FBI Cyber Division

FBI Cyber Division

Law Enforcement

Washington, District of Columbia (DC) 174,877 followers

Imposing costs on cyber adversaries through unique authorities, world-class capabilities, and enduring partnerships

About us

Imposing costs on cyber adversaries through unique authorities, world-class capabilities, and enduring partnerships.

Website
https://www.fbi.gov/cyber
Industry
Law Enforcement
Company size
10,001+ employees
Headquarters
Washington, District of Columbia (DC)
Type
Government Agency

Locations

  • Primary

    935 Pennsylvania Ave NW

    Washington, District of Columbia (DC) 20535, US

    Get directions

Employees at FBI Cyber Division

Updates

  • View organization page for FBI Cyber Division, graphic

    174,877 followers

    The government of North Korea (DPRK) generates revenue by hacking cryptocurrency exchanges and similar businesses. Learn how the FBI assisted with the investigation of a massive DPRK theft, part of which was recovered by South Korea’s National Police Agency: https://lnkd.in/eACXdJGm And read our #FBI #PSA on how folks in the crypto industry can protect themselves against North Korean social engineering schemes: https://lnkd.in/edPBbDT6

    • A person with a watch on their wrist holdings cryptocurrency in front of a laptop with data lines of varying colors.
  • View organization page for FBI Cyber Division, graphic

    174,877 followers

    On the new episode of Ahead of the Threat, #FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Chris Cwalina, global head of #cybersecurity and privacy at Norton Rose Fulbright. Chris and his team of lawyers advise clients on how to minimize damage from sophisticated data breaches and cybersecurity incidents. Chris reveals why many companies have a false sense of readiness and security before a breach. He also talks about fostering a security culture and the importance of having clear lines of decision-making when it comes to risk management. Hear about today's trending topics like the Fortinet VPN zero-day, the extradition of the Phobos ransomware administrator, and the sentencing of U.S.-based co-conspirators behind the Bitfenix cryptocurrency exchange theft. Listen to the full conversation at https://lnkd.in/dUEmC7YH

    • Ahead of the Threat / Episode Three: Chris Cwalina
  • View organization page for FBI Cyber Division, graphic

    174,877 followers

    Together with our partners, the #FBI has released an updated joint Cybersecurity Advisory disseminating the TTPs and indicators of compromise related to BianLian, a ransomware and data extortion group. BianLian has targeted organizations in critical infrastructure sectors in the United States and abroad, gaining access to victim systems, exfiltrating data, and extorting them for payment. The actors behind the BianLian group originally employed a double-extortion model in which they encrypted victims’ systems after exfiltrating the data. Around January 2024, however, they shifted exclusively to exfiltration-based extortion. Click here for technical details and recommended mitigations from the FBI, the Cybersecurity and Infrastructure Security Agency (CISA), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC): https://lnkd.in/d2NYMHkA

    • Product ID: AA23-136A
Date: May 16, 2023
Agencies: FBI and CISA 
Title: #StopRansomware: BianLian Data Extortion Group
  • View organization page for FBI Cyber Division, graphic

    174,877 followers

    Phobos ransomware targeted healthcare facilities and other critical sectors. Through its affiliates, Phobos extorted ransom payments worth millions of dollars and victimized more than 1,000 public and private entities in the United States and around the world. However, the #FBI investigated and worked to secure the extradition of Phobos’ administrator Evgenii Ptitsyn from South Korea to face charges related to the sale, distribution, and operations of Phobos ransomware. Find out more at https://lnkd.in/eFKaZ9Cw

    • FBI Seal over a dark blue background.
  • View organization page for FBI Cyber Division, graphic

    174,877 followers

    Do you ever wish you made an investment just before it took off? Would you have risked your savings if meant the possibility to gain incredible wealth? These are the kinds of risks cyber scammers are using to entice you to hand over your hard-earned money. Through flattery, “proof” of success, or impersonating a company, these scammers will try many avenues to succeed. The #FBI’s Internet Crime Complaint Center has a guide to show you warning signs and how to prevent yourself and loved ones from falling victim: https://lnkd.in/eafzYPta

    • A person in a suit putting their hand out in front of a spread of money.
  • View organization page for FBI Cyber Division, graphic

    174,877 followers

    Check out our new joint #Cybersecurity Advisory, which reveals the top routinely exploited vulnerabilities of 2023. Last year, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority targets. Click to see technical details and recommended mitigations from the #FBI, the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and our international partners: https://lnkd.in/eAYDj7Qu

    • Product ID: AA24-2431
Date: November 12, 2024
Agencies: CIA, FBI, and NSA
Title: 2023 Top Routinely Exploited Vulnerabilities
  • View organization page for FBI Cyber Division, graphic

    174,877 followers

    In this week's episode of Ahead of the Threat, #FBI's Bryan Vorndran and Equifax's Jamil Farshchi are joined by Kevin Mandia, founder and CEO of Mandiant, a global leader in #cyber threat intelligence and incident response. Together, they dive into critical discussions on cyber readiness, the evolution of cybersecurity, game-changing breaches, and the growing impact of #AI on the threat landscape. Don’t miss this insightful conversation from some of the industry's top experts. Tune in now: https://lnkd.in/e_AG5Z33

    • A microphone overlayed to the left of a moon. "Ahead of the Threat | Episode Two: Kevin Mandia
  • View organization page for FBI Cyber Division, graphic

    174,877 followers

    #DYK the FBI’s Recovery Asset Team (RAT) streamlines communications with financial institutions and helps freeze funds for victims? Last year, RAT initiated the Financial Fraud Kill Chain on 3,008 incidents, with potential losses of $758.05 million. A monetary hold was placed on $538.39 million, representing a success rate of 71%. Learn more in our Internet Crime Complaint Center (IC3) annual report and remember to report online fraud to IC3: https://lnkd.in/efbbCGK4

    • Image of hands on a keyboard with the words, "Report internet crime to the FBI - IC3.gov"
  • View organization page for FBI Cyber Division, graphic

    174,877 followers

    In recent years, hacktivists and cyber criminals have tried to use distributed-denial-of-service (DDoS) attacks to advance an ideological cause or undermine confidence in US elections. This is a reminder that these low-level attacks would not prevent voters from voting or compromise the integrity of voting systems. Their impact would be limited to the potential disruption of some election-related functions available online, like voter look-up tools or unofficial election-night reporting. Read the #PSA from the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) to learn more: https://lnkd.in/eHCB_tdH

    • Public Service Announcement. Just so you know, DDoS attacks could hinder access to election information but would not prevent voting. The FBI and CISA seals are in the bottom right corner.

Similar pages

Browse jobs