Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
United States Security

Hackers Spied on 100 US Bank Regulators' Emails for Over a Year 14

Hackers intercepted about 103 bank regulators' emails for more than a year, gaining access to highly sensitive financial information, Bloomberg News reported Tuesday, citing two people familiar with the matter and a draft letter to Congress. From the report: The attackers were able to monitor employee emails at the Office of the Comptroller of the Currency after breaking into an administrator's account, said the people, asking not to be identified because the information isn't public. OCC on Feb. 12 confirmed that there had been unauthorized activity on its systems after a Microsoft security team the day before had notified OCC about unusual network behavior, according to the draft letter.

The OCC is an independent bureau of the Treasury Department that regulates and supervises all national banks, federal savings associations and the federal branches and agencies of foreign banks -- together holding trillions of dollars in assets. OCC on Tuesday notified Congress about the compromise, describing it as a "major information security incident."

"The analysis concluded that the highly sensitive bank information contained in the emails and attachments is likely to result in demonstrable harm to public confidence," OCC Chief Information Officer Kristen Baldwin wrote in the draft letter to Congress that was seen by Bloomberg News. While US government agencies and officials have long been the targets of state-sponsored espionage campaigns, multiple high-profile breaches have surfaced over the past year.

Hackers Spied on 100 US Bank Regulators' Emails for Over a Year

Comments Filter:
  • "social engineering".. ie. some joe actually gives his password away because someone asks for it?
    or the more obvious, Just don't use Microsoft?
    • by Moryath ( 553296 )

      This is why passwords should expire every 60 days. For EVERYONE.

      But a question: is this legit? Why is the ONLY coverage a singapore (chinese-owned) paper???

      • by madbrain ( 11432 ) on Wednesday April 09, 2025 @01:29AM (#65291473) Homepage Journal

        Periodic forced password changes are no longer advised under NIST SP800-63-4 .

        Those who fall for social engineering attacks will also fall for them even after repeated password changes.

        • This.

          60 day password rotation is not a solution. It only gives the bad actor a slightly shorter timeframe to perform their unsavory deeds. Meanwhile, it also encourages the users to use easier and guessable passwords, otherwise they'll forget their own passwords.

          For something that actually works, try MFA, geolocation and device certificates instead. Preferably all three, but if you can pick only one, take the last one. Allowing known devices only based on device certificates is a killer.

      • But a question: is this legit? Why is the ONLY coverage a singapore (chinese-owned) paper???

        The Straits Times is NOT Chinese owned.
        It is owned by SPH Media Trust, a private company with no Chinese ownership.

  • Administrators should not have access to emails of other users. They should be able to reset passwords if needed, but a) this would be noticed by the end user and b) for any account which has sensitive information in the email, all past emails should be encrypted and lost whenever a password is reset.
    • In some businesses SEC rules require that email be retained for at least 6 years with 2 year having them readily available.

      • Then retain them, all encrypted, with decryption keys secured offline in a physical safe with good security somewhere. Now, to hack the emails you have to hack the system to get the encrypted emails, then rob the bank where the safe that holds the decryption keys are. There is a much greater chance someone would notice at least one of those events, than just admin getting hacked.
  • CyberInsecurity: The Cost of Monopoly [ccianet.org]

    “How the Dominance of Microsoft's Products Poses a Risk to Security.”

    “Microsoft’s efforts to design its software in evermore complex ways so as to illegally shut out efforts by others to interoperate or compete with their products has succeeded. The monopoly product we all now rely on is thus both used by nearly everyone and riddled with flaws. A special burden rests upon Microsoft because of this ubiquity of its product, and we all need to be aware of the dangers that result from reliance upon such a widely used and essential product.”

Work continues in this area. -- DEC's SPR-Answering-Automaton

Working...