Cyber News

Hackers Breach Intelligence Website Used by CIA and Other Agencies

Unidentified hackers recently breached a major intelligence website operated by the National Reconnaissance Office, compromising sensitive contract information and proprietary intellectual property used by the CIA and other federal agencies.

The cyberattack targeted the Acquisition Research Center website, which serves as a critical platform for innovative CIA spying programs.

Simultaneously, Chinese state-sponsored hackers successfully penetrated the Department of Energy’s National Nuclear Security Administration through a Microsoft SharePoint vulnerability, highlighting escalating cybersecurity threats against U.S. intelligence infrastructure.

The National Reconnaissance Office, America’s spy satellite service, confirmed that hackers compromised its unclassified Acquisition Research Center website, which serves as the primary portal for intelligence agencies to submit contract details and acquisition information.

A spokesman acknowledged the incident is under federal law enforcement investigation but declined to provide additional details about the ongoing probe.

The breach exposed proprietary intellectual property and personal information submitted by companies seeking contracts with intelligence agencies.

While the full extent remains unknown, sources familiar with the incident indicate hackers likely obtained critical technology information related to CIA operations, Space Force surveillance satellite development, space weapons programs, and the Golden Dome missile defense initiative.

The Acquisition Research Center functions as an unclassified access point where private companies register to conduct business with the CIA, submit capabilities briefings, and propose innovative solutions for intelligence missions.

Critics argue that using an unclassified platform for sensitive contract negotiations created inherent security vulnerabilities that hostile actors successfully exploited.

Hackers Breach Intelligence Website

Among the most significant losses was data from Digital Hammer, a highly classified CIA program focused on cutting-edge human intelligence gathering, surveillance, and counterintelligence operations.

The program specifically targets Chinese intelligence threats and information operations, making the breach particularly concerning for national security officials.

Digital Hammer develops open-source intelligence platforms, analytics tools, miniaturized sensors, and concealed surveillance equipment.

The program also focuses on acoustic and communications systems, artificial intelligence-powered data collection, behavioral prediction tools, and countersurveillance technologies designed to reduce operational signatures.

Former Air Force intelligence officer L.J. Eads characterized the breach as a deliberate state-sponsored attack rather than opportunistic hacking.

The attack exploited a Microsoft SharePoint zero-day vulnerability, allowing hackers to penetrate the agency’s network systems.

“Given the sensitivity and exclusivity of the Digital Hammer program, this compromise almost certainly points to a state-sponsored actor, likely China,” Eads stated.

He emphasized that when proprietary innovations intended for CIA programs are stolen, it represents a serious national security breach beyond typical vendor security issues.

Nuclear Agency

In a related cybersecurity incident, Microsoft disclosed that Chinese hackers successfully breached the National Nuclear Security Administration, the federal agency responsible for maintaining and building U.S. nuclear weapons.

Microsoft identified multiple Chinese threat actors involved in the operation, including Linen Typhoon, Violet Typhoon, and Storm-2603, with the latter deploying ransomware following the initial breach.

The National Nuclear Security Administration has been unable to determine whether hackers accessed classified or sensitive nuclear weapons information during the intrusion.

These coordinated attacks underscore growing cybersecurity challenges facing U.S. intelligence and defense agencies as foreign adversaries increasingly target critical infrastructure and sensitive government operations.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago