www.fbi.gov Open in urlscan Pro
104.16.148.244  Public Scan

Submitted URL: http://assslap.me/
Effective URL: https://www.fbi.gov/investigate/cyber
Submission: On May 22 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

https://www.fbi.gov/@@search

<form class="navbar-form navbar-left" role="search" action="https://www.fbi.gov/@@search">
  <label for="fbi-search" class="visually-hidden">Search FBI</label>
  <input type="search" id="fbi-search" name="SearchableText" placeholder="Search FBI">
  <button type="submit">
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" width="18" height="18" aria-labelledby="title" role="img">
      <title>Submit Search</title>
      <style type="text/css">
        .search-icon {
          fill: #333333;
        }
      </style>
      <path class="search-icon"
        d="M 15.632,13.874259 12.336,10.581757 C 13.12,9.4309801 13.52,8.1523387 13.52,6.7458332 13.552,5.8507843 13.376,4.9877014 13.008,4.1246185 12.64,3.2615355 12.16,2.5422998 11.568,1.9509282 10.96,1.3755395 10.24,0.89604904 9.392,0.51245664 8.528,0.16083027 7.664,-0.01498292 6.784,0.0010001 5.888,0.03296613 5.024,0.22476233 4.16,0.54442267 3.296,0.86408301 2.56,1.3435735 1.984,1.9828942 1.408,2.6222149 0.928,3.3414506 0.56,4.1565845 0.192,4.9557353 0,5.8348013 0,6.7618162 c 0,0.927015 0.192,1.8060809 0.528,2.6371978 0.336,0.831117 0.816,1.550353 1.424,2.157707 0.608,0.607355 1.344,1.086845 2.176,1.438472 0.848,0.351626 1.728,0.527439 2.64,0.527439 1.408,0 2.672,-0.383592 3.824,-1.182743 l 3.312,3.292502 C 14.144,15.872136 14.416,16 14.768,16 15.104,16 15.392,15.872136 15.632,15.632391 15.872,15.392645 16,15.104951 16,14.769308 15.984,14.401698 15.872,14.114004 15.632,13.874259 Z M 9.808,9.7985894 C 8.992,10.59774 7.984,11.013299 6.784,11.061248 5.552,11.093214 4.544,10.677655 3.728,9.7985894 2.912,8.9195235 2.496,7.9125935 2.448,6.7458332 2.432,5.595056 2.848,4.5881259 3.712,3.725043 4.576,2.8619601 5.6,2.4304187 6.768,2.4464017 c 1.168,0.015983 2.176,0.4475245 3.024,1.2786413 0.848,0.8311169 1.28,1.838047 1.28,3.0207902 -0.048,1.2466753 -0.448,2.2536054 -1.264,3.0527562 z"
        alt="Submit Search"></path>
    </svg>
  </button>
</form>

https://www.fbi.gov/@@search

<form class="navbar-form navbar-left" role="search" action="https://www.fbi.gov/@@search">
  <label for="mobile-fbi-search" class="visually-hidden">Search FBI</label>
  <input type="search" id="mobile-fbi-search" name="SearchableText" placeholder="Search FBI">
  <button type="submit">
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" width="18" height="18" aria-labelledby="title" role="img">
      <title id="title">Submit Search</title>
      <style type="text/css">
        .mobilesearch-icon {
          fill: #a9a9a9;
        }
      </style>
      <path class="mobilesearch-icon"
        d="M 15.632,13.874259 12.336,10.581757 C 13.12,9.4309801 13.52,8.1523387 13.52,6.7458332 13.552,5.8507843 13.376,4.9877014 13.008,4.1246185 12.64,3.2615355 12.16,2.5422998 11.568,1.9509282 10.96,1.3755395 10.24,0.89604904 9.392,0.51245664 8.528,0.16083027 7.664,-0.01498292 6.784,0.0010001 5.888,0.03296613 5.024,0.22476233 4.16,0.54442267 3.296,0.86408301 2.56,1.3435735 1.984,1.9828942 1.408,2.6222149 0.928,3.3414506 0.56,4.1565845 0.192,4.9557353 0,5.8348013 0,6.7618162 c 0,0.927015 0.192,1.8060809 0.528,2.6371978 0.336,0.831117 0.816,1.550353 1.424,2.157707 0.608,0.607355 1.344,1.086845 2.176,1.438472 0.848,0.351626 1.728,0.527439 2.64,0.527439 1.408,0 2.672,-0.383592 3.824,-1.182743 l 3.312,3.292502 C 14.144,15.872136 14.416,16 14.768,16 15.104,16 15.392,15.872136 15.632,15.632391 15.872,15.392645 16,15.104951 16,14.769308 15.984,14.401698 15.872,14.114004 15.632,13.874259 Z M 9.808,9.7985894 C 8.992,10.59774 7.984,11.013299 6.784,11.061248 5.552,11.093214 4.544,10.677655 3.728,9.7985894 2.912,8.9195235 2.496,7.9125935 2.448,6.7458332 2.432,5.595056 2.848,4.5881259 3.712,3.725043 4.576,2.8619601 5.6,2.4304187 6.768,2.4464017 c 1.168,0.015983 2.176,0.4475245 3.024,1.2786413 0.848,0.8311169 1.28,1.838047 1.28,3.0207902 -0.048,1.2466753 -0.448,2.2536054 -1.264,3.0527562 z"
        alt="Submit Search"></path>
    </svg>
  </button>
</form>

Text Content

An official website of the United States government. Here's how you know

OFFICIAL WEBSITES USE .GOV

A .gov website belongs to an official government organization in the United
States.

SECURE .GOV WEBSITES USE HTTPS

A lock () or https:// means you've safely connected to the .gov website. Share
sensitive information only on official, secure websites.

Submit Search Search
FBI
More

 * Most Wanted
 * News
 * What We Investigate
 * How We Can Help You
 * Submit a Tip
 * About
 * Contact Us

 1. Home
 2. What We Investigate

 * Facebook Icon
 * Email Icon
 * Twitter Icon1
 * Youtube Icon
 * Flickr Icon
 * LinkedIn Icon
 * Instagram Icon
 * Search FBI Submit Search

FBIFederal Bureau of Investigation


CYBER CRIME

What We Investigate

 * Terrorism
 * Counterintelligence
 * Cyber Crime
 * Public Corruption
 * Civil Rights
 * Organized Crime
 * White-Collar Crime
 * Violent Crime
 * Weapons of Mass Destruction
 * How We Investigate
 * More

 * News
 * Most Wanted
 * FBI Guidance to Victims of Cyber Incidents on SEC Reporting Requirements
 * Business and Industry Partners
 * 


THE CYBER THREAT 


Malicious cyber activity threatens the public’s safety and our national and
economic security. The FBI’s cyber strategy is to impose risk and consequences
on cyber adversaries. Our goal is to change the behavior of criminals and
nation-states who believe they can compromise U.S. networks, steal financial and
intellectual property, and put critical infrastructure at risk without facing
risk themselves. To do this, we use our unique mix of authorities, capabilities,
and partnerships to impose consequences against our cyber adversaries.

The FBI is the lead federal agency for investigating cyber attacks and
intrusions. We collect and share intelligence and engage with victims while
working to unmask those committing malicious cyber activities, wherever they
are.

Learn more about what you can do to protect yourself from cyber criminals, how
you can report cyber crime, and the Bureau's efforts in combating the evolving
cyber threat.


PRIVATE SECTOR PARTNERS 

Learn how businesses and organizations can work with the FBI to get ahead of the
threat and make an impact on our cyber adversaries.


A COMPLEX, GLOBAL CONCERN 

Our adversaries look to exploit gaps in our intelligence and information
security networks. The FBI is committed to working with our federal
counterparts, our foreign partners, and the private sector to close those gaps.

These partnerships allow us to defend networks, attribute malicious activity,
sanction bad behavior, and take the fight to our adversaries overseas. The FBI
fosters this team approach through unique hubs where government, industry, and
academia form long-term trusted relationships to combine efforts against cyber
threats.

Within government, that hub is the National Cyber Investigative Joint Task Force
(NCIJTF). The FBI leads this task force of more than 30 co-located agencies from
the Intelligence Community and law enforcement. The NCIJTF is organized around
mission centers based on key cyber threat areas and led by senior executives
from partner agencies. Through these mission centers, operations and
intelligence are integrated for maximum impact against U.S. adversaries.

Only together can we achieve safety, security, and confidence in a digitally
connected world.


HOW WE WORK 

Whether through developing innovative investigative techniques, using
cutting-edge analytic tools, or forging new partnerships in our communities, the
FBI continues to adapt to meet the challenges posed by the evolving cyber
threat.

 * The FBI has specially trained cyber squads in each of our 56 field offices,
   working hand-in-hand with interagency task force partners.
 * The rapid-response Cyber Action Team can deploy across the country within
   hours to respond to major incidents.
 * With cyber assistant legal attachés in embassies across the globe, the FBI
   works closely with our international counterparts to seek justice for victims
   of malicious cyber activity.
 * The Internet Crime Complaint Center (IC3) collects reports of Internet crime
   from the public. Using such complaints, the IC3’s Recovery Asset Team has
   assisted in freezing hundreds of thousands of dollars for victims of cyber
   crime.
 * CyWatch is the FBI’s 24/7 operations center and watch floor, providing
   around-the-clock support to track incidents and communicate with field
   offices across the country.


ASSET FORFEITURE

Asset forfeiture is a powerful tool used by law enforcement agencies, including
the FBI, against criminals and criminal organizations to deprive them of their
property used illegally and their ill-gotten gains through seizure of these
assets. It is also used to compensate victims of crime. Learn more about the
FBI’s asset forfeiture program and to see forfeiture in action.





WHAT YOU SHOULD KNOW 


PROTECT YOURSELF

 * Taking the right security measures and being alert and aware when connected
   are key ways to prevent cyber intrusions and online crimes. Learn how to
   protect your computer, network, and personal information.


UNDERSTAND COMMON CRIMES AND RISKS ONLINE

 * Business email compromise (BEC) scams exploit the fact that so many of us
   rely on email to conduct business—both personal and professional—and it’s one
   of the most financially damaging online crimes.
   
 * Identity theft happens when someone steals your personal information, like
   your Social Security number, and uses it to commit theft or fraud.
 * Ransomware is a type of malicious software, or malware, that prevents you
   from accessing your computer files, systems, or networks and demands you pay
   a ransom for their return.
 * Spoofing and phishing are schemes aimed at tricking you into providing
   sensitive information to scammers.
 * Online predators are a growing threat to young people.
 * More common crimes and scams
   


RESPOND AND REPORT 





FILE A REPORT WITH THE INTERNET CRIME COMPLAINT CENTER


If you are the victim of online or internet-enabled crime, file a report with
the Internet Crime Complaint Center (IC3) as soon as possible. Crime reports are
used for investigative and intelligence purposes. Rapid reporting can also help
support the recovery of lost funds. Visit ic3.gov for more information,
including tips and information about current crime trends.


CONTACT YOUR LOCAL FBI FIELD OFFICE

If you or your organization is the victim of a network intrusion, data breach,
or ransomware attack, contact your nearest FBI field office or report it at
tips.fbi.gov.







CYBER SAFETY TIPS

Internet-enabled crimes and cyber intrusions are becoming increasingly
sophisticated and preventing them requires each user of a connected device to be
aware and on guard. 

 * Keep systems and software up to date and install a strong, reputable
   anti-virus program.
 * Be careful when connecting to a public Wi-Fi network and do not conduct any
   sensitive transactions, including purchases, when on a public network.
 * Create a strong and unique passphrase for each online account.
 * Set up multi-factor authentication on all accounts that allow it.
 * Examine the email address in all correspondence and scrutinize website URLs
   before responding to a message or visiting a site
 * Don’t click on anything in unsolicited emails or text messages.
 * Be cautious about the information you share in online profiles and social
   media accounts. Sharing things like pet names, schools, and family members
   can give scammers the hints they need to guess your passwords or the answers
   to your account security questions.
 * Don't send payments to unknown people or organizations that are seeking
   monetary support and urge immediate action.





ADDITIONAL RESOURCES AND RELATED PRIORITIES 



THE IRAN THREAT

Threats from the Iranian regime and its terrorist partners are far reaching. The
FBI is committed to identifying and disrupting all Iranian intelligence and
military operations that threaten American citizens or our nation's security and
critical infrastructure.


LAWFUL ACCESS


Law enforcement agencies all over the country are bumping up against
“warrant-proof” encryption. This means that even with a warrant, law enforcement
cannot obtain the electronic evidence needed to investigate and prosecute crimes
or security threats. 









CYBER NEWS  


 * 05.17.2024
   
   Convicted Ponzi Schemer Sentenced to More Than 14 Years in Prison for $11
   Million Fraud and Absconding Before Sentencing

 * 05.16.2024
   
   Charges and Seizures Brought in Fraud Scheme Aimed at Denying Revenue for
   Workers Associated with North Korea

 * 05.16.2024
   
   Justice Department Announces Arrest, Premises Search, and Seizures of
   Multiple Website Domains to Disrupt Illicit Revenue Generation Efforts of
   Democratic People’s Republic of Korea

 * 05.13.2024
   
   Tracy Resident Sentenced to Serve Home Confinement and Probation for Computer
   Attack on Discovery Bay Water Treatment Facility

 * 05.09.2024
   
   Three Individuals Facing Federal Charges for Swatting Activities

 * 05.08.2024
   
   FBI Warns of Increasing Threat of Cyber Criminals Utilizing Artificial
   Intelligence

 * 05.07.2024
   
   Cryptocurrency Futures Market CEO Pleads Guilty to Violating Bank Secrecy Act

 * 05.07.2024
   
   U.S. Charges Russian National with Developing and Operating Lockbit
   Ransomware

 * 05.02.2024
   
   FBI Releases 2023 Elder Fraud Report with Tech Support Scams Generating the
   Most Complaints and Investment Scams Proving the Costliest

 * 05.02.2024
   
   Five Plead Guilty in Multimillion-Dollar Conspiracy to Launder Computer Fraud
   Proceeds Offshore to Chinese Companies

More News


FEATURED STORY



FBI STRATEGY ADDRESSES EVOLVING CYBER THREAT

 * Most Wanted
 * Ten Most Wanted
 * Fugitives
 * Terrorism
 * Kidnappings / Missing Persons
 * Seeking Information
 * Bank Robbers
 * ECAP
 * ViCAP
    * FBI Jobs
    * Submit a Tip
    * Crime Statistics
    * History
    * FOIPA
    * Scams & Safety
    * FBI Kids

 * News
 * Stories
 * Videos
 * Press Releases
 * Speeches
 * Testimony
 * Podcasts and Radio
 * Photos
 * Español
 * Apps
 * How We Can Help You
 * Law Enforcement
 * Victims
 * Parents and Caregivers
 * Students
 * Businesses
 * Safety Resources
 * Need an FBI Service or More Information?

 * What We Investigate
 * Terrorism
 * Counterintelligence
 * Cyber Crime
 * Public Corruption
 * Civil Rights
 * Organized Crime
 * White-Collar Crime
 * Violent Crime
 * WMD
 * About
 * Mission & Priorities
 * Leadership & Structure
 * Partnerships
 * Community Outreach
 * FAQs

 * Contact Us
 * Field Offices
 * FBI Headquarters
 * Visit the FBI Experience
 * Overseas Offices
 * Additional Resources
 * Accessibility
 * eRulemaking
 * Freedom of Information / Privacy Act
 * Legal Notices
 * Legal Policies & Disclaimers
 * Privacy Policy
 * USA.gov
 * White House
 * No FEAR Act
 * Equal Opportunity


FBI


FEDERAL BUREAU OF INVESTIGATION

 * 
 * 
 * 
 * 
 * 
 * 


FBI.GOV CONTACT CENTER

EMAIL UPDATES

 * * Accessibility
   * eRulemaking
   * Freedom of Information / Privacy Act
   * Legal Notices
   * Legal Policies & Disclaimers
 * * Privacy Policy
   * USA.gov
   * White House
   * No FEAR Act
   * Equal Opportunity

FBI.gov is an official site of the U.S. Department of Justice ©
Search FBI Submit Search
 * Home
 * Most Wanted
 * News
 * What We Investigate
   * Terrorism
   * Counterintelligence
   * Cyber Crime
     * News
     * Most Wanted
     * FBI Guidance to Victims of Cyber Incidents on SEC Reporting Requirements
     * Business and Industry Partners
   * Public Corruption
   * Civil Rights
   * Organized Crime
   * White-Collar Crime
   * Violent Crime
   * Weapons of Mass Destruction
   * How We Investigate
 * How We Investigate
 * How We Can Help You
 * Submit a Tip
 * About
 * Contact Us
 * Crime Statistics
 * Photos
 * Video
 * Outreach
 * History
 * FOIA
 * Scams & Safety
 * FBI Kids
 * FBI Jobs




CONTENTS

 * Overview
 * Private Sector Partners
 * Combating the Threat
 * How We Work
 * What You Should Know
 * Respond and Report
 * Resources
 * Cyber News