{"id":13260,"date":"2017-09-21T13:21:23","date_gmt":"2017-09-21T13:21:23","guid":{"rendered":"https:\/\/digital-sentinel.com\/?p=13260"},"modified":"2020-02-01T11:39:52","modified_gmt":"2020-02-01T11:39:52","slug":"sec-victim-hacking-filing-system-breached","status":"publish","type":"post","link":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/","title":{"rendered":"SEC victim of hacking, filing system breached"},"content":{"rendered":"

Hackers may have profited from insider trading by using stolen confidential information<\/h2>\n
\n

The US Securities and Exchange Commission was subject to hacking last year, it has disclosed. It said that its database of corporate announcements was breached and cybercriminals may have used the information for profit.<\/p>\n

In a\u00a0statement<\/a>, SEC chairman Jay Clayton said that last month it had learned that an incident previously detected in 2016 \u201cmay have provided the basis for illicit gain through trading\u201d. It added that a software vulnerability in the test filing component of its EDGAR system, which was patched promptly after discovery, was exploited and resulted in access to non-public information.<\/p>\n

\u201cNotwithstanding our efforts to protect our systems and manage cybersecurity risk, in certain cases, cyber threat actors have managed to access or misuse our systems,\u201d said Clayton.<\/p>\n

\u201cWe believe the intrusion did not result in unauthorized access to personally identifiable information, jeopardize the operations of the Commission, or result in systemic risk. Our investigation of this matter is ongoing, however, and we are coordinating with appropriate authorities.\u201d<\/p>\n

\u201cEffective management of internal cybersecurity risk is critical to the SEC achieving its mission and to protecting the non-public information that is entrusted to this agency,\u201d SEC Commissioner Michael S. Piwowar said in a\u00a0statement<\/a>.<\/p>\n

\n
\n
Ilia Kolochenko, CEO of web security company High-Tech Bridge, told\u00a0IT Pro<\/em>\u00a0that the disclosed breach may have disastrous consequences outshining\u00a0Equifax<\/a>.<\/div>\n<\/div>\n<\/div>\n

\u201cCybercriminals could have manipulated the entire stock market and make billions of illicit profit. Ethical investors, including pension and sovereign funds, without the insider information could have lost fortunes as a result,\u201d he said.<\/p>\n

\u201cThis incident clearly exposes how vulnerable our global financial ecosystem is, and how unprepared we are to fight skyrocketing cybercrime. In the future, we will see a steady fusion of common crime with cyber gangs that jointly may challenge state power and dictate their laws, while law enforcement agencies are catastrophically underfinanced by governments and just don\u2019t have enough resources to tackle global cybercrime.\u201d<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

Hackers may have profited from insider trading by using stolen confidential information The […]<\/p>\n","protected":false},"author":3,"featured_media":13262,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[39],"tags":[],"yoast_head":"\nSEC victim of hacking, filing system breached - Digital Sentinel<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SEC victim of hacking, filing system breached - Digital Sentinel\" \/>\n<meta property=\"og:description\" content=\"Hackers may have profited from insider trading by using stolen confidential information The […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Sentinel\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-21T13:21:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-01T11:39:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/security_encryption_passwords.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"349\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital-Sentinel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/digital-sentinel.com\/#organization\",\"name\":\"Digital Sentinel\",\"url\":\"https:\/\/digital-sentinel.com\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digital-sentinel.com\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif\",\"contentUrl\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif\",\"width\":613,\"height\":224,\"caption\":\"Digital Sentinel\"},\"image\":{\"@id\":\"https:\/\/digital-sentinel.com\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/digital-sentinel.com\/#website\",\"url\":\"https:\/\/digital-sentinel.com\/\",\"name\":\"Digital Sentinel\",\"description\":\"Profit Protection Technology\",\"publisher\":{\"@id\":\"https:\/\/digital-sentinel.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/digital-sentinel.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/security_encryption_passwords.jpg\",\"contentUrl\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/security_encryption_passwords.jpg\",\"width\":620,\"height\":349},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#webpage\",\"url\":\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/\",\"name\":\"SEC victim of hacking, filing system breached - Digital Sentinel\",\"isPartOf\":{\"@id\":\"https:\/\/digital-sentinel.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#primaryimage\"},\"datePublished\":\"2017-09-21T13:21:23+00:00\",\"dateModified\":\"2020-02-01T11:39:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/digital-sentinel.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SEC victim of hacking, filing system breached\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#webpage\"},\"author\":{\"@id\":\"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2\"},\"headline\":\"SEC victim of hacking, filing system breached\",\"datePublished\":\"2017-09-21T13:21:23+00:00\",\"dateModified\":\"2020-02-01T11:39:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#webpage\"},\"wordCount\":336,\"publisher\":{\"@id\":\"https:\/\/digital-sentinel.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/security_encryption_passwords.jpg\",\"articleSection\":[\"breach\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2\",\"name\":\"Digital-Sentinel\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digital-sentinel.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g\",\"caption\":\"Digital-Sentinel\"},\"url\":\"https:\/\/digital-sentinel.com\/author\/digital-sentinel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SEC victim of hacking, filing system breached - Digital Sentinel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/","og_locale":"en_US","og_type":"article","og_title":"SEC victim of hacking, filing system breached - Digital Sentinel","og_description":"Hackers may have profited from insider trading by using stolen confidential information The […]","og_url":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/","og_site_name":"Digital Sentinel","article_published_time":"2017-09-21T13:21:23+00:00","article_modified_time":"2020-02-01T11:39:52+00:00","og_image":[{"width":620,"height":349,"url":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/security_encryption_passwords.jpg","type":"image\/jpeg"}],"twitter_card":"summary","twitter_misc":{"Written by":"Digital-Sentinel","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/digital-sentinel.com\/#organization","name":"Digital Sentinel","url":"https:\/\/digital-sentinel.com\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/digital-sentinel.com\/#logo","inLanguage":"en-US","url":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif","contentUrl":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif","width":613,"height":224,"caption":"Digital Sentinel"},"image":{"@id":"https:\/\/digital-sentinel.com\/#logo"}},{"@type":"WebSite","@id":"https:\/\/digital-sentinel.com\/#website","url":"https:\/\/digital-sentinel.com\/","name":"Digital Sentinel","description":"Profit Protection Technology","publisher":{"@id":"https:\/\/digital-sentinel.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digital-sentinel.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#primaryimage","inLanguage":"en-US","url":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/security_encryption_passwords.jpg","contentUrl":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/security_encryption_passwords.jpg","width":620,"height":349},{"@type":"WebPage","@id":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#webpage","url":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/","name":"SEC victim of hacking, filing system breached - Digital Sentinel","isPartOf":{"@id":"https:\/\/digital-sentinel.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#primaryimage"},"datePublished":"2017-09-21T13:21:23+00:00","dateModified":"2020-02-01T11:39:52+00:00","breadcrumb":{"@id":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digital-sentinel.com\/"},{"@type":"ListItem","position":2,"name":"SEC victim of hacking, filing system breached"}]},{"@type":"Article","@id":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#article","isPartOf":{"@id":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#webpage"},"author":{"@id":"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2"},"headline":"SEC victim of hacking, filing system breached","datePublished":"2017-09-21T13:21:23+00:00","dateModified":"2020-02-01T11:39:52+00:00","mainEntityOfPage":{"@id":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#webpage"},"wordCount":336,"publisher":{"@id":"https:\/\/digital-sentinel.com\/#organization"},"image":{"@id":"https:\/\/digital-sentinel.com\/breach\/sec-victim-hacking-filing-system-breached\/#primaryimage"},"thumbnailUrl":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/security_encryption_passwords.jpg","articleSection":["breach"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2","name":"Digital-Sentinel","image":{"@type":"ImageObject","@id":"https:\/\/digital-sentinel.com\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g","caption":"Digital-Sentinel"},"url":"https:\/\/digital-sentinel.com\/author\/digital-sentinel\/"}]}},"_links":{"self":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/posts\/13260"}],"collection":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/comments?post=13260"}],"version-history":[{"count":1,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/posts\/13260\/revisions"}],"predecessor-version":[{"id":13335,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/posts\/13260\/revisions\/13335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/media\/13262"}],"wp:attachment":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/media?parent=13260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/categories?post=13260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/tags?post=13260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}