Cybersecurity, Privacy, & AI

Trending Now
Agriculture Department Kicks Off $300M Palantir Deal on IT, National Security Work • Vercel Attack Fallout Expands to More Customers and Third-Party Systems • Seeing the Cyber in Economic Statecraft • Responding to a Data Breach: How to Preserve the Attorney-Client Privilege • NIST Cyber Center to Launch OT ‘Visibility’ Project

DOJ Takes Down Domains Used in USAID Hack

Mark Van Scyoc | Shutterstock

The Department of Justice has seized two command-and-control (C2) and malware distribution domains used in recent spear-phishing activity that mimicked email from the U.S. Agency for International Development. The action was intended to disrupt any additional exploitation of victims and to help identify anyone compromised by the attack. However, DOJ indicated the hackers could have deployed additional accesses to victims’ before their domains were seized.

The attack commenced on or about May 25, when hackers launched a wide-scale spear-phishing campaign via a compromised USAID account at a mass market email marketing company. Specifically, the compromised account was used to send thousands of emails, purporting to be from USAID email accounts and containing a “special alert,” while lured users to a malicious site where malware was downloaded onto the victims’ computers.

Sources:

Stay compliant and protected with daily updates on cybersecurity, data privacy, and federal oversight with our Cyber & Privacy newsletter, delivering up-to-the-minute intelligence Monday–SaturdaySubscribe here.