Skip to main content

Hackers breach IMF with ‘sophisticated cyberattack’ [update]

Hackers have hit the International Monetary Fund with a “large and sophisticated cyberattack,” reports The New York Times. The IMF oversees the global financial system, and has highly confidential records about the economies of nations around the world. IMF staff and its board of directors learned of the attack on Wednesday, but no public pronouncement about the breach has yet been made, besides a vague statement by an IMF spokesman that all but ignores the incident.

“The fund is fully functional,” IMF spokesman David Hawley said in a statement to Reuters. “I can confirm that we are investigating an incident. I am not in a position to elaborate further on the extent of the cybersecurity incident.”

An unnamed IMF “official” who spoke with the Times describes the breach as “very major,” though exact details about what information, if any, was compromised remains unknown. Because the IMF has played an integral role in the bailouts of economically fragile countries like Portugal, Greece and Ireland, its databases contain agreements between various world governments that one fund official described as “political dynamite in many countries.” It is not yet clear whether this information was compromised in the breach.

One official indicated that the attack took place over the last few months, before Dominique Strass-Kahn, a French politician who ran the fund, was arrested in New York for allegedly sexually assaulting a hotel maid.

The attack on the IMF follows a wave of similar digital assaults on a variety of other entities, including Sony, Google, Citibank and prominent US defense contractor Lockheed Martin. The fund reportedly told the Times that it “did not believe” that the intrusion into their system was related to the Lockheed breach.

Those with knowledge of the IMF attack believe that hackers used a technique known as “spear phishing” — tricking a user to click on a malicious link or download spyware that reveals their private credentials — to carry out the intrusion. For the Lockheed breach, on the other hand, hackers broke into the systems of RSA Security and stole data that made it possible to duplicate their SecurID encryption keys, which are used to login to a wide variety of sensitive computer systems around the world.

As the near-constant high-profile attacks that have taken place over the past months shows us, no computer system is 100 percent safe. And because of that, this is far from the last time such an attack will take place. Prepare  yourself, people; it’s about to get interesting.

UPDATE: Bloomberg reports that “hackers believed to be connected to a foreign government” carried out the IMF attack. Nearly every time a “foreign government” has been implicated in a cyberattack recently, that government is China’s. That’s not to say China carried out this attack — we have no idea — but you can bet your dollars they are on the short list.

Andrew Couts
Former Digital Trends Contributor
Features Editor for Digital Trends, Andrew Couts covers a wide swath of consumer technology topics, with particular focus on…
Not even your PC’s power supply is safe from hackers
Eaton 5S1500LCD UPS Battery Backup.

Hackers have managed to find a way to successfully gain access to uninterruptable power supply (UPS) computer systems, according to a report from The Cybersecurity and Infrastructure Security Agency (CISA).

As reported by Bleeping Computer and Tom’s Hardware, both the Department of Energy and CISA issued a warning to organizations based in the U.S. that malicious threat actors have started to focus on infiltrating UPS devices, which are used by data centers, server rooms, and hospitals.

Read more
Hackers just stole personal data from millions of Acer customers
acer swift 3 13 2019 review acerswift3132019

Acer has just confirmed that its servers were beached by a group of hackers called Desorden. The hackers managed to steal over 60 gigabytes worth of data containing sensitive information about millions of Acer's customers.

The compromised information includes the names, addresses, and phone numbers of several million clients, but also restricted corporate financial data.

Read more
Some ethical hackers are making huge amounts of cash
mexico voting breach hacking laptop passwords code

Broadly speaking, hackers come in two flavors. Those who are out to exploit a computer system and cause havoc for its operator and people who use it, and those who search for vulnerabilities in a system and then inform the operator in exchange for a cash reward.

The latter can make some serious dough from their work, too, with the top ones able to earn millions of dollars in the space of a single year.

Read more