Second Hack of US Federal Records

580x391
 
As many as 14 million current and former civilian US government employees had their personal information exposed to hackers, according to two people who were briefed on the investigation. 
 
This represents a far higher figure than the 4 million the Obama administration initially disclosed and coming amid an apparent second cyber breach that officials said was linked to China.
 
The newer estimates put the number of compromised records at between 9 million and 14 million going back to the 1980s, said one congressional official and one former US official, who spoke to the Associated Press on condition of anonymity because information disclosed in the confidential briefings includes classified details of the investigation.
 
There are about 4.2 million federal employees, so the majority of the records exposed relate to former employees. Contractor information also has been stolen, officials said.
 
The latest revelation came a day after a major union said the cyber theft is more damaging than it first appeared, asserting that hackers stole personnel data and social security numbers for all the federal workers in a central personnel database.
Several US officials also said hackers linked to China appear to have gained access to sensitive background information submitted by intelligence and military personnel seeking security clearances. The break is the second digital breach of federal records revealed in a week and could dramatically compound the potential damage.
 
The forms believed accessed, known as Standard Form 86, require applicants to fill out deeply personal information about mental illnesses, drug and alcohol use, past arrests and bankruptcies. They also require the listing of contacts and relatives, potentially exposing any foreign relatives of US intelligence employees to coercion. The applicant’s social security number and that of his or her cohabitant are required.
 
Regarding the new user total affected by the main breach, the Obama administration had acknowledged that up to 4 million current and former employees whose information resides in the Office of Personnel Management (OPM)s server are affected by the December cyber breach, but it had been vague about exactly what was taken. But J David Cox, president of the American Federation of Government Employees, said in a letter Thursday to OPM director Katherine Archuleta that based on incomplete information OPM provided to the union, “we believe that the Central Personnel Data File was the targeted database, and that the hackers are now in possession of all personnel data for every federal employee, every federal retiree, and up to 1 million former federal employees”.
 
The OPM data file contains the records of most federal civilian employees, though not members of Congress and their staffs, members of the military or staff of the intelligence agencies.
 
The union believes the hackers stole military records and veterans’ status information, address, birth date, job and pay history, health insurance, life insurance and pension information, and age, gender and race data, he said.
Senate Democrat leader Harry Reid said that the hack was carried out by “the Chinese” without specifying whether he meant the Chinese government or individuals. Reid is one of eight lawmakers briefed on the most secret intelligence information. US officials have declined to publicly blame China, which has denied involvement.
 
 “We believe that social security numbers were not encrypted, a cybersecurity failure that is absolutely indefensible and outrageous,” Cox said in the letter. 
 
Schumach addressed Cox’s comment on encryption. “Though data encryption is a valuable protection method, today’s adversaries are sophisticated enough that encryption alone does not guarantee protection,” he said. “OPM does utilize encryption in some instances and is currently increasing the types of methods utilized to encrypt data.”
The central personnel data file contains up to 780 separate pieces of information about an employee.
 
Cox complained in the letter that, “very little substantive information has been shared with us, despite the fact that we represent more than 670,000 federal employees in departments and agencies throughout the executive branch”.
The union’s release and Reid’s comment in the Senate put into sharper focus what is looking like a massive cyber espionage success by China. Republican senator Susan Collins, an intelligence committee member, has also said the hack came from China.
 
Mike Rogers, the former chairman of the House intelligence committee, said last week that Chinese intelligence agencies have for some time been seeking to assemble a database of information about Americans. Those personal details can be used for blackmail, or also to shape bogus emails designed to appear legitimate while injecting spyware on the networks of government agencies or businesses Chinese hackers are trying to penetrate.
 
US intelligence officials say China, like the US, spies for national security advantage. Unlike the US, they say, China also engages in large-scale theft of corporate secrets for the benefit of state-sponsored enterprises that compete with Western companies. Nearly every major US Company has been hacked from China, they say.
 
Chinese government-backed computer hackers repeatedly breached the networks of US military contractors including airline, shipping and technology firms involved in the movement of soldiers and equipment, an investigation by the US Senate has found.
 
Released by the Senate Armed Services Committee following a year of investigation, the report suggests there were 20 infiltrations into networks of military contractors between June 2012 and May 2013. The information accessed included details about military strategy and logistics, which could be used to disrupt US forces operations.
 
The Senate investigation also suggests poor practice surrounding reporting requirements within the US government is at least partially responsible for the authorities remaining unaware that the computer networks of their contractors had been compromised.
 
Speaking at the launch of the report, Carl Levin, Democratic Senator of Michigan and chairman of the Senate Armed Services Committee, suggested it is still impossible to know if hackers from China or elsewhere are currently accessing US networks.
 
Levin also warned that the report provides clear evidence that Chinese authorities are actively attempting to engage in cyber-espionage.
 
However, Geng Shuang, spokesman for the Chinese embassy in Washington, questioned the findings of the Senate's report, insisting that China isn't involved in any sort of cyber-espionage. "Judging from past experience, those kinds of reports and allegations are usually based on fabricated facts and groundless," Shuang said.
 
Guardian:         Ein News
 
« The Brave New World of Cybersecurity
MI6: Snowden Files Hacked to Find Western Spies »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

CyRise

CyRise

CyRise is a venture accelerator focused squarely on early stage cyber security startups.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

Raxis

Raxis

Raxis is a cybersecurity company that hacks into computer networks and physical structures to perform penetration tests, assessing corporate vulnerability to real-world threats.

Oxford Internet Institute - University of Oxford

Oxford Internet Institute - University of Oxford

The Oxford Internet Institute is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

Central Intelligence Agency (CIA) - USA

Central Intelligence Agency (CIA) - USA

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.

Coalition for Secure AI (CoSAI)

Coalition for Secure AI (CoSAI)

CoSAI is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating on AI security research.

Cyberhill Partners

Cyberhill Partners

Cyberhill is a professional engineering services firm solving complex software implementation and integration challenges.

RealmOne

RealmOne

RealmOne addresses the most challenging issues in the realms of defense and cyberspace, adapting to the continuously changing demands of our national security customers.