Hackers strike at US Federal Reserve Bank
BY Agencies8 Feb 2013 5:59 AM IST
Agencies8 Feb 2013 5:59 AM IST
A group of computer hackers known as Anonymous has struck again, this time accessing the sensitive credentials of thousands of US Federal Reserve bank contacts and then exposing them publicly in a taunting online message as the Fed sought to minimize the impact. ‘Now we have your attention America,’ the hacker group posted to Twitter Sunday, adding in a separate message, ‘We have posted over 4,000 US bank executive credentials.’
The Twitter post linked to a spreadsheet - which has since been removed - contained usernames and personal contact information for bank executives across the US.
The document was quickly shared across various social media accounts affiliated with Anonymous.
The information was obtained from the Emergency Communications System database belonging to the Federal Reserve Bank of Saint Louis, the tech website ZDNet reported Wednesday.
A spokesperson for the Fed confirmed the breech, but downplayed the severity.
‘Information was obtained by exploiting a temporary vulnerability in a website vendor product,’ a spokesperson for the US Federal Reserve told the Huffington Post, adding that the problem was ‘fixed after discovery and is no longer an issue.’
The Twitter post linked to a spreadsheet - which has since been removed - contained usernames and personal contact information for bank executives across the US.
The document was quickly shared across various social media accounts affiliated with Anonymous.
The information was obtained from the Emergency Communications System database belonging to the Federal Reserve Bank of Saint Louis, the tech website ZDNet reported Wednesday.
A spokesperson for the Fed confirmed the breech, but downplayed the severity.
‘Information was obtained by exploiting a temporary vulnerability in a website vendor product,’ a spokesperson for the US Federal Reserve told the Huffington Post, adding that the problem was ‘fixed after discovery and is no longer an issue.’
Next Story