In February 2023, a server at the FBI New York Field Office was accessed without authorization, compromising files related to the investigation of the late financier Jeffrey Epstein. The breach was confirmed by Justice Department documents reviewed by Reuters, highlighting the seriousness of the incident and the sensitivity of the files involved.
Foreign Hacker Implicated
Sources familiar with the investigation indicate that a foreign hacker was responsible for the breach. It is not publicly clear whether the hacker was acting independently, for a criminal network, or on behalf of a foreign government. Authorities have not released the identity or nationality of the intruder.
How the Breach Occurred
The hacker gained access to a server used in the Epstein investigation, which is part of the FBI’s Child Exploitation Forensic Lab. Officials suggest the server was vulnerable due to a procedural oversight, allowing the hacker to enter the system on February 12, 2023. The intruder reportedly left messages indicating the server had been compromised.
FBI Response and Containment
Upon detecting the breach, the FBI quickly contained the incident and secured the affected network. Officials also communicated with the intruder via video in an attempt to limit the unauthorized access. Measures were taken to prevent further compromise of sensitive evidence.
Files and Data at Risk
Details about which specific files were accessed or copied remain unknown. The Justice Department documents are heavily redacted to protect victim privacy and ongoing investigations. It is also unclear whether any of the data was downloaded, shared, or leaked.
Ongoing Investigation and Official Statements
The FBI has labeled the incident as an “isolated cyber event” and continues to investigate. Authorities insist that security vulnerabilities have been fixed and access has been restricted. No charges have been publicly filed in connection with the breach, and the agency continues to monitor the situation closely.













