IMF hacked through phishing

Powered by SC Magazine
 

Spear phishing fingered in attack.

The International Monetary Fund was hacked in an attack that led a spooked World Bank to cut a network link to the organisation.

The IMF, which informed its directors of the incident on Wednesday, had not provided public details on the attack including if the highly sensitive data it held on the fiscal state of nations was compromised.

One official who spoke to the New York Times described the attack as a "very major breach" which had occurred over several months.

The World Bank "out of an abundance of caution" had cut a link with the IMF used to share less sensitive information and briefly terminated external access to its systems.

While the IMF hack did not exploit RSA's compromised SecurID tokens, both companies were attacked via spear phishing.

RSA annunced the attack on SecurID in March which was launched by sending a spear phishing email that contained a compromised Adobe file. Once an RSA staffer had opened the file, the attackers were able to launch exploits and eventually gain access to the company's network.

McAfee chief security officer Brett Whalin said the use of spear phishing had increased.

"To accentuate the damage of [sophisticated attacks] is to exploit social engineering".

He advised organisations to educate their staff about the dangers of talking to strangers or those not authorised to receive information.

Copyright © SC Magazine, Australia


IMF hacked through phishing
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 439

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 210

Vote