You should always vet any federal contacts outside of established channels with 
your FBI liaison before responding.

Aaron

> On Nov 13, 2021, at 10:34 AM, Glenn McGurrin via Outages 
> <outages@outages.org> wrote:
> 
> not quite an outage, more a hack, but thought it relevant.  As always 
> replies to -discussion unless someone sees an official statement from the FBI 
> or other government agencies (I have not seen one yet).
> 
> I had a bit of an odd one this morning, I received two emails through 
> contacts listed in whois subject: "Urgent: Threat actor in systems" from 
> "e...@ic.fbi.gov".  I was all set to ignore them as an odd bit of spam but 
> did a quick check on the headers and was surprised to see it had valid dkim 
> and spf and was from an actual FBI IP, queue real worry starting (as odd and 
> off as the email content was, it's a lot more real when suddenly it's either 
> legit or the FBI got hacked to send the email).  Luckily (for some definition 
> of lucky) it looks like it was a case of something being hacked on the FBI's 
> end as calling they immediately knew what I was calling about and said they 
> had dealt with the compromised equipment.  Further googling after that call 
> shows a few more reports of this ex. 
> https://twitter.com/spamhaus/status/1459450061696417792 and 
> https://www.newsweek.com/fbi-email-system-reportedly-hacked-fake-dhs-cyberattack-messages-1648966
>  but I'd figured to mention it here so others don't get caught quite as off 
> guard.
> 
> Best guess I can come up with is it's an attempt to ruin the person mentioned 
> in the email's name and/or promote the name of the mentioned gang.  The 
> specifics seem off for trying to get someone swatted given if you thought 
> this was real what local agency would want to storm a federal operation with 
> swat agents, and if you thought this was all fake, then you wouldn't go 
> either.  That or create FUD for any other warnings issued and distract from 
> something else going on.
> 
> 
> Full body of the email:
> 
> Our intelligence monitoring indicates exfiltration of several of your 
> virtualized clusters in a sophisticated chain attack. We tried to blackhole 
> the transit nodes used by this advanced persistent threat actor, however 
> there is a huge chance he will modify his attack with fastflux technologies, 
> which he proxies trough multiple global accelerators. We identified the 
> threat actor to be Vinny Troia, whom is believed to be affiliated with the 
> extortion gang TheDarkOverlord, We highly recommend you to check your systems 
> and IDS monitoring. Beware this threat actor is currently working under 
> inspection of the NCCIC, as we are dependent on some of his intelligence 
> research we can not interfere physically within 4 hours, which could be 
> enough time to cause severe damage to your infrastructure.
> Stay safe,
> U.S. Department of Homeland Security | Cyber Threat Detection and Analysis | 
> Network Analysis Group
> _______________________________________________
> Outages mailing list
> Outages@outages.org
> https://puck.nether.net/mailman/listinfo/outages

_______________________________________________
Outages mailing list
Outages@outages.org
https://puck.nether.net/mailman/listinfo/outages

Reply via email to