Unidentified hackers recently breached a major intelligence website operated by the National Reconnaissance Office, compromising sensitive contract information and proprietary intellectual property used by the CIA and other federal agencies.
The cyberattack targeted the Acquisition Research Center website, which serves as a critical platform for innovative CIA spying programs.
Simultaneously, Chinese state-sponsored hackers successfully penetrated the Department of Energy’s National Nuclear Security Administration through a Microsoft SharePoint vulnerability, highlighting escalating cybersecurity threats against U.S. intelligence infrastructure.
The National Reconnaissance Office, America’s spy satellite service, confirmed that hackers compromised its unclassified Acquisition Research Center website, which serves as the primary portal for intelligence agencies to submit contract details and acquisition information.
A spokesman acknowledged the incident is under federal law enforcement investigation but declined to provide additional details about the ongoing probe.
The breach exposed proprietary intellectual property and personal information submitted by companies seeking contracts with intelligence agencies.
While the full extent remains unknown, sources familiar with the incident indicate hackers likely obtained critical technology information related to CIA operations, Space Force surveillance satellite development, space weapons programs, and the Golden Dome missile defense initiative.
The Acquisition Research Center functions as an unclassified access point where private companies register to conduct business with the CIA, submit capabilities briefings, and propose innovative solutions for intelligence missions.
Critics argue that using an unclassified platform for sensitive contract negotiations created inherent security vulnerabilities that hostile actors successfully exploited.
Among the most significant losses was data from Digital Hammer, a highly classified CIA program focused on cutting-edge human intelligence gathering, surveillance, and counterintelligence operations.
The program specifically targets Chinese intelligence threats and information operations, making the breach particularly concerning for national security officials.
Digital Hammer develops open-source intelligence platforms, analytics tools, miniaturized sensors, and concealed surveillance equipment.
The program also focuses on acoustic and communications systems, artificial intelligence-powered data collection, behavioral prediction tools, and countersurveillance technologies designed to reduce operational signatures.
Former Air Force intelligence officer L.J. Eads characterized the breach as a deliberate state-sponsored attack rather than opportunistic hacking.
The attack exploited a Microsoft SharePoint zero-day vulnerability, allowing hackers to penetrate the agency’s network systems.
“Given the sensitivity and exclusivity of the Digital Hammer program, this compromise almost certainly points to a state-sponsored actor, likely China,” Eads stated.
He emphasized that when proprietary innovations intended for CIA programs are stolen, it represents a serious national security breach beyond typical vendor security issues.
In a related cybersecurity incident, Microsoft disclosed that Chinese hackers successfully breached the National Nuclear Security Administration, the federal agency responsible for maintaining and building U.S. nuclear weapons.
Microsoft identified multiple Chinese threat actors involved in the operation, including Linen Typhoon, Violet Typhoon, and Storm-2603, with the latter deploying ransomware following the initial breach.
The National Nuclear Security Administration has been unable to determine whether hackers accessed classified or sensitive nuclear weapons information during the intrusion.
These coordinated attacks underscore growing cybersecurity challenges facing U.S. intelligence and defense agencies as foreign adversaries increasingly target critical infrastructure and sensitive government operations.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…