US Federal Court Court IT Systems Breached

The US Congress has warned the American public that the federal justice system’s public document management system was compromised in a cyber attack. This attack on the US justice system has caused major problems with their public document management system and this was revealed recently at a hearing on oversight of the Justice Department and the dept says it is now investigating this data breach. 

The Chairman of the House Judiciary Committee Jerold Nadler went on record to confirm that three hostile actors had gained access to the Court Electronic Records and Case Management systems. This means that the criminals and hackers may have had access to documents across the US court system.

Nadler said that the document system had suffered from a system security failure, leading to the breach. At the hearing, it was revealed that the breach was first discovered in March, but occurred in early 2020. The breach could affect civil and criminal litigation that is pending.

Head of the Dept. of Justice (DoJ) National Security Division told the committee that the incident was first discovered in March and is a "significant concern," but and added that DoJ  “working very closely with the judicial conference and judges around the country to address the issue.”

Congressional lawmakers demanded answers from the Administrative Office of the US Courts (AOUSC) and Senator Ron Wyden has accused the judiciary of failing to modernize. “I write to express serious concerns that the federal judiciary has hidden from the American public and many members of Congress the serious national security consequences of the courts’ failure to protect sensitive data to which they have been entrusted.” 

A spokesperson for the AOUSC has admitted that “the Judiciary faces a significant threat to our electronic case management system.” He added  that sensitive court documents would now be stored in a “secure stand-alone computer system” and not uploaded to the public document management system.  

Congress.Gov:    Bloomberg:    Reuters:   TEISS:      Oodaloop:    Dark ReadingPolitico:    

Infosecurity Magazine:    Politico:  

You Might Also Read:

Confidential US Court Documents Published On The Dark Web:

 

« Taiwan's Government Websites Attacked Just Before Pelosi’s Visit
Hot Competition To Build 5G In India »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

APrivacy

APrivacy

APrivacy provides information and communication security products for the financial services industry.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Shield Capital

Shield Capital

Shield Capital helps founders build frontier solutions in cybersecurity, artificial intelligence, space & autonomy for commercial and government enterprises.

Superus Careers - Cyber Career Exchange

Superus Careers - Cyber Career Exchange

The Cyber Career Exchange is a specialized recruiting platform focused specifically on cybersecurity.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

National Centre for Digital Security (CNSD) - Peru

National Centre for Digital Security (CNSD) - Peru

The National Center for Digital Security manages and supervises the operation of Digital Security in Peru in order to strengthen digital trust.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

Cloud Native Computing Foundation (CNCF)

Cloud Native Computing Foundation (CNCF)

CNCF seeks to drive adoption of cloud native technologies by fostering and sustaining an ecosystem of open source, vendor-neutral projects.