Although a source says the intrusion appeared to have been carried out by a cybercriminal rather than a foreign government, the incident underscores the files' Although a source says the intrusion appeared to have been carried out by a cybercriminal rather than a foreign government, the incident underscores the files'

Foreign hacker in 2023 compromised Epstein files held by FBI – source, documents

2026/03/12 16:46
5 min. skaitymo
Jei turite atsiliepimų ar abejonių dėl šio turinio, susisiekite su mumis crypto.news@mexc.com

WASHINGTON, USA – A foreign hacker compromised files relating to the FBI’s investigation of the late sex offender Jeffrey Epstein during a break-in at the bureau’s New York Field Office three years ago, according to a source familiar with the matter and recently published Justice Department documents reviewed by Reuters.

The details of who accessed a server at the FBI’s New York Field Office, including the allegation that a foreign hacker was involved, are being reported here for the first time.

In a statement, the FBI said what it described as a “cyber incident” was “an isolated one.”

“The FBI restricted access to the malicious actor and rectified the network. The investigation remains ongoing, so we do not have further comments to provide at this time.”

Although the source said the intrusion appeared to have been carried out by a cybercriminal rather than a foreign government, the incident underscores the files’ potential intelligence value, one academic said. The legally mandated publication of U.S. Justice Department documents has exposed the dead financier’s ties to prominent people in politics, finance, academia and business, triggering investigations in numerous countries around the world.

“Who wouldn’t be going after the Epstein files if you’re the Russians or somebody interested in kompromat?” said Jon Lindsay, who researches the role of emerging technology in global security at the Georgia Institute of Technology. “If foreign intelligence agencies are not thinking seriously about the Epstein files as a target, then I would be shocked.”

The breach was reported contemporaneously by CNN and Reuters on February 17; the connection to Epstein materials was made by the French magazine Marianne.

Epstein, a longtime associate of President Donald Trump, pleaded guilty in 2008 to prostitution charges, including soliciting an underage girl. He was found hanged in his jail cell in 2019, in what was ruled a suicide, after being arrested again on federal charges of sex trafficking of minors.

February 2023 break-in

The hack occurred after a server at the Child Exploitation Forensic Lab in the FBI’s New York Field Office was inadvertently left vulnerable by Special Agent Aaron Spivack, who was trying to navigate the bureau’s complex procedures for handling digital evidence, according to the source and the documents.

A timeline written by Spivack and included in the large cache of Epstein documents released earlier this year said the break-in happened on February 12, 2023. It was discovered the following day when Spivack turned on his computer and discovered a text file warning him that his network had been compromised, according to that document.

Further investigation turned up traces of unusual activity on the server, the document said, adding that the activity “included combing through certain files pertaining to the Epstein investigation.”

The timeline does not say which specific files were accessed, whether the hacker downloaded the data, or who the hacker was. Reuters could not establish what, if any, overlap the affected data had with the Epstein documents published earlier this year or the files that remain under wraps.

Spivack, whose name appears elsewhere in the documents in connection with the Epstein investigation, did not return repeated messages seeking comment. Reuters was unable to reach the man identified in the documents as Spivack’s lawyer, Richard J. Roberson, Jr. Seven FBI agents identified in the documents as being involved in the investigation into the incident did not return messages.

Hacker, FBI chatted by video

In his statement to FBI investigators examining whether he was responsible for the breach, Spivack said he was being made “a scapegoat for the intrusion” and that conflicting bureau policies and faulty guidance around information technology were to blame. Reuters could not establish the result of the bureau’s internal investigation.

The person familiar with the breach said the intrusion was carried out by a foreign hacker who did not appear to realize they had penetrated a law enforcement server. The hacker expressed disgust at the presence of child abuse images on the device and left a message threatening to turn its owner over to the FBI, the person said.

The source said bureau officials defused the situation by convincing the hacker that they actually were the FBI, in part by having the hacker join a video chat where they flashed their law enforcement credentials in front of a web camera.

Reuters could not determine — and the source said they did not know — who the hacker was, what country they were operating from, what they did with the material accessed, or whether any effort was made to identify or punish them for breaking into the FBI’s server.

Many of the Justice Department’s documents have been heavily redacted and others have been kept secret altogether despite a law mandating their full release last year. The Trump administration says it is withholding material that could compromise victims’ identities or jeopardize ongoing investigations. – Rappler.com

Atsakomybės apribojimas: Šiame puslapyje publikuojami straipsniai yra paimti iš viešų šaltinių ir pateikiami tik informaciniais tikslais. Jie nebūtinai atspindi MEXC požiūrį. Visos teisės priklauso originaliems autoriams. Jei manote, kad koks nors turinys pažeidžia trečiųjų šalių teises, susisiekite su mumis el. paštu crypto.news@mexc.com, kad jis būtų pašalintas. MEXC negarantuoja pateikiamos informacijos tikslumo, išsamumo ar aktualumo ir neatsako už jokių veiksmų pasekmes, atliktas remiantis šia informacija. Turinys nėra laikomas finansine, teisine ar kita profesionalia konsultacija ir neturėtų būti vertinamas kaip MEXC rekomendacija ar patvirtinimas.

Jums taip pat gali patikti

Tether Backs Ark Labs’ $5.2 Million Bet on Bitcoin’s Stablecoin Revival

Tether Backs Ark Labs’ $5.2 Million Bet on Bitcoin’s Stablecoin Revival

The post Tether Backs Ark Labs’ $5.2 Million Bet on Bitcoin’s Stablecoin Revival appeared on BitcoinEthereumNews.com. In brief Ark Labs secured backing from Tether
Dalintis
BitcoinEthereumNews2026/03/12 21:44
Why LYNO’s Presale Could Trigger the Next Wave of Crypto FOMO After SOL and PEPE

Why LYNO’s Presale Could Trigger the Next Wave of Crypto FOMO After SOL and PEPE

The post Why LYNO’s Presale Could Trigger the Next Wave of Crypto FOMO After SOL and PEPE appeared on BitcoinEthereumNews.com. Cryptocirca has never been bereft of hype cycles and fear of missing out (FOMO). The case of Solana (SOL) and Pepe (PEPE) is one of the brightest examples that early investments into the correct projects may yield the returns that are drifting. Today there is an emerging rival in the limelight—LYNO. LYNO is in its presale stage, and already it is being compared to former breakout tokens, as many investors are speculating that LYNO will be the next big thing to ignite the market in a similar manner. Early Bird Presale: Lowest Price LYNO is in the Early Bird presale and costs only $0.050 for each token; the initial round will rise to $0.055. To date, approximately 629,165.744 tokens have been sold, with approximately $31,458.287 of that amount going towards the $100,000 project goal.  The crypto presales allow investors the privilege to acquire tokens at reduced prices before they become available to the general market, and they tend to bring substantial returns in the case of great fundamentals. The final goal of the project: 0.100 per token. This gradual development underscores increasing investor confidence and it brings a sense of urgency to those who wish to be first movers. LYNO’s Edge in a Competitive Market LYNO isn’t just another presale token—it’s a powerful AI-driven cross-chain arbitrage platform designed to deliver real utility and long-term growth. Operating across 15+ blockchains, LYNO’s AI engine analyzes token prices, liquidity, volume, and gas fees in real-time to identify the most profitable trade routes. It integrates with bridges like LayerZero, Wormhole, and Axelar, allowing assets to move instantly across networks, so no opportunity is missed.  The platform also includes community governance, letting $LYNO holders vote on protocol upgrades and fee structures, staking rewards for long-term investors, buyback-and-burn mechanisms to support token value, and audited smart…
Dalintis
BitcoinEthereumNews2025/09/18 16:11
Israel Seizes $1.5B Crypto Linked to Iran Guards

Israel Seizes $1.5B Crypto Linked to Iran Guards

Israel has confiscated 187 crypto wallets linked to Iran’s Revolutionary Guards and frozen $1.5 million USDT in them following terror-financing claims. The Ministry of Defense of Israel has ordered the seizing of 187 cryptocurrency wallets possessed by the Iranian Islamic Revolutionary Guard Corps (IRGC).  The U.S., Canada, the U.K., and the European Union refer to […] The post Israel Seizes $1.5B Crypto Linked to Iran Guards appeared first on Live Bitcoin News.
Dalintis
LiveBitcoinNews2025/09/18 08:00