www.fbi.gov Open in urlscan Pro
2606:4700::6810:94f4  Public Scan

Submitted URL: http://ipaintfish.com/
Effective URL: https://www.fbi.gov/investigate/cyber
Submission Tags: falconsandbox
Submission: On September 29 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

https://www.fbi.gov/@@search

<form class="navbar-form navbar-left" role="search" action="https://www.fbi.gov/@@search">
  <label for="fbi-search" class="visually-hidden">Search FBI</label>
  <input type="search" id="fbi-search" name="SearchableText" placeholder="Search FBI">
  <button type="submit">
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" width="18" height="18" aria-labelledby="title" role="img">
      <title>Submit Search</title>
      <style type="text/css">
        .search-icon {
          fill: #333333;
        }
      </style>
      <path class="search-icon"
        d="M 15.632,13.874259 12.336,10.581757 C 13.12,9.4309801 13.52,8.1523387 13.52,6.7458332 13.552,5.8507843 13.376,4.9877014 13.008,4.1246185 12.64,3.2615355 12.16,2.5422998 11.568,1.9509282 10.96,1.3755395 10.24,0.89604904 9.392,0.51245664 8.528,0.16083027 7.664,-0.01498292 6.784,0.0010001 5.888,0.03296613 5.024,0.22476233 4.16,0.54442267 3.296,0.86408301 2.56,1.3435735 1.984,1.9828942 1.408,2.6222149 0.928,3.3414506 0.56,4.1565845 0.192,4.9557353 0,5.8348013 0,6.7618162 c 0,0.927015 0.192,1.8060809 0.528,2.6371978 0.336,0.831117 0.816,1.550353 1.424,2.157707 0.608,0.607355 1.344,1.086845 2.176,1.438472 0.848,0.351626 1.728,0.527439 2.64,0.527439 1.408,0 2.672,-0.383592 3.824,-1.182743 l 3.312,3.292502 C 14.144,15.872136 14.416,16 14.768,16 15.104,16 15.392,15.872136 15.632,15.632391 15.872,15.392645 16,15.104951 16,14.769308 15.984,14.401698 15.872,14.114004 15.632,13.874259 Z M 9.808,9.7985894 C 8.992,10.59774 7.984,11.013299 6.784,11.061248 5.552,11.093214 4.544,10.677655 3.728,9.7985894 2.912,8.9195235 2.496,7.9125935 2.448,6.7458332 2.432,5.595056 2.848,4.5881259 3.712,3.725043 4.576,2.8619601 5.6,2.4304187 6.768,2.4464017 c 1.168,0.015983 2.176,0.4475245 3.024,1.2786413 0.848,0.8311169 1.28,1.838047 1.28,3.0207902 -0.048,1.2466753 -0.448,2.2536054 -1.264,3.0527562 z"
        alt="Submit Search"></path>
    </svg>
  </button>
</form>

https://www.fbi.gov/@@search

<form class="navbar-form navbar-left" role="search" action="https://www.fbi.gov/@@search">
  <label for="mobile-fbi-search" class="visually-hidden">Search FBI</label>
  <input type="search" id="mobile-fbi-search" name="SearchableText" placeholder="Search FBI">
  <button type="submit">
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" width="18" height="18" aria-labelledby="title" role="img">
      <title id="title">Submit Search</title>
      <style type="text/css">
        .mobilesearch-icon {
          fill: #a9a9a9;
        }
      </style>
      <path class="mobilesearch-icon"
        d="M 15.632,13.874259 12.336,10.581757 C 13.12,9.4309801 13.52,8.1523387 13.52,6.7458332 13.552,5.8507843 13.376,4.9877014 13.008,4.1246185 12.64,3.2615355 12.16,2.5422998 11.568,1.9509282 10.96,1.3755395 10.24,0.89604904 9.392,0.51245664 8.528,0.16083027 7.664,-0.01498292 6.784,0.0010001 5.888,0.03296613 5.024,0.22476233 4.16,0.54442267 3.296,0.86408301 2.56,1.3435735 1.984,1.9828942 1.408,2.6222149 0.928,3.3414506 0.56,4.1565845 0.192,4.9557353 0,5.8348013 0,6.7618162 c 0,0.927015 0.192,1.8060809 0.528,2.6371978 0.336,0.831117 0.816,1.550353 1.424,2.157707 0.608,0.607355 1.344,1.086845 2.176,1.438472 0.848,0.351626 1.728,0.527439 2.64,0.527439 1.408,0 2.672,-0.383592 3.824,-1.182743 l 3.312,3.292502 C 14.144,15.872136 14.416,16 14.768,16 15.104,16 15.392,15.872136 15.632,15.632391 15.872,15.392645 16,15.104951 16,14.769308 15.984,14.401698 15.872,14.114004 15.632,13.874259 Z M 9.808,9.7985894 C 8.992,10.59774 7.984,11.013299 6.784,11.061248 5.552,11.093214 4.544,10.677655 3.728,9.7985894 2.912,8.9195235 2.496,7.9125935 2.448,6.7458332 2.432,5.595056 2.848,4.5881259 3.712,3.725043 4.576,2.8619601 5.6,2.4304187 6.768,2.4464017 c 1.168,0.015983 2.176,0.4475245 3.024,1.2786413 0.848,0.8311169 1.28,1.838047 1.28,3.0207902 -0.048,1.2466753 -0.448,2.2536054 -1.264,3.0527562 z"
        alt="Submit Search"></path>
    </svg>
  </button>
</form>

Text Content

An official website of the United States government. Here's how you know

OFFICIAL WEBSITES USE .GOV

A .gov website belongs to an official government organization in the United
States.

SECURE .GOV WEBSITES USE HTTPS

A lock () or https:// means you've safely connected to the .gov website. Share
sensitive information only on official, secure websites.

Submit Search Search
FBI
More

 * Most Wanted
 * News
 * What We Investigate
 * How We Can Help You
 * Submit a Tip
 * About
 * Contact Us

 1. Home
 2. What We Investigate

 * Facebook Icon
 * Email Icon
 * 
 * Youtube Icon
 * Flickr Icon
 * LinkedIn Icon
 * Instagram Icon
 * Search FBI Submit Search

FBIFederal Bureau of Investigation


CYBERCRIME

What We Investigate

 * Terrorism
 * Counterintelligence
 * Cybercrime
 * Public Corruption
 * Civil Rights
 * Organized Crime
 * White-Collar Crime
 * Violent Crime
 * Environmental Crime
 * Weapons of Mass Destruction
 * How We Investigate
 * More

 * News
 * Most Wanted
 * FBI Guidance to Victims of Cyber Incidents on SEC Reporting Requirements
 * Business and Industry Partners
 * 


THE CYBER THREAT 


Malicious cyber activity threatens the public’s safety and our national and
economic security. The FBI’s cyber strategy is to impose risk and consequences
on cyber adversaries. Our goal is to change the behavior of criminals and
nation-states who believe they can compromise U.S. networks, steal financial and
intellectual property, and put critical infrastructure at risk without facing
risk themselves. To do this, we use our unique mix of authorities, capabilities,
and partnerships to impose consequences against our cyber adversaries.

The FBI is the lead federal agency for investigating cyber attacks and
intrusions. We collect and share intelligence and engage with victims while
working to unmask those committing malicious cyber activities, wherever they
are.

Learn more about what you can do to protect yourself from cyber criminals, how
you can report cyber crime, and the Bureau's efforts in combating the evolving
cyber threat.


PRIVATE SECTOR PARTNERS 

Learn how businesses and organizations can work with the FBI to get ahead of the
threat and make an impact on our cyber adversaries.


A COMPLEX, GLOBAL CONCERN 

Our adversaries look to exploit gaps in our intelligence and information
security networks. The FBI is committed to working with our federal
counterparts, our foreign partners, and the private sector to close those gaps.

These partnerships allow us to defend networks, attribute malicious activity,
sanction bad behavior, and take the fight to our adversaries overseas. The FBI
fosters this team approach through unique hubs where government, industry, and
academia form long-term trusted relationships to combine efforts against cyber
threats.

Within government, that hub is the National Cyber Investigative Joint Task Force
(NCIJTF). The FBI leads this task force of more than 30 co-located agencies from
the Intelligence Community and law enforcement. The NCIJTF is organized around
mission centers based on key cyber threat areas and led by senior executives
from partner agencies. Through these mission centers, operations and
intelligence are integrated for maximum impact against U.S. adversaries.

Only together can we achieve safety, security, and confidence in a digitally
connected world.


HOW WE WORK 

Whether through developing innovative investigative techniques, using
cutting-edge analytic tools, or forging new partnerships in our communities, the
FBI continues to adapt to meet the challenges posed by the evolving cyber
threat.

 * The FBI has specially trained cyber squads in each of our 56 field offices,
   working hand-in-hand with interagency task force partners.
 * The rapid-response Cyber Action Team can deploy across the country within
   hours to respond to major incidents.
 * With cyber assistant legal attachés in embassies across the globe, the FBI
   works closely with our international counterparts to seek justice for victims
   of malicious cyber activity.
 * The Internet Crime Complaint Center (IC3) collects reports of Internet crime
   from the public. Using such complaints, the IC3’s Recovery Asset Team has
   assisted in freezing hundreds of thousands of dollars for victims of cyber
   crime.
 * CyWatch is the FBI’s 24/7 operations center and watch floor, providing
   around-the-clock support to track incidents and communicate with field
   offices across the country.


ASSET FORFEITURE

Asset forfeiture is a powerful tool used by law enforcement agencies, including
the FBI, against criminals and criminal organizations to deprive them of their
property used illegally and their ill-gotten gains through seizure of these
assets. It is also used to compensate victims of crime. Learn more about the
FBI’s asset forfeiture program and to see forfeiture in action.





WHAT YOU SHOULD KNOW 


PROTECT YOURSELF

 * Taking the right security measures and being alert and aware when connected
   are key ways to prevent cyber intrusions and online crimes. Learn how to
   protect your computer, network, and personal information.


UNDERSTAND COMMON CRIMES AND RISKS ONLINE

 * Business email compromise (BEC) scams exploit the fact that so many of us
   rely on email to conduct business—both personal and professional—and it’s one
   of the most financially damaging online crimes.
   
 * Identity theft happens when someone steals your personal information, like
   your Social Security number, and uses it to commit theft or fraud.
 * Ransomware is a type of malicious software, or malware, that prevents you
   from accessing your computer files, systems, or networks and demands you pay
   a ransom for their return.
 * Spoofing and phishing are schemes aimed at tricking you into providing
   sensitive information to scammers.
 * Online predators are a growing threat to young people.
 * More common crimes and scams
   


RESPOND AND REPORT 




File a Report with the Internet Crime Complaint Center (IC3)

If you are the victim of a cyber-enabled crime or fraud, file a report with the
Internet Crime Complaint Center (IC3) as soon as possible. Crime reports are
used for investigative and intelligence purposes. Rapid reporting can also help
support the recovery of lost funds.

Visit ic3.gov for more information, including tips and information about current
crime trends.

Contact Your Local FBI Field Office

If you need to report an ongoing crime, threat to life, or national security
threat, file a report at tips.fbi.gov or by contacting your local field office.







CYBER SAFETY TIPS

Internet-enabled crimes and cyber intrusions are becoming increasingly
sophisticated and preventing them requires each user of a connected device to be
aware and on guard. 

 * Keep systems and software up to date and install a strong, reputable
   anti-virus program.
 * Be careful when connecting to a public Wi-Fi network and do not conduct any
   sensitive transactions, including purchases, when on a public network.
 * Create a strong and unique passphrase for each online account.
 * Set up multi-factor authentication on all accounts that allow it.
 * Examine the email address in all correspondence and scrutinize website URLs
   before responding to a message or visiting a site
 * Don’t click on anything in unsolicited emails or text messages.
 * Be cautious about the information you share in online profiles and social
   media accounts. Sharing things like pet names, schools, and family members
   can give scammers the hints they need to guess your passwords or the answers
   to your account security questions.
 * Don't send payments to unknown people or organizations that are seeking
   monetary support and urge immediate action.





ADDITIONAL RESOURCES AND RELATED PRIORITIES 



THE IRAN THREAT

Threats from the Iranian regime and its terrorist partners are far reaching. The
FBI is committed to identifying and disrupting all Iranian intelligence and
military operations that threaten American citizens or our nation's security and
critical infrastructure.


LAWFUL ACCESS


Law enforcement agencies all over the country are bumping up against
“warrant-proof” encryption. This means that even with a warrant, law enforcement
cannot obtain the electronic evidence needed to investigate and prosecute crimes
or security threats. 









CYBER NEWS  


 * 09.26.2024
   
   Virginia Man Sentenced to Three Years in Prison for Sextortion Scheme
   Targeting More Than 100 Young Female Victims Across the Country

 * 09.26.2024
   
   Two Nigerian Nationals Charged in Connection with Business E-Mail Compromise
   Scheme

 * 09.26.2024
   
   Plymouth Man Indicted for His Role in International Conspiracy to Traffic
   Counterfeit Computer Network Devices

 * 09.26.2024
   
   United States Seizes More Than $6 Million in Alleged Proceeds of a
   Crypto-Confidence Scheme

 * 09.25.2024
   
   Air National Guardsman Pleads Guilty in Murder-for-Hire Scheme

 * 09.23.2024
   
   Businessman Sentenced to More Than Two Years in Federal Prison for Running
   Fencing Operation Out of Suburban Chicago Stores

 * 09.23.2024
   
   Seven Charged After Federal Investigation Disrupts Massive Counterfeit Pill
   Manufacturing Operation

 * 09.18.2024
   
   Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s
   Republic of China State-Sponsored Hackers

 * 09.18.2024
   
   FBI Director Announces Chinese Botnet Disruption, Exposes Flax Typhoon Hacker
   Group’s True Identity at Aspen Cyber Summit

 * 09.18.2024
   
   Director Wray's Remarks at the 2024 Aspen Cyber Summit

More News


FEATURED STORY



FBI STRATEGY ADDRESSES EVOLVING CYBER THREAT

 * Most Wanted
 * Ten Most Wanted
 * Fugitives
 * Terrorism
 * Kidnappings / Missing Persons
 * Seeking Information
 * Bank Robbers
 * ECAP
 * ViCAP
    * FBI Jobs
    * Submit a Tip
    * Crime Statistics
    * History
    * FOIPA
    * Scams & Safety
    * FBI Kids

 * News
 * Stories
 * Videos
 * Press Releases
 * Speeches
 * Testimony
 * Podcasts and Radio
 * Photos
 * Español
 * Apps
 * How We Can Help You
 * Law Enforcement
 * Victims
 * Parents and Caregivers
 * Students
 * Businesses
 * Safety Resources
 * Need an FBI Service or More Information?

 * What We Investigate
 * Terrorism
 * Counterintelligence
 * Cyber Crime
 * Public Corruption
 * Civil Rights
 * Organized Crime
 * White-Collar Crime
 * Violent Crime
 * WMD
 * About
 * Mission & Priorities
 * Leadership & Structure
 * Partnerships
 * Community Outreach
 * FAQs

 * Contact Us
 * Field Offices
 * FBI Headquarters
 * Visit the FBI Experience
 * Overseas Offices
 * Additional Resources
 * Accessibility
 * eRulemaking
 * Freedom of Information / Privacy Act
 * Legal Notices
 * Legal Policies & Disclaimers
 * Privacy Policy
 * USA.gov
 * White House
 * No FEAR Act
 * Equal Opportunity


FBI


FEDERAL BUREAU OF INVESTIGATION

 * 
 * 
 * 
 * 
 * 
 * 


FBI.GOV CONTACT CENTER

EMAIL UPDATES

 * * Accessibility
   * eRulemaking
   * Freedom of Information / Privacy Act
   * Legal Notices
   * Legal Policies & Disclaimers
 * * Privacy Policy
   * USA.gov
   * White House
   * No FEAR Act
   * Equal Opportunity

FBI.gov is an official site of the U.S. Department of Justice ©
Search FBI Submit Search
 * Home
 * Most Wanted
 * News
 * What We Investigate
   * Terrorism
   * Counterintelligence
   * Cybercrime
     * News
     * Most Wanted
     * FBI Guidance to Victims of Cyber Incidents on SEC Reporting Requirements
     * Business and Industry Partners
   * Public Corruption
   * Civil Rights
   * Organized Crime
   * White-Collar Crime
   * Violent Crime
   * Environmental Crime
   * Weapons of Mass Destruction
   * How We Investigate
 * How We Investigate
 * How We Can Help You
 * Submit a Tip
 * About
 * Contact Us
 * Crime Statistics
 * Photos
 * Video
 * Outreach
 * History
 * FOIA
 * Scams & Safety
 * FBI Kids
 * FBI Jobs




CONTENTS

 * Overview
 * Private Sector Partners
 * Combating the Threat
 * How We Work
 * What You Should Know
 * Respond and Report
 * Resources
 * Cyber News