Second Hack of US Federal Records

580x391
 
As many as 14 million current and former civilian US government employees had their personal information exposed to hackers, according to two people who were briefed on the investigation. 
 
This represents a far higher figure than the 4 million the Obama administration initially disclosed and coming amid an apparent second cyber breach that officials said was linked to China.
 
The newer estimates put the number of compromised records at between 9 million and 14 million going back to the 1980s, said one congressional official and one former US official, who spoke to the Associated Press on condition of anonymity because information disclosed in the confidential briefings includes classified details of the investigation.
 
There are about 4.2 million federal employees, so the majority of the records exposed relate to former employees. Contractor information also has been stolen, officials said.
 
The latest revelation came a day after a major union said the cyber theft is more damaging than it first appeared, asserting that hackers stole personnel data and social security numbers for all the federal workers in a central personnel database.
Several US officials also said hackers linked to China appear to have gained access to sensitive background information submitted by intelligence and military personnel seeking security clearances. The break is the second digital breach of federal records revealed in a week and could dramatically compound the potential damage.
 
The forms believed accessed, known as Standard Form 86, require applicants to fill out deeply personal information about mental illnesses, drug and alcohol use, past arrests and bankruptcies. They also require the listing of contacts and relatives, potentially exposing any foreign relatives of US intelligence employees to coercion. The applicant’s social security number and that of his or her cohabitant are required.
 
Regarding the new user total affected by the main breach, the Obama administration had acknowledged that up to 4 million current and former employees whose information resides in the Office of Personnel Management (OPM)s server are affected by the December cyber breach, but it had been vague about exactly what was taken. But J David Cox, president of the American Federation of Government Employees, said in a letter Thursday to OPM director Katherine Archuleta that based on incomplete information OPM provided to the union, “we believe that the Central Personnel Data File was the targeted database, and that the hackers are now in possession of all personnel data for every federal employee, every federal retiree, and up to 1 million former federal employees”.
 
The OPM data file contains the records of most federal civilian employees, though not members of Congress and their staffs, members of the military or staff of the intelligence agencies.
 
The union believes the hackers stole military records and veterans’ status information, address, birth date, job and pay history, health insurance, life insurance and pension information, and age, gender and race data, he said.
Senate Democrat leader Harry Reid said that the hack was carried out by “the Chinese” without specifying whether he meant the Chinese government or individuals. Reid is one of eight lawmakers briefed on the most secret intelligence information. US officials have declined to publicly blame China, which has denied involvement.
 
 “We believe that social security numbers were not encrypted, a cybersecurity failure that is absolutely indefensible and outrageous,” Cox said in the letter. 
 
Schumach addressed Cox’s comment on encryption. “Though data encryption is a valuable protection method, today’s adversaries are sophisticated enough that encryption alone does not guarantee protection,” he said. “OPM does utilize encryption in some instances and is currently increasing the types of methods utilized to encrypt data.”
The central personnel data file contains up to 780 separate pieces of information about an employee.
 
Cox complained in the letter that, “very little substantive information has been shared with us, despite the fact that we represent more than 670,000 federal employees in departments and agencies throughout the executive branch”.
The union’s release and Reid’s comment in the Senate put into sharper focus what is looking like a massive cyber espionage success by China. Republican senator Susan Collins, an intelligence committee member, has also said the hack came from China.
 
Mike Rogers, the former chairman of the House intelligence committee, said last week that Chinese intelligence agencies have for some time been seeking to assemble a database of information about Americans. Those personal details can be used for blackmail, or also to shape bogus emails designed to appear legitimate while injecting spyware on the networks of government agencies or businesses Chinese hackers are trying to penetrate.
 
US intelligence officials say China, like the US, spies for national security advantage. Unlike the US, they say, China also engages in large-scale theft of corporate secrets for the benefit of state-sponsored enterprises that compete with Western companies. Nearly every major US Company has been hacked from China, they say.
 
Chinese government-backed computer hackers repeatedly breached the networks of US military contractors including airline, shipping and technology firms involved in the movement of soldiers and equipment, an investigation by the US Senate has found.
 
Released by the Senate Armed Services Committee following a year of investigation, the report suggests there were 20 infiltrations into networks of military contractors between June 2012 and May 2013. The information accessed included details about military strategy and logistics, which could be used to disrupt US forces operations.
 
The Senate investigation also suggests poor practice surrounding reporting requirements within the US government is at least partially responsible for the authorities remaining unaware that the computer networks of their contractors had been compromised.
 
Speaking at the launch of the report, Carl Levin, Democratic Senator of Michigan and chairman of the Senate Armed Services Committee, suggested it is still impossible to know if hackers from China or elsewhere are currently accessing US networks.
 
Levin also warned that the report provides clear evidence that Chinese authorities are actively attempting to engage in cyber-espionage.
 
However, Geng Shuang, spokesman for the Chinese embassy in Washington, questioned the findings of the Senate's report, insisting that China isn't involved in any sort of cyber-espionage. "Judging from past experience, those kinds of reports and allegations are usually based on fabricated facts and groundless," Shuang said.
 
Guardian:         Ein News
 
« The Brave New World of Cybersecurity
MI6: Snowden Files Hacked to Find Western Spies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Business Intelligence Associates (BIA)

Business Intelligence Associates (BIA)

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

PlaxidityX

PlaxidityX

PlaxidityX (formerly Argus Cyber Security) is a global leader in mobility cyber security, provides DevSecOps, vehicle protection and fleet protection technologies and services.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

SphereX Technologies

SphereX Technologies

SphereX is the first on-chain security solution for Web3 applications.

Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat Exchange (CCTX)

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.