2026年3月11日 美国东部时间上午10:02 / 路透社
作者:拉斐尔·萨特(Raphael Satter)

[1/2] 吉斯莱恩·麦克斯韦尔(Ghislaine Maxwell)和杰弗里·爱泼斯坦(Jeffrey Epstein)在这张由美国华盛顿特区司法部于2025年12月19日发布的照片中出现,这是其针对已故金融家及定罪性犯罪者杰弗里·爱泼斯坦调查的新一批文件的一部分。美国司法部/图片来源 via 路透社 / 档案照片
- 摘要
- 外国黑客三年前入侵了与爱泼斯坦调查相关的FBI文件
- 此次黑客入侵引发对外国间谍对这些爆炸性文件兴趣的担忧
- FBI表示正在调查此次事件
华盛顿,3月11日(路透社) – 据一位知情人士和路透社查阅的最新公布的司法部文件显示,三年前,一名外国黑客在闯入美国联邦调查局(FBI)纽约现场办公室期间,获取了与该局调查已故性犯罪者杰弗里·爱泼斯坦(Jeffrey Epstein)相关的文件。
有关谁访问了FBI纽约现场办公室服务器的细节,包括一名外国黑客涉入的指控,是首次在此披露。
路透社伊朗简报通讯将为您提供伊朗战争的最新动态和分析。点击此处订阅。
广告 · 继续滚动阅读
FBI在一份声明中称,所谓的”网络事件”是”孤立事件”。
“联邦调查局限制了对恶意行为者的访问,并修复了网络。调查仍在进行中,因此我们目前无法提供进一步评论。”
尽管消息人士称此次入侵似乎是由一名网络犯罪分子而非外国政府实施的,但一位学者表示,这一事件凸显了这些文件的潜在情报价值。根据法律规定必须公开的美国司法部文件,已揭露了这位已故金融家与政治、金融、学术界和商界知名人士的联系,引发了全球众多国家的调查。
“如果你是俄罗斯人或对 compromising( compromising:此处应为“ compromising material”,即“ compromising信息”)感兴趣的人,谁不会去追踪爱泼斯坦文件呢?”佐治亚理工学院研究新兴技术在全球安全中作用的乔恩·林赛(Jon Lindsay)表示。”如果外国情报机构不认真考虑将爱泼斯坦文件作为目标,那我会感到震惊。”
此次入侵于2月17日被美国有线电视新闻网(CNN)和路透社同时报道;法国《玛丽安娜》杂志(Marianne)指出了与爱泼斯坦材料的关联。
爱泼斯坦是美国总统唐纳德·特朗普的长期伙伴,2008年因涉及未成年人卖淫等罪名认罪。2019年,他在因涉嫌贩卖未成年人性交易罪名再次被捕后,被发现于狱中上吊身亡,当局裁定为自杀。
2023年2月入侵事件
据消息人士和文件显示,黑客入侵发生在FBI纽约现场办公室的一台服务器被疏忽导致漏洞之后,当时该服务器由特别探员亚伦·斯皮瓦克(Aaron Spivack)负责管理,他当时正在尝试遵守该局复杂的数字证据处理程序。
斯皮瓦克撰写的时间线被包含在今年早些时候发布的大量爱泼斯坦相关文件中,显示入侵发生在2023年2月12日。根据该文件,斯皮瓦克在第二天打开电脑时发现一个文本文件,警告他的网络已被入侵。
进一步调查发现服务器上有异常活动,文件称该活动”包括浏览与爱泼斯坦调查相关的某些文件”。
时间线未说明具体访问了哪些文件,黑客是否下载了数据,或黑客身份。路透社无法确定受影响数据与今年早些时候发布的爱泼斯坦文件或仍未公开的文件是否有重叠。
在此次事件调查中涉及的七名FBI探员均未回复消息。
黑客与FBI通过视频聊天交流
斯皮瓦克在向FBI调查人员陈述自己是否对此次入侵负责时表示,他正被”当作入侵事件的替罪羊”,并指责该局相互矛盾的政策和信息技术方面的错误指导是罪魁祸首。路透社无法确定该局内部调查的结果。
知情人士称,此次入侵是由一名外国黑客实施的,该黑客似乎没有意识到他们入侵了执法机构的服务器。该黑客对设备上存在虐待儿童图像表示厌恶,并留下信息威胁要将设备所有者移交给FBI。
消息人士称,联邦调查局官员通过让黑客相信他们实际上就是FBI,化解了局势,部分做法是让黑客加入一个视频聊天,他们在网络摄像头前展示了执法人员的证件。
路透社无法确定——消息人士称他们也不知道——黑客是谁、来自哪个国家、如何处理所获取的材料,或者是否有人试图识别或惩罚入侵FBI服务器的行为。
尽管去年通过的一项法律要求司法部全面公开文件,但许多文件已被大量删改,其他文件则完全被保密。特朗普政府表示,他们扣留可能会暴露受害者身份或危害正在进行的调查的材料。
报道:拉斐尔·萨特;编辑:大卫·加芬
我们的标准:路透社信托原则。
Exclusive: Foreign hacker in 2023 compromised Epstein files held by FBI, source and documents show
March 11, 2026 10:02 AM UTC / Reuters
By Raphael Satter
节点运行失败
Item 1 of 2 Ghislaine Maxwell and Jeffrey Epstein are seen in this image released by the Department of Justice in Washington, D.C., U.S., on December 19, 2025 as part of a new trove of documents from its investigations into the late financier and convicted sex offender Jeffrey Epstein. U.S. Justice Department/Handout via REUTERS /File Photo
[1/2]Ghislaine Maxwell and Jeffrey Epstein are seen in this image released by the Department of Justice in Washington, D.C., U.S., on December 19, 2025 as part of a new trove of documents from its investigations into the late financier and convicted sex offender Jeffrey Epstein. U.S. Justice… Read more
- Summary
- Foreign hacker accessed FBI files ‘pertaining to the Epstein investigation’ three years ago
- Hack raises concerns over foreign spies’ interest in the explosive documents
- FBI says its investigation into the incident is ongoing
WASHINGTON, March 11 (Reuters) – A foreign hacker compromised files relating to the FBI’s investigation of the late sex offender Jeffrey Epstein during a break-in at the bureau’s New York Field Office three years ago, according to a source familiar with the matter and recently published Justice Department documents reviewed by Reuters.
The details of who accessed a server at the FBI’s New York Field Office, including the allegation that a foreign hacker was involved, are being reported here for the first time.
The Reuters Iran Briefing newsletter keeps you informed with the latest developments and analysis of the Iran war. Sign up here.
Advertisement · Scroll to continue
In a statement, the FBI said what it described as a “cyber incident” was “an isolated one.”
“The FBI restricted access to the malicious actor and rectified the network. The investigation remains ongoing, so we do not have further comments to provide at this time.”
Although the source said the intrusion appeared to have been carried out by a cybercriminal rather than a foreign government, the incident underscores the files’ potential intelligence value, one academic said. The legally mandated publication of U.S. Justice Department documents has exposed the dead financier’s ties to prominent people in politics, finance, academia and business, triggering investigations in numerous countries around the world.
Advertisement · Scroll to continue
“Who wouldn’t be going after the Epstein files if you’re the Russians or somebody interested in kompromat?” said Jon Lindsay, who researches the role of emerging technology in global security at the Georgia Institute of Technology. “If foreign intelligence agencies are not thinking seriously about the Epstein files as a target, then I would be shocked.”
The breach was reported contemporaneously by CNN and Reuters on February 17; the connection to Epstein materials was made by the French magazine Marianne.
Epstein, a longtime associate of President Donald Trump, pleaded guilty in 2008 to prostitution charges, including soliciting an underage girl. He was found hanged in his jail cell in 2019, in what was ruled a suicide, after being arrested again on federal charges of sex trafficking of minors.
FEBRUARY 2023 BREAK-IN
The hack occurred after a server at the Child Exploitation Forensic Lab in the FBI’s New York Field Office was inadvertently left vulnerable by Special Agent Aaron Spivack, who was trying to navigate the bureau’s complex procedures for handling digital evidence, according to the source and the documents.
A timeline written by Spivack and included in the large cache of Epstein documents released earlier this year said the break-in happened on February 12, 2023. It was discovered the following day when Spivack turned on his computer and discovered a text file warning him that his network had been compromised, according to that document.
Further investigation turned up traces of unusual activity on the server, the document said, adding that the activity “included combing through certain files pertaining to the Epstein investigation.”
The timeline does not say which specific files were accessed, whether the hacker downloaded the data, or who the hacker was. Reuters could not establish what, if any, overlap the affected data had with the Epstein documents published earlier this year or the files that remain under wraps.
Spivack, whose name appears elsewhere in the documents in connection with the Epstein investigation, did not return repeated messages seeking comment. Reuters was unable to reach the man identified in the documents as Spivack’s lawyer, Richard J. Roberson, Jr. Seven FBI agents identified in the documents as being involved in the investigation into the incident did not return messages.
HACKER, FBI CHATTED BY VIDEO
In his statement to FBI investigators examining whether he was responsible for the breach, Spivack said he was being made “a scapegoat for the intrusion” and that conflicting bureau policies and faulty guidance around information technology were to blame. Reuters could not establish the result of the bureau’s internal investigation.
The person familiar with the breach said the intrusion was carried out by a foreign hacker who did not appear to realize they had penetrated a law enforcement server. The hacker expressed disgust at the presence of child abuse images on the device and left a message threatening to turn its owner over to the FBI, the person said.
The source said bureau officials defused the situation by convincing the hacker that they actually were the FBI, in part by having the hacker join a video chat where they flashed their law enforcement credentials in front of a web camera.
Reuters could not determine – and the source said they did not know – who the hacker was, what country they were operating from, what they did with the material accessed, or whether any effort was made to identify or punish them for breaking into the FBI’s server.
Many of the Justice Department’s documents have been heavily redacted and others have been kept secret altogether despite a law mandating their full release last year. The Trump administration says it is withholding material that could compromise victims’ identities or jeopardize ongoing investigations.
Reporting by Raphael Satter; editing by David Gaffen
Our Standards: The Thomson Reuters Trust Principles.
发表回复