the hackers exploited a vulnerability in a very popular software called move it. it is a file transfer software that governments and organizations use to sends files from one system to another. the hack actually began several weeks ago, but this week, cnn broke the news that multiple u.s. government agencies were impacted. the investigation is ongoing. this appears to be a very opportunistic attack. and there s not really a risk of any sort of disruption to government services. however, it is another reminder of the threat from ran someware which has haunted organizations around the world in the last few years. hackers from russia and eastern europe and elsewhere, have been able to extort organizations for millions of dollars and continue to fuel their attacks, using the money they earned. thanks for that report. with me now is a former special assistant to the president for cybersecurity, who is also a senior director under president joe biden on the national security council. ahm
by their move it applications and are working to ensure timely remediation. move it is a widely used file transfer software that hackers appear to have found a vulnerability in earlier this year and began exploiting in late may. progress, the u.s. firm that owns the move it software, has urged victims to update their packages. and so far the u.s. department of energy is the only federal agency to confirm publicly that it was hit saying in a statement that records from two of its entities were compromised and that the department is investigating the incident. but the hackers have used the vulnerability to target not only federal agencies but also state governments and academic institutions including johns hopkins university. in terms of who is behind the hack, a russian speaking ra ransomware group claimed credit for some of the attacks that also affected bbc, british
targeting several u.s. government agencies. racing to limit the impact and find how extensive the hacking really is. we re live at the white house with the latest. what do you know? as you mentioned right now it is not clear how extensive the damage is in this large cyberattack or exactly who is responsible. many lawmakers are pointing the finger at russian hackers. the defense department neither confirming or denying the tack. for reasons of operation security we don t discuss the status of our networks. we recognize the serious nature of new and emerging cyber threats and vulnerabilities and adjust cyber defenses to make sure we remain operationally effective in capable and sophisticated adversaries. they used file transfer software to steal data from several federal agencies. the energy department maintains as many functions, including
was created in 2021 and backed by the saudi sovereign wealth fund. since then the two parties were better rivals, each engaged in lawsuits against one another. the mega deal essentially created a whole new golf association led by the saudi s. meanwhile a us judge has granted a request from prosecutors to try some of their charges against crypto currency exchange sandbank men freed and a second trial next year. to 31 year old is still expected to stand trial this october overcharges stemming 0ctober overcharges stemming from the collapse of the now bankrupt firm. he has pleaded not guilty to the charges. the us government has been hit by a global hacking campaign, but the cyber watchdog agency said it is not expected to have much of an impact. severalfederal bodies have been affected following a vulnerability in a file transfer software. the
anything from u.s. government agencies that is significant. but they re still investigating here. so, what seems to have happened, just to take a step back, is that there is a file transfer software that many, many companies and entities in the u.s. and around the world use to transfer files. and what happened was hackers actually found a vulnerability in that software. so, that allowed them to kind of burrow in and take advantage and hack all of these different entities and companies. in terms of who s responsible, we re told that it is a russian cyber criminal group which specializes in ransomware. they are apparently trying to extort their victims. they have posted on their website that they have demanded money and they have continued when they ve not gotten that money to post more victims and threaten them. and, you know, it s unclear whether that is the extent of it because now that this software vulnerability is out there, other criminal hackers can also take advantage of it. tha