The US State Department has taken its unclassified email system offline for maintenance after admitting the system was potentially breached by hackers.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The intrusion at the State Department reportedly took place at the same time as hackers – believed to be backed by a nation state – also breached the White House network, which was made public in October 2014.
It is the latest acknowledgment that sensitive government systems have been breached.
On 28 October, the White House said it detected suspicious activity on the unclassified Executive Office of the President network.
According to officials, the network went down for some time as cyber security teams countered the attack.
More on cyber espionage
- US charges Chinese military officers with cyber espionage
- UK among targets of 'Mask' advanced cyber espionage campaign
- NSA involved in industrial espionage, says Snowden
- Researchers uncover Indian cyber espionage network
- Researchers uncover advanced cyber espionage campaign
- Targeted cyber espionage on the increase, McAfee warns
- IT manufacturers fight cyber espionage risks in the supply chain
- Norway’s Telenor hit by cyber espionage campaign
- Security Think Tank: Five steps to protect IP from cyber espionage
- Prolific cyber espionage group tied to the Chinese military
Following the attack on the White House, several US government agencies – such as the US Postal Service and the National Weather Service – have reported cyber attacks, but it not clear if they are all linked.
The maintenance at the State Department disrupted email traffic to employees and their ability to access public websites, reported Nextgov.
It is unclear why officials waited so long to take down the potentially infected systems at the State Department, the report said.
The Washington Post reported that State Department employees were using Gmail accounts until the email service is restored.
A State Department spokesman said “activity of concern” had been detected in parts of the unclassified email system, but there was no compromise of any classified systems.
The spokesman declined to comment on who was behind the intrusion or how long the suspicious activity had been going on.
He said the repairs had been specifically planned to bolster the security of its main unclassified network.
The security improvements are expected to be completed in the next few days.
In October 2014, security researchers at Trend Micro uncovered evidence of political and economic cyber espionage attacks on military, diplomatic and defence industry targets in the US, Europe and Pakistan.