IMF says February cyberattack involved compromise of 11 email accounts

Jason Macuray
A cyberattack in February led to the compromise of 11 email accounts at the International Monetary Fund (IMF), the organization said on Friday.

A cyberattack in February led to the compromise of 11 email accounts at the International Monetary Fund (IMF), the organization said on Friday. 

In a brief statement, the IMF said the cyber incident was detected on February 16. 

“A subsequent investigation, with the assistance of independent cybersecurity experts, determined the nature of the breach, and remediation actions were taken. The investigation determined that eleven (11) IMF email accounts were compromised,” the organization said. 

“The impacted email accounts were re-secured. We have no indication of further compromise beyond these email accounts at this point in time. The investigation into this incident is continuing.”

Reuters reported that none of the email accounts accessed were used by senior leaders of the organization. 

A spokesperson told Recorded Future News: “For security reasons, we cannot disclose further details. We cannot confirm attribution.”

The IMF — a lender made up of 190 member countries — is an international financial institution designed to stabilize economies by providing billions in funding to governments around the world each year.

The organization last dealt with a cybersecurity incident in 2011, when an alleged nation-state actor breached the organization’s systems and spent months rifling through files, according to The New York Times.  

The attack was so significant at the time that the IMF cut all digital connections to the World Bank in an effort to contain the damage. The incident was initially discovered when IT workers found strange file transfers occurring from one computer at the IMF. Emails and other documents were taken, sources told several news outlets at the time.

News BriefsNewsGovernmentCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Russia targets hundreds of Americans with new sanctions, including cyber journalists

Next Post

Moldovan national sentenced in E-Root cybercrime marketplace case

Related Posts

PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data

A new set of malicious packages has been unearthed in the Python Package Index (PyPI) repository that masqueraded as cryptocurrency wallet recovery and management services, only to siphon sensitive data and facilitate the theft of valuable digital assets. "The attack targeted users of Atomic, Trust Wallet, Metamask, Ronin, TronLink, Exodus, and other prominent wallets in the crypto ecosystem,"
Avatar
Read More

Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security

Apple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing the research community to inspect and verify the privacy and security guarantees of its offering. PCC, which Apple unveiled earlier this June, has been marketed as the "most advanced security architecture ever deployed for cloud AI compute at scale." With the new technology, the idea is
Avatar
Read More

Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor

A previously undocumented threat activity cluster dubbed Earth Minotaur is leveraging the MOONSHINE exploit kit and an unreported Android-cum-Windows backdoor called DarkNimbus to facilitate long-term surveillance operations targeting Tibetans and Uyghurs. "Earth Minotaur uses MOONSHINE to deliver the DarkNimbus backdoor to Android and Windows devices, targeting WeChat, and possibly making it a
Avatar
Read More