Hackers Hijack JFK File Release: Malware & Phishing Surge

by | Feb 3, 2025

Veriti Research has uncovered a potentially growing cyber threat campaign surrounding the release of the declassified JFK, RFK, and MLK files. Attackers are capitalizing on public interest in these historical documents to launch potential malware campaigns, phishing schemes, and exploit attempts. Our research indicates that cybercriminals are quick to react to major public events, and this case is no exception. 

As the files gain media attention, attackers are starting to create potential infrastructure for their upcoming attacks. 

The Fast Response Time of Cybercriminals 

Veriti Research has observed that attackers are incredibly swift in crafting scams and launching attacks following significant global events. Within days of the announcement regarding the declassification of JFK-related files, several suspicious domains were registered, seemingly designed to impersonate legitimate sources. 

Some of the domains identified include: 

  • Thejfkfiles[.]com – Registered on January 23 
  • jfk-files[.]com – Registered on January 23 
  • rfkfiles[.]com – Registered on January 24 
  • jfk-files[.]org – Registered on January 25 

These domains raise red flags as they could be leveraged for malicious activities, such as phishing attacks, malware distribution, or social engineering tactics to steal credentials. 

Key Attack Vectors Identified 

Based on Veriti Research findings and past research on similar events, cybercriminals are and will use multiple attack techniques to take advantage of users seeking access to the declassified files: 

  1. Malware-Laced Files: Attackers are embedding malware into files labeled as “official” JFK document releases. Unsuspecting users who download these files may unknowingly infect their devices with spyware, ransomware, or trojans. 
  2. Fake Phishing Websites: Fraudulent websites mimicking official sources lure users into downloading harmful files or entering sensitive information. These phishing pages may appear convincing, using similar branding and layouts as government or media sites. 
  3. Embedded Exploits in Browsers: Some malicious websites exploit browser vulnerabilities as soon as a user visits them. By using zero day vulnerabilities or known exploits, attackers can execute remote code and compromise the visitor’s system. 
  4. Email-Based Phishing Attacks: Cybercriminals are sending phishing emails posing as journalists, historians, or official institutions offering “exclusive” access to newly released JFK files. These emails often contain malicious attachments or links leading to infected downloads.
  5.  

**although the above site might be legit for now, it might be a way to build reputation for a ‘day of an attack’ 

The Bigger Cybersecurity Picture 

Events of historical and public significance have always been prime opportunities for attackers. Similar trends have been observed with past global events, including COVID-19 scams, election related campaigns, and cryptocurrency frauds. 

The upcoming attacks leveraging the JFK files highlight the importance of cyber resilience in the face of social engineering tactics. Threat actors know that urgency and curiosity often lead to reduced vigilance, making individuals and organizations vulnerable to scams. This is why verifying sources before downloading files is critical. Only access declassified JFK files from official government websites such as the National Archives or other well known sources. Avoid downloading files from unknown third party websites or social media links, as attackers often disguise malicious content under seemingly legitimate branding. As always, if something looks suspicious, it’s best to avoid clicking links or downloading attachments. 

The exploitation of the JFK files is just another example of how quickly cybercriminals can adapt to real world events. 

Veriti Research will continue monitoring developments around these cyber threats and provide updates as new attack methods emerge. Stay informed, stay cautious, and help others stay protected by sharing cybersecurity awareness within your organization and network. 

Product

Product Overview

Maximize security posture while ensuring business uptime

Automated Security Controls Assessment

Validate your security control

Integrations

Connect Veriti with your security solutions

Veriti is a triple winner at the Global InfoSec Awards 2025

 

Read More >>

Use Cases

Security Control Hardening

Reduce risk across the network, endpoint and operating system.​​
Assessing Risks Icon

Threat intelligence enforcement

Extend and enforce threat intelligence across all security controls​

Vulnerability Remediation

Safely remediate vulnerabilities in one click

Agentless OS-Level Remediation

Remediate directly at the OS-Level on the endpoint​

Solutions

Veriti Cloud

First cloud native remediation for your workloads​

Safe Remediation

Ensure remediation actions do not give rise to additional exposures

Odin

AI-Powered Contextual Cybersearch

MITRE ATT&CK®

Quickly respond to live threats with safe and precise remediation

Industries

Veriti for Financial Services

Increase business outcomes

Veriti for MSSPs

Efficiently manage multiple clients in a consolidated platform

Veriti for Healthcare

Neutralize security gaps without impacting healthcare operations

Veriti for Manufacturing

Protecting the heart of your production

Resources

See all resources

Blog

Veriti's security blog

Downloads

The latest guides, white papers and infographics

Videos

Watch the latest in exposure assessments

Events

Live event and on-demand webinars

Glossary

Our Comprehensive Definitions Guide

Veriti is the Sole Vendor Recognized in
Gartner 2025 Preemptive Exposure Management

 

Read the Report >>

Our Story

Learn about Veriti

Careers

Work with us

Newsroom

Our latest updates

Contact US

Get in touch

CHANNEL PARTNERS

Become a partner

MSSPs

Reduce operational costs