal government facilities and resources, reported the compromise of email addresses and other information. This breach raises concerns about the potential disruption of critical government operations and the vulnerability of government infrastructure.

The Department of Energy faced a significant threat from the Cl0p hackers, who demanded a ransom after compromising two of its sub-agencies. This incident highlights the potential economic and national security implications of such breaches, as the Department of Energy plays a crucial role in energy policy, nuclear security, and scientific research.

The Cl0p ransomware group has gained notoriety for its extensive targeting of organizations worldwide. Their attacks have affected both government agencies and private companies, with their primary objective being financial gain through ransom demands. The breadth of their targeting raises concerns about the overall vulnerability of critical infrastructure and the need for enhanced cybersecurity measures.

Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency (CISA), confirmed that the Cl0p ransomware group orchestrated this massive attack. However, she reassured the public that the breaches would not pose a “systemic risk” to national security or U.S. networks. CISA’s role in coordinating cybersecurity efforts and ensuring the resilience of critical infrastructure is crucial in responding to such incidents.

Read: German Concert-Goer In Israel, Shani Louk, Was Beheaded After Kidnapped By Hamas Monsters

The Cl0p hacking group has been active since 2014, but it wasn’t until 2019 that they started targeting organizations with ransomware attacks. Cybersecurity researchers suspect that Cl0p operates with the unspoken backing of the Russian government, although direct evidence linking the two remains elusive. The alleged government support raises questions about the adequacy of international cybersecurity regulations and the need for greater cooperation in combating cyber threats.

Progress Software Corp., the parent company of the MOVEit file transfer tool, has taken immediate action to mitigate the impacts of the breach. Implementing security patches and strengthening the vulnerability detection capabilities of their software are crucial steps in preventing future attacks. The incident highlights the importance of proactive measures by software providers to maintain the integrity of their products and protect their users.

The Department of Defense and Department of Justice are yet to provide an official response to the breach.

However, given the sensitivity of the information compromised and the potential implications for national security, it is expected that they are conducting thorough investigations and implementing enhanced security measures.

Android Users, Click To Download The Free Press App And Never Miss A Story. Follow Us On Facebook and Twitter. Signup for our free newsletter. 

We can’t do this without your help; visit our GiveSendGo page and donate any dollar amount; every penny helps

Login To Facebook To Comment