{"id":3709,"date":"2021-11-15T19:47:45","date_gmt":"2021-11-15T14:17:45","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=3709"},"modified":"2021-11-17T12:20:28","modified_gmt":"2021-11-17T06:50:28","slug":"fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/","title":{"rendered":"FBI System Hijacked to Email \u2018Immediate\u2019 Alert About Fake Cyberattacks"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">The Federal Bureau of Investigations (FBI) email servers were hijacked to administer spam email impersonating FBI warnings that the receivers\u2019 network was stealing and the information was stolen.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The spam-tracking nonprofit SpamHaus alerted that tens of thousands of these messages were delivered in two waves early this morning. They also believe is just a small part of the operations.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Appropriate Address Delivers Fake Content&nbsp;<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Security Investigators observed two waves of this operation, one at 5 AM (UTC) and a second one-two hour later. The message came from an appropriate email address&nbsp;-xyz@yv.fbi.gov&nbsp;\u2013 which is in the form of FBI\u2019s Law Enforcement Portal (LEEP), and carried the subject \u201cUrgent: Threat actor in systems.\u201d<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">All emails came from the FBI\u2019s IP address 153.31.119.142 (mx-east-ic.fbi.gov), security researchers told us.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"385\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image1-1024x385.jpg\" alt=\"FBI-System-Hijacked-to-Email-\u2018Immediate\u2019-Alert-About-Fake-Cyberattacks-image1\" class=\"wp-image-3711\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image1-1024x385.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image1-300x113.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image1-768x289.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image1.jpg 1321w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">The message alerts that an attacker has been analyzed in the receiver\u2019s network and has hijacked information from devices.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cOur intelligence monitoring indicates exfiltration of several of your virtualized clusters in a sophisticated chain attack. We tried to blackhole the transit nodes used by this advanced persistent threat actor, however, there is a huge chance he will modify his attack with fast-flux technologies, which he proxies through multiple global accelerators. We identified the threat actor to be Vinny Troia, who is believed to be affiliated with the extortion gang TheDarkOverlord, We highly recommend you to check your systems and IDS monitoring. Beware this threat actor is currently working under the inspection of the NCCIC, as we are dependent on some of his intelligence research we can not interfere physically within 4 hours, which could be enough time to cause severe damage to your infrastructure.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Stay safe,<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">U.S. Department of Homeland Security | Cyber Threat Detection and Analysis | Network Analysis Group\u201d<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Spamhaus Project told our experts that the fraudulent emails reached at least 100,000 mailboxes. The number is a very traditional estimate, though, as the investigators believe \u201cthe operation was probably much, much larger.\u201d<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">In a tweet today, the nonprofit said that the recipients were scraped from the American Registry for Internet Numbers (ARIN) database. While this looks like a prank, there is no doubt that the emails originate from the FBI\u2019s servers as the headers of the message show that its origin is verified by the DomainKeys discovered Mail (DKIM) mechanism.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cReceived: from mx-east-ic.fbi.gov ([153.31.119.142]:33505 helo=mx-east.fbi.gov)<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">envelope-from<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">DKIM-Signature: v=1; a=rsa-sha256; c=relaxed\/relaxed;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">d=fbi.gov; s=cjis; t=1636779463; x=1668315463;&nbsp;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">h=date:from:to:message-id:subject:mime-version;&nbsp;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">bh=UlyBPHe3aElw3Vfnk\/pqYLsBAoJGDFR1NyZFcSfpl5g=;&nbsp;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">b=N3YzXzJEbQCTJGh8qqjkYu\/A5DTE7yoloPgO0r84N+Bm2ae6f+SxzsEq nbjnF2hC0WtiVIMMUVGzxWSiZjq1flEygQGI\/JVjjk\/tgVVPO5BcX4Os4&nbsp;&nbsp;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">vIeg2pT+r\/TLTgq4XZDIfGXa0wLKRAi8+e\/Qtcc0qYNuTINJDuVxkGNUD&nbsp;&nbsp;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">62DNKYw5uq\/YHyxw+nl4XQwUNmQCcT5SIhebDEODaZq2oVHJeO5shrN42&nbsp;&nbsp;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">urRJ40Pt9EGcRuzNoimtUtDYfiz3Ddf6vkFF8YTBZr5pWDJ6v22oy4mNK&nbsp;&nbsp;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">F8HINSI9+7LPX\/5Td1y7uErbGvgAya5MId02w9r\/p3GsHJgSFalgIn+uY<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">&nbsp; &nbsp;Q==;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">&nbsp; &nbsp;X-IronPort-AV: E=McAfee;i=&#8221;6200,9189,10166&#8243;; a=&#8221;4964109&#8243;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">&nbsp; &nbsp;X-IronPort-AV: E=Sophos;i=&#8221;5.87,231,1631577600&#8243;;&nbsp;&nbsp;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">d=&#8221;scan&#8217;208&#8243;;a=&#8221;4964109&#8243;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Received: from dap00025.str0.eims.cjis ([10.67.35.50])<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">&nbsp;&nbsp;by wvadc-dmz-pmo003-fbi.enet.cjis with ESMTP\/TLS\/ECDHE-RSA-AES256-GCM-SHA384; 13 Nov 2021 04:57:41<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">+0000<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Received: from dap00040.str0.eims.cjis (dap00040.str0.eims.cjis [10.66.2.72])<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;by dap00025.str0.eims.cjis (8.14.4\/8.13.8) with ESMTP id 1AD4vf5M029322<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">for ; Fri, 12 Nov 2021 23:57:41 -0500<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Date: Fri, 12 Nov 2021 23:57:41 -0500 (EST)<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">From:&nbsp;<a href=\"mailto:eims@ic.fbi.gov\" target=\"_blank\" rel=\"noreferrer noopener\">eims@ic.fbi.gov<\/a><\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">v=DMARC1; p=reject; rua=mailto:dmarc-feedback@fbi.gov, mailto:reports@dmarc.cyber.dhs.gov; ruf=mailto:dmarc-feedback@fbi.gov; pct=100\u201d<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The headers also display the following FBI internal servers that processed the emails:<\/p><\/p>\n\n\n\n<ul><li>dap00025.str0.eims.cjis<\/li><li>wvadc-dmz-pmo003-fbi.enet.cjis<\/li><li>dap00040.str0.eims.cjis<\/li><\/ul>\n\n\n\n<p><p style=\"text-align: justify;\">The FBI accepted that the content of the email is fraudulent and that they were working on resolving the issue as their helpdesk is flooded with calls from bothered administrators. In a statement to our experts, the FBI said that they could not share more data due to being an ongoing situation.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">&#8220;The FBI and CISA are aware of the incident this morning involving fake emails from an @ic.fbi.gov email account. This is an ongoing situation and we are not able to provide any additional information at this time. We continue to encourage the public to be cautious of unknown senders and urge you to report suspicious activity to www.ic3.gov or www.cisa.gov.\u201d &#8211; FBI.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">In a second statement sent to our experts, the FBI explained that the threat actor behind the spam campaign took advantage of a software configuration to send out the emails. While the messages went out from a server managed by the FBI, the machine was isolated from the agency&#8217;s corporate email and did not offer access to any data or personally identifiable information on the FBI&#8217;s network.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">&#8220;The FBI is aware of a software misconfiguration that temporarily allowed an actor to leverage the Law Enforcement Enterprise Portal (LEEP) to send fake emails. LEEP is FBI IT infrastructure used to communicate with our state and local law enforcement partners. While the illegitimate email originated from an FBI operated server, that server was dedicated to pushing notifications for LEEP and was not part of the FBI&#8217;s corporate email service. No actor was able to access or compromise any data or PII on FBI\u2019s network. Once we learned of the incident we quickly remediated the software vulnerability, warned partners to disregard the fake emails, and confirmed the integrity of our networks&#8221; \u2013 FBI<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">According to the technical information seized by researcher broadcaster Brian Krebs from the individual behind the campaign, the LEEP portal allowed anyone to apply for an account. The registration process required filling in contact information.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">&#8220;A critical step in that process says applicants will receive an email confirmation from eims@ic.fbi.gov with a one-time passcode,&#8221; Krebs wrote on Saturday. This code and the applicant&#8217;s contact details leaked in the web page&#8217;s HTML code.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image2-1024x422.png\" alt=\"FBI-System-Hijacked-to-Email-\u2018Immediate\u2019-Alert-About-Fake-Cyberattacks-image2\" class=\"wp-image-3712\" width=\"612\" height=\"252\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image2-1024x422.png 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image2-300x124.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image2-768x317.png 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image2-1536x634.png 1536w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image2.png 1600w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">Using a script, the actor could change the parameters with an email subject and body of their choice, and automate the sending of the messages.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image3-1024x429.png\" alt=\"FBI-System-Hijacked-to-Email-\u2018Immediate\u2019-Alert-About-Fake-Cyberattacks-image3\" class=\"wp-image-3713\" width=\"587\" height=\"245\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image3-1024x429.png 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image3-300x126.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image3-768x322.png 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image3-1536x644.png 1536w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-image3.png 1600w\" sizes=\"(max-width: 587px) 100vw, 587px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Proposed to defame Security Investigators<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Whoever is behind this operation was likely prompted to undermine Vinny Troia, the author of dark web intelligence company Shadowbyte, who is named in the message as the threat actor responsible for the fake supply-chain attack.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Members of the RaidForums hacking community have a long-standing feud with Troia, and commonly deface websites and perform minor hacks where they blame it on the security researcher.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Tweeting about this spam campaign, Vinny Troia hinted at someone known as \u201cpompomourin,\u201d as the likely author of the attack. Troia says the individual has been associated in the past with incidents aimed at undermining the security researcher\u2019s reputation.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Speaking to our experts, Troia said that \u201cmy best guess is &#8216;pompompurin&#8217; and his bands of minions are behind this incident.\u201d \u201cThe last time they pompompurin hacked the national center for missing children\u2019s website blog and put up a post about me being a pedophile\u201d &#8211; Vinny Troia<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">This assumption is further supported by the fact that &#8216;pompompurin&#8217; contacted Troia a few hours before the spam email campaigns started to simply say \u201cenjoy,\u201d as a warning that something involving the researcher was about to happen. Troia said that &#8216;pompompurin&#8217; messages him every time they start an attack to discredit the researcher.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Federal Bureau of Investigations (FBI) email servers were hijacked to administer spam email impersonating FBI warnings that the receivers\u2019 network was stealing and the information was stolen. The spam-tracking nonprofit SpamHaus alerted that tens of thousands of these messages were delivered in two waves early this morning. They also believe is just a small [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3714,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FBI System Hijacked to Email \u2018Immediate\u2019 Alert About Fake Cyberattacks - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FBI System Hijacked to Email \u2018Immediate\u2019 Alert About Fake Cyberattacks - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"The Federal Bureau of Investigations (FBI) email servers were hijacked to administer spam email impersonating FBI warnings that the receivers\u2019 network was stealing and the information was stolen. The spam-tracking nonprofit SpamHaus alerted that tens of thousands of these messages were delivered in two waves early this morning. They also believe is just a small [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-15T14:17:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-17T06:50:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-feature-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"FBI System Hijacked to Email \u2018Immediate\u2019 Alert About Fake Cyberattacks\",\"datePublished\":\"2021-11-15T14:17:45+00:00\",\"dateModified\":\"2021-11-17T06:50:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/\"},\"wordCount\":1245,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Breaches\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/\",\"url\":\"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/\",\"name\":\"FBI System Hijacked to Email \u2018Immediate\u2019 Alert About Fake Cyberattacks - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-11-15T14:17:45+00:00\",\"dateModified\":\"2021-11-17T06:50:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FBI System Hijacked to Email \u2018Immediate\u2019 Alert About Fake Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FBI System Hijacked to Email \u2018Immediate\u2019 Alert About Fake Cyberattacks - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"FBI System Hijacked to Email \u2018Immediate\u2019 Alert About Fake Cyberattacks - Xiarch Solutions Private Limited","og_description":"The Federal Bureau of Investigations (FBI) email servers were hijacked to administer spam email impersonating FBI warnings that the receivers\u2019 network was stealing and the information was stolen. The spam-tracking nonprofit SpamHaus alerted that tens of thousands of these messages were delivered in two waves early this morning. They also believe is just a small [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-11-15T14:17:45+00:00","article_modified_time":"2021-11-17T06:50:28+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/11\/FBI-System-Hijacked-to-Email-\u2018Immediate-Alert-About-Fake-Cyberattacks-feature-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"FBI System Hijacked to Email \u2018Immediate\u2019 Alert About Fake Cyberattacks","datePublished":"2021-11-15T14:17:45+00:00","dateModified":"2021-11-17T06:50:28+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/"},"wordCount":1245,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Breaches"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/","url":"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/","name":"FBI System Hijacked to Email \u2018Immediate\u2019 Alert About Fake Cyberattacks - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-11-15T14:17:45+00:00","dateModified":"2021-11-17T06:50:28+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/fbi-system-hijacked-to-email-immediate-alert-about-fake-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"FBI System Hijacked to Email \u2018Immediate\u2019 Alert About Fake Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/3709"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=3709"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/3709\/revisions"}],"predecessor-version":[{"id":3715,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/3709\/revisions\/3715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/3714"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=3709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=3709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=3709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}