{"id":31136,"date":"2024-08-26T13:20:12","date_gmt":"2024-08-26T20:20:12","guid":{"rendered":"https:\/\/blinkbargain.com\/blog\/hackers-claim-to-have-stolen-top-secret-documents-from-the-u-s-marshals-service\/"},"modified":"2024-08-26T13:20:12","modified_gmt":"2024-08-26T20:20:12","slug":"hackers-claim-to-have-stolen-top-secret-documents-from-the-u-s-marshals-service","status":"publish","type":"blog","link":"https:\/\/blinkbargain.com\/blog\/hackers-claim-to-have-stolen-top-secret-documents-from-the-u-s-marshals-service\/","title":{"rendered":"Hackers Claim to Have Stolen Top Secret Documents From the U.S. Marshals Service"},"content":{"rendered":"
<\/p>\n
A hacking group claims to have stolen more than 380 gigabytes of data from the U.S. Marshals Service, including confidential and top-secret documents and records about gangs, active cases, and electronic surveillance.<\/span><\/p>\n The ransomware group Hunters International took credit for the breach and posted pictures of the allegedly stolen records on its data leak site, according to the cybersecurity firm Hackmanac, which provided screenshots of the post to Gizmodo. In total, the group claims to have exfiltrated more than 327,000 files from the federal law enforcement agency responsible for tracking down fugitives and running the witness protection program. The hackers set an August 30 deadline for a ransom to be paid.<\/span><\/p>\n A spokesperson for the U.S. Marshals Service told Gizmodo he could not yet confirm the breach\u2019s authenticity but that the agency was looking into the claims. In addition to screenshots of what it says are gang files and active case files, which appear to contain headshots and other information about suspects, the hacking group also posted documents it claimed were from \u201cOperation Turnbuckle.\u201d In 2022, upstate New York media outlets reported<\/a> on a marshals operation by the same name that led to the arrest of more than a dozen drug trafficking suspects.<\/span><\/p>\n If confirmed, this would be the second major breach of the Marshals\u2019 computer systems in as many years. The agency suffered a debilitating ransomware attack<\/a> in February of 2023 that crippled some of its systems for months. It\u2019s not immediately clear whether the data Hunters International claims to have stolen is connected to that breach, said Sofia Scozzari, the CEO of Hackmanac. Cybersecurity researchers first identified Hunters International as a threat group in October 2023, about eight months after the U.S. Marshals Service ransomware attack<\/span><\/p>\n After Hunters International emerged on the scene, cybersecurity researchers speculated that it was a rebranding of the Hive ransomware group, which the FBI infiltrated and disrupted<\/a> in a six-month investigation culminating in January 2023. Hunters International, however, claimed that it had simply purchased Hive\u2019s malware and improved upon it. Hackmanac has tracked 181 attacks connected to the group targeting a wide range of victims across private industry and government.<\/p>\n The group offers ransomware-as-a-service, meaning it sells and rents out its malware that infects a target\u2019s system and encrypts the files. The attacker then charges a fee to return access to the files. About 75 percent of the Hunters International attacks Hackmanac has documented involve ransomware, Scozzari said, but i<\/span>n its posts about the U.S. Marshals Service\u2019s data the group did not claim to have encrypted the files in addition to stealing them, as it has done previously.<\/span><\/p>\n \u201cIt is clear that for Hunters, data is money and the group\u2019s main focus is maximizing profits\u201d rather than any political motivation, Scozzari said. \u201cIn this regard, the more sensitive the stolen data, the greater the chances of receiving a large payment.\u201d<\/p>\n<\/p><\/div>\n Trending Products<\/strong>
\n