Breaking News

FBI Hacks Computers In US To Remove Malicious Software

The FBI hacks computers in the United States to remove malicious software. China-backed hackers used Microsoft’s Exchange Server flaw.

The Federal Bureau of Investigation (FBI) announced this Tuesday that it received judicial authorization to access hundreds of computers of individuals in the US without their permission, that is, “hack” them, and thus be able to proceed with the removal of malicious software that had been them. installed. In a statement, the Justice Department, under which the FBI operates, defined the operation as “copy and delete” and said the results were “successful.”

The affected computers used Exchange Server, an email and calendar service used by Microsoft’s Windows Server operating systems , primarily intended for corporate use by companies and governments.

In early March, Exchange Server was the victim of a massive attack by hackers supported by the Chinese government, who gained access to hundreds of email accounts. This group of hackers sought to steal information from US organizations in fields as diverse as infectious disease research, law firms, higher education, defense contractors, think tanks and NGOs.

The FBI hacks computers in the United States to remove malicious software. China-backed hackers used Microsoft’s Exchange Server flaw.

The US Government orders to update Windows due to a code failure
Through the failures in the system that they were able to identify, they accessed the server, from which they could steal information such as email accounts and contacts and at the same time install elements of malicious software or malware.

Although Microsoft has since released an updated version of the software that remedies vulnerabilities and prevents new attacks, hackers could continue to access those devices that had already been infected, which are precisely those that the FBI wanted to “clean” with. today’s operation.

The FBI assured that it will try to report what happened to all those whose electronic devices it has accessed.

Leave a Reply

Your email address will not be published. Required fields are marked *