A sophisticated cyber attack orchestrated by unidentified cyber criminals has resulted in the unlawful acquisition of $6 million from a Connecticut-based school. The New Haven Public Schools fell victim to this cyber assault, with an ongoing forensic investigation still in progress to uncover the individuals responsible for the incident.
Authorities have managed to successfully recover $3.6 million of the stolen funds from the criminals involved, a commendable feat carried out by the FBI.
Dr. Madeline Negron, the superintendent of New Haven Public Schools, expressed a pressing need for accountability, emphasizing that the funds stolen were intended for the students of the institution.
The method employed in the attack was cunningly devised. The hackers infiltrated the email account of the Chief Operating Officer, enabling them to covertly monitor the flow of business emails. Seizing the opportune moment, the cyber criminal executed a sophisticated middle attack, effectively hijacking the funds designated for urgent expenses.
FBI’s dedicated Cyber Task Force has managed to reclaim a portion of the embezzled amount and is actively pursuing the individuals responsible for this breach.
Suspicions are gravitating towards a state-sponsored hacking group linked to an Asian nation. However, the exact identity remains undisclosed until sufficient evidence can be amassed.
The prevalence of cyber attacks targeting educational institutions and healthcare systems has experienced an upward trajectory in recent times. Notably, approximately 38% of these attacks in the year 2022 were attributed to state-funded entities.
It is important to note:
1.) Spoofing entails assuming a falsified identity—whether of an individual, company, or organization—to carry out identity theft attacks. Hackers adopt fraudulent personas to pilfer personal data or credentials, often selling this data on the dark web for financial gain. Spoofing is also employed to propagate malware through malicious links and attachments, orchestrate denial-of-service attacks to restrict access, and bypass network controls.
2.) Mitigating the risks associated with spoofing involves activating email spam filters, refraining from opening links and attachments sent by unfamiliar sources, investing in reputable anti-malware solutions, and avoiding the submission of personal details through online forms. These measures collectively contribute to safeguarding against spoofing attacks.
Ad