iTnews
  • Home
  • News
  • Technology
  • Security

Hackers breach White House network

By Staff Writers on Oct 29, 2014 2:47PM
Hackers breach White House network

Unclassified system suffers intrusion.

The US White House has revealed unnamed hackers breached one of its unclassified computer networks in recent weeks, resulting in a temporary disruption of service to users as IT technicians scrambled to address the intrusion.

A White House official said suspicious cyber activity had been detected on the network - used by employees of the executive office of the president - and actions had been taken to address it.

"In the course of assessing recent threats we identified activity of concern on the unclassified EOP network. Any such activity is something that we take very seriously. In this case we took immediate measures to evaluate and mitigate the activity," the official said.

Some of the network's services had limited access while the White House's IT team attempted to address the issue.

Work continues to resolve the problem, the spokesperson said, but systems did not appear to have been damaged as a result of the intrusion.

"Our actions are ongoing and some of our actions have resulted in temporary outages and loss of connectivity for some EOP users," the official said.

A second administration official said there were no current indications that classified networks had been affected.

The FBI, Secret Service and National Security Agency are investigating the issue. 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright Reuters
© 2019 Thomson Reuters. Click for Restrictions.
Tags:
breachhackernetworksecuritysystemwhute house

Partner Content

"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Staff Writers
Oct 29 2014
2:47PM
0 Comments

Related Articles

  • Australian Red Cross clients potentially caught up in international cyber attack
  • Routing security falling short in Australian, New Zealand networks
  • Crypto crash threatens North Korea's stolen funds
  • Carnival fined US$5m for cyber security violations
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

Australian scientists build world's first quantum computer IC

Australian scientists build world's first quantum computer IC

Digital Nation

Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
The security threat of quantum computing
The security threat of quantum computing
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.