Second Hack of US Federal Records

580x391
 
As many as 14 million current and former civilian US government employees had their personal information exposed to hackers, according to two people who were briefed on the investigation. 
 
This represents a far higher figure than the 4 million the Obama administration initially disclosed and coming amid an apparent second cyber breach that officials said was linked to China.
 
The newer estimates put the number of compromised records at between 9 million and 14 million going back to the 1980s, said one congressional official and one former US official, who spoke to the Associated Press on condition of anonymity because information disclosed in the confidential briefings includes classified details of the investigation.
 
There are about 4.2 million federal employees, so the majority of the records exposed relate to former employees. Contractor information also has been stolen, officials said.
 
The latest revelation came a day after a major union said the cyber theft is more damaging than it first appeared, asserting that hackers stole personnel data and social security numbers for all the federal workers in a central personnel database.
Several US officials also said hackers linked to China appear to have gained access to sensitive background information submitted by intelligence and military personnel seeking security clearances. The break is the second digital breach of federal records revealed in a week and could dramatically compound the potential damage.
 
The forms believed accessed, known as Standard Form 86, require applicants to fill out deeply personal information about mental illnesses, drug and alcohol use, past arrests and bankruptcies. They also require the listing of contacts and relatives, potentially exposing any foreign relatives of US intelligence employees to coercion. The applicant’s social security number and that of his or her cohabitant are required.
 
Regarding the new user total affected by the main breach, the Obama administration had acknowledged that up to 4 million current and former employees whose information resides in the Office of Personnel Management (OPM)s server are affected by the December cyber breach, but it had been vague about exactly what was taken. But J David Cox, president of the American Federation of Government Employees, said in a letter Thursday to OPM director Katherine Archuleta that based on incomplete information OPM provided to the union, “we believe that the Central Personnel Data File was the targeted database, and that the hackers are now in possession of all personnel data for every federal employee, every federal retiree, and up to 1 million former federal employees”.
 
The OPM data file contains the records of most federal civilian employees, though not members of Congress and their staffs, members of the military or staff of the intelligence agencies.
 
The union believes the hackers stole military records and veterans’ status information, address, birth date, job and pay history, health insurance, life insurance and pension information, and age, gender and race data, he said.
Senate Democrat leader Harry Reid said that the hack was carried out by “the Chinese” without specifying whether he meant the Chinese government or individuals. Reid is one of eight lawmakers briefed on the most secret intelligence information. US officials have declined to publicly blame China, which has denied involvement.
 
 “We believe that social security numbers were not encrypted, a cybersecurity failure that is absolutely indefensible and outrageous,” Cox said in the letter. 
 
Schumach addressed Cox’s comment on encryption. “Though data encryption is a valuable protection method, today’s adversaries are sophisticated enough that encryption alone does not guarantee protection,” he said. “OPM does utilize encryption in some instances and is currently increasing the types of methods utilized to encrypt data.”
The central personnel data file contains up to 780 separate pieces of information about an employee.
 
Cox complained in the letter that, “very little substantive information has been shared with us, despite the fact that we represent more than 670,000 federal employees in departments and agencies throughout the executive branch”.
The union’s release and Reid’s comment in the Senate put into sharper focus what is looking like a massive cyber espionage success by China. Republican senator Susan Collins, an intelligence committee member, has also said the hack came from China.
 
Mike Rogers, the former chairman of the House intelligence committee, said last week that Chinese intelligence agencies have for some time been seeking to assemble a database of information about Americans. Those personal details can be used for blackmail, or also to shape bogus emails designed to appear legitimate while injecting spyware on the networks of government agencies or businesses Chinese hackers are trying to penetrate.
 
US intelligence officials say China, like the US, spies for national security advantage. Unlike the US, they say, China also engages in large-scale theft of corporate secrets for the benefit of state-sponsored enterprises that compete with Western companies. Nearly every major US Company has been hacked from China, they say.
 
Chinese government-backed computer hackers repeatedly breached the networks of US military contractors including airline, shipping and technology firms involved in the movement of soldiers and equipment, an investigation by the US Senate has found.
 
Released by the Senate Armed Services Committee following a year of investigation, the report suggests there were 20 infiltrations into networks of military contractors between June 2012 and May 2013. The information accessed included details about military strategy and logistics, which could be used to disrupt US forces operations.
 
The Senate investigation also suggests poor practice surrounding reporting requirements within the US government is at least partially responsible for the authorities remaining unaware that the computer networks of their contractors had been compromised.
 
Speaking at the launch of the report, Carl Levin, Democratic Senator of Michigan and chairman of the Senate Armed Services Committee, suggested it is still impossible to know if hackers from China or elsewhere are currently accessing US networks.
 
Levin also warned that the report provides clear evidence that Chinese authorities are actively attempting to engage in cyber-espionage.
 
However, Geng Shuang, spokesman for the Chinese embassy in Washington, questioned the findings of the Senate's report, insisting that China isn't involved in any sort of cyber-espionage. "Judging from past experience, those kinds of reports and allegations are usually based on fabricated facts and groundless," Shuang said.
 
Guardian:         Ein News
 
« The Brave New World of Cybersecurity
MI6: Snowden Files Hacked to Find Western Spies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

Kinetic Investments

Kinetic Investments

Kinetic Investments provide entrepreneurs with the capital and support required to transform their vision into a success, in return for shared ownership of the company.

Digital Craftsmen Ltd

Digital Craftsmen Ltd

We're ISO27001 & Cyber Essentials Cybersecurity experts, delivering full cloud security and managed services. We take a bespoke approach for each client from hosting, optimising & securing them online

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

Inveteck Global

Inveteck Global

Inveteck Global is a Ghana-based cyber security firm providing strategic guidance and technical solutions to all our clients to best serve their individual needs.

Paradyn

Paradyn

Paradyn-managed security services can provide a holistic view of your business environment, no matter how simple or complex it is.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.