Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

SEC Hunts Hackers Who Stole Corporate Emails to Trade Stocks

Regulators have asked at least eight companies for details on data breaches.

Milagli / Shutterstock

U.S. securities regulators are investigating a group of hackers suspected of breaking into corporate email accounts to steal information to trade on, such as confidential details about mergers, according to people familiar with the matter.

The Securities and Exchange Commission has asked at least eight listed companies to provide details of their data breaches, one of the people said. The unusual move by the agency reflects increasing concerns about cyber attacks on U.S. companies and government agencies.

It is an “absolute first” for the SEC to approach companies about possible breaches in connection with an insider trading probe, said John Reed Stark, a former head of Internet enforcement at the SEC.

“The SEC is interested because failures in cyber security have prompted a dangerous, new method of unlawful insider trading,” said Stark, now a private cyber security consultant.

According to people familiar with the matter, the SEC’s inquiry and a parallel probe by the U.S. Secret Service — which investigates cyber crimes and financial fraud — were spurred by a December report by security company FireEye about a sophisticated hacking group that it dubbed “FIN4.”

Since mid-2013, FIN4 has tried to hack into email accounts at more than 100 companies, looking for confidential information on mergers and other market-moving events. The targets include more than 60 listed companies in biotechnology and other healthcare-related fields, such as medical instruments, hospital equipment and drugs, according to the FireEye report.

The SEC declined to comment. A Secret Service spokesman said the agency does not comment on pending investigations.

The SEC has asked companies for data on cyber intrusions or attempted intrusions, as well as information on the tactics that the unknown hackers used to lure employees into giving up email passwords, known as “spear phishing” or “credential harvesting,” people familiar with the investigation said.

Stark said he saw some of the SEC’s requests for documents from companies, but he was not familiar with the scope of the investigation. He and other sources declined to name the targeted companies because of client relationships and because the SEC investigation is confidential.

It could not be learned if the SEC is only looking into the FIN4 group or if its probe is broader.

Milpitas, Calif.-based FireEye said it believed the FIN4 hackers could be from the United States or Europe because they had flawless English and a deep understanding of how the financial markets and investment banking work.

The hackers targeted healthcare and pharmaceutical companies because their stocks tend to be volatile, and thus potentially more profitable. In one case, the hackers had sought information about Medicaid rebates and government purchasing decisions, FireEye said.

FireEye’s clients were among the companies targeted by the hackers, who used fake Microsoft Outlook login pages to trick attorneys, executives and consultants into surrendering their user names and passwords.

“What was insidiously brilliant was that they could inject themselves into email threads and keep gleaning information,” said FireEye’s manager of threat intelligence, Laura Galante. “They really knew their audience.”

In at least one case, FireEye said, the hackers used a confidential document, containing significant information that they had already procured, to entice people discussing that matter into giving their email credentials.

FireEye said it had briefed the FBI about its findings.

As concerns about cyber security grew, the SEC in 2011 issued guidance for public companies on disclosing breaches. Companies are not required to disclose any breaches unless they are deemed to be “material” under federal securities laws.

The probe is unusual for the SEC, which has typically searched for questionable trading activity in stocks and options when investigating insider trading cases, said Stark.

The SEC only has the power to bring civil cases, so any possible criminal cases resulting from the probe would be brought by a federal prosecutor.

Until now, the SEC has only brought a handful of civil cases against hackers.

In 2007, the agency filed civil charges against a Ukrainian trader named Oleksandr Dorozhko whom they accused of hacking into IMS Health and stealing information on earnings that he used to make profitable options trades. In 2010, a federal court ordered Dorozhko to pay $580,000.

(Reporting by Sarah N. Lynch in Washington and Joseph Menn in San Francisco; Editing by Soyoung Kim and Tiffany Wu)

This article originally appeared on Recode.net.

See More:

More in Technology

Podcasts
Are humanoid robots all hype?Are humanoid robots all hype?
Podcast
Podcasts

AI is making them better — but they’re not going to be doing your chores anytime soon.

By Avishay Artsy and Sean Rameswaram
Future Perfect
The old tech that could help stop the next airborne pandemicThe old tech that could help stop the next airborne pandemic
Future Perfect

Glycol vapors, explained.

By Shayna Korol
Future Perfect
Elon Musk could lose his case against OpenAI — and still get what he wantsElon Musk could lose his case against OpenAI — and still get what he wants
Future Perfect

It’s not about who wins. It’s about the dirty laundry you air along the way.

By Sara Herschander
Life
Why banning kids from AI isn’t the answerWhy banning kids from AI isn’t the answer
Life

What kids really need in the age of artificial intelligence.

By Anna North
Culture
Anthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque messAnthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque mess
Culture

“Your AI monster ate all our work. Now you’re trying to pay us off with this piece of garbage that doesn’t work.”

By Constance Grady
Future Perfect
Some deaf children are hearing again because of a new gene therapySome deaf children are hearing again because of a new gene therapy
Future Perfect

A medical field that almost died is quietly fixing one disease at a time.

By Bryan Walsh