US Federal Court Court IT Systems Breached

The US Congress has warned the American public that the federal justice system’s public document management system was compromised in a cyber attack. This attack on the US justice system has caused major problems with their public document management system and this was revealed recently at a hearing on oversight of the Justice Department and the dept says it is now investigating this data breach. 

The Chairman of the House Judiciary Committee Jerold Nadler went on record to confirm that three hostile actors had gained access to the Court Electronic Records and Case Management systems. This means that the criminals and hackers may have had access to documents across the US court system.

Nadler said that the document system had suffered from a system security failure, leading to the breach. At the hearing, it was revealed that the breach was first discovered in March, but occurred in early 2020. The breach could affect civil and criminal litigation that is pending.

Head of the Dept. of Justice (DoJ) National Security Division told the committee that the incident was first discovered in March and is a "significant concern," but and added that DoJ  “working very closely with the judicial conference and judges around the country to address the issue.”

Congressional lawmakers demanded answers from the Administrative Office of the US Courts (AOUSC) and Senator Ron Wyden has accused the judiciary of failing to modernize. “I write to express serious concerns that the federal judiciary has hidden from the American public and many members of Congress the serious national security consequences of the courts’ failure to protect sensitive data to which they have been entrusted.” 

A spokesperson for the AOUSC has admitted that “the Judiciary faces a significant threat to our electronic case management system.” He added  that sensitive court documents would now be stored in a “secure stand-alone computer system” and not uploaded to the public document management system.  

Congress.Gov:    Bloomberg:    Reuters:   TEISS:      Oodaloop:    Dark ReadingPolitico:    

Infosecurity Magazine:    Politico:  

You Might Also Read:

Confidential US Court Documents Published On The Dark Web:

 

« Taiwan's Government Websites Attacked Just Before Pelosi’s Visit
Hot Competition To Build 5G In India »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

The RCMP Cybercrime Strategy sets out in an Operational Framework and Action Plan to combat cybercrime.

L J Kushner & Associates

L J Kushner & Associates

L.J. Kushner is a leading Information Security recruiting firm.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

ES2

ES2

ES2 is a consulting organisation specialising in Enterprise Security and Solutions Services.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

Symptai Consulting

Symptai Consulting

Symptai Consulting is a leading Cyber Security, Digital Transformation and Anti-Money Laundering firm serving the Caribbean and the wider world.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.

Business Communications Inc (BCI)

Business Communications Inc (BCI)

BCI is a leading technology company known for its exceptional team of experienced engineers with a focus on providing top-notch technology and security products and services.

RevEng.AI

RevEng.AI

RevEng.AI is designed to rigorously validate the integrity of software supply chains at a binary level, ensuring uncompromising security and trustworthiness in digital ecosystems.