Hackers may have breached FBI wiretap network via supply chain
好的,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,并且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解其主要内容。 文章主要讲述了FBI的一个关键系统最近遭受了网络攻击,调查人员怀疑这可能不是随机事件,而是有国家背景的黑客所为。攻击路径是通过一家供应商的ISP进入FBI系统,导致敏感数据泄露。白宫、DHS和NSA都参与了调查,推测可能是中国相关的黑客组织所为。此外,文章还提到类似的攻击事件频繁发生,显示国家行为者正在积极收集情报。最后,立法者呼吁加强电话网络的安全性。 接下来,我需要将这些要点浓缩到100字以内。重点包括:FBI系统被攻击、怀疑国家参与、攻击路径、涉及的数据类型、多机构调查、可能的中国背景、类似事件增多以及安全漏洞的问题。 现在,我需要把这些信息组织成连贯的句子,并确保不超过字数限制。同时,要避免使用像“这篇文章总结了”这样的开头语。 最后检查一下是否涵盖了所有关键点,并且语言简洁明了。 </think> FBI关键系统遭网络攻击,调查怀疑涉及国家行为者。攻击通过供应商ISP进入系统,泄露敏感数据。白宫、DHS和NSA介入调查,推测可能为中国相关黑客所为。此类针对政府系统的攻击增多,显示国家情报收集活动活跃。 2026-3-10 10:38:51 Author: www.malwarebytes.com(查看原文) 阅读量:17 收藏

Investigators are worried that a recent attack on a critical FBI system was more than just a random hit, and that another nation-state might have been involved.

On February 17, the FBI flagged irregular network activity that led straight to its Digital Collection System Network. That system contains sensitive data related to court-authorized wiretaps, pen registers, and FISA warrants, along with personal information on active FBI targets.

The bureau claims it has “identified and addressed” the suspicious activity. That’s it. No word on whether this was ransomware, state-sponsored espionage, or something else entirely.

Now the White House, DHS, and the NSA have joined the investigation, which isn’t the kind of guest list you’d see for a minor incident.

The breach path? Through a vendor’s internet service provider, according to reports. Not a frontal assault on FBI systems, but a side door through their supply chain. The hackers apparently exploited an ISP that served as a vendor to the agency, bypassing direct FBI defenses entirely.

The Wall Street Journal reports that US investigators suspect that hackers affiliated with the Chinese government were behind the breach.

It wouldn’t be the first time that Chinese state-linked groups have hit a target via a third-party telecommunications system. Hackers tied to Salt Typhoon hit AT&T and Verizon in 2024. The campaign compromised call records and private communications of politicians, exposing anyone involved in government activity, while also going after law enforcement systems.

A year earlier, ransomware operators breached the US Marshals Service and walked away with employee information, legal documents, and administrative data. Then Russian hackers targeted federal courts last year. The judiciary described it as an escalation in cyberattacks while scrambling to protect case files that could expose confidential informants.

This trend of attacks on government systems suggests that nation-state actors are actively collecting intelligence. Law enforcement systems are attractive targets because they contain large volumes of sensitive information. This latest incident indicates these attacks are getting more sophisticated, not less.

How secure are FBI systems?

The Digital Collection System Network stores personally identifiable information on FBI investigation subjects, including wiretap returns and other surveillance data. This includes “pen register” data, which reveals metadata about which numbers a monitored phone line called, and which numbers called that line.

Lawmakers are calling for action. In December 2024, Sen. Ron Wyden (D-Ore) proposed legislation to tighten up security of the nation’s phone networks.

In 1994, Congress passed lawful access legislation designed to allow government access to telcos’ systems. That law also enabled the FCC to issue regulations that would force telecom providers to secure their systems against unauthorized access by third parties, but Wyden said that was never done.

Introducing the Secure American Communications Act, he said:

“It was inevitable that foreign hackers would burrow deep into the American communications system the moment the FCC decided to let phone companies write their own cybersecurity rules.”

The draft legislation didn’t go any further, though.

February’s breach raises an uncomfortable question. If attackers can slip through vendor ISPs into the FBI’s wiretapping infrastructure, what else sits exposed?

The bureau says it “identified and addressed” the suspicious activity. Beyond that, little detail has been released. What is clear is that federal law enforcement systems face sustained and sophisticated attacks, and the pressure on those defenses is growing.


What do cybercriminals know about you?

Use Malwarebytes’ free Digital Footprint scan to see whether your personal information has been exposed online.

About the author

Danny Bradbury has been a journalist specialising in technology since 1989 and a freelance writer since 1994. He covers a broad variety of technology issues for audiences ranging from consumers through to software developers and CIOs. He also ghostwrites articles for many C-suite business executives in the technology sector. He hails from the UK but now lives in Western Canada.


文章来源: https://www.malwarebytes.com/blog/data-breaches/2026/03/hackers-may-have-breached-fbi-wiretap-network-via-supply-chain
如有侵权请联系:admin#unsafe.sh