US Federal Court Court IT Systems Breached

The US Congress has warned the American public that the federal justice system’s public document management system was compromised in a cyber attack. This attack on the US justice system has caused major problems with their public document management system and this was revealed recently at a hearing on oversight of the Justice Department and the dept says it is now investigating this data breach. 

The Chairman of the House Judiciary Committee Jerold Nadler went on record to confirm that three hostile actors had gained access to the Court Electronic Records and Case Management systems. This means that the criminals and hackers may have had access to documents across the US court system.

Nadler said that the document system had suffered from a system security failure, leading to the breach. At the hearing, it was revealed that the breach was first discovered in March, but occurred in early 2020. The breach could affect civil and criminal litigation that is pending.

Head of the Dept. of Justice (DoJ) National Security Division told the committee that the incident was first discovered in March and is a "significant concern," but and added that DoJ  “working very closely with the judicial conference and judges around the country to address the issue.”

Congressional lawmakers demanded answers from the Administrative Office of the US Courts (AOUSC) and Senator Ron Wyden has accused the judiciary of failing to modernize. “I write to express serious concerns that the federal judiciary has hidden from the American public and many members of Congress the serious national security consequences of the courts’ failure to protect sensitive data to which they have been entrusted.” 

A spokesperson for the AOUSC has admitted that “the Judiciary faces a significant threat to our electronic case management system.” He added  that sensitive court documents would now be stored in a “secure stand-alone computer system” and not uploaded to the public document management system.  

Congress.Gov:    Bloomberg:    Reuters:   TEISS:      Oodaloop:    Dark ReadingPolitico:    

Infosecurity Magazine:    Politico:  

You Might Also Read:

Confidential US Court Documents Published On The Dark Web:

 

« Taiwan's Government Websites Attacked Just Before Pelosi’s Visit
Hot Competition To Build 5G In India »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

SideChannel

SideChannel

At SideChannel, we match companies with an expert virtual CISO (vCISO), so your organization can assess cyber risk and ensure cybersecurity compliance.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.

Fernao Group

Fernao Group

Fernao offer you all solutions from a single source - from cyber security, business resilience and digital infrastructure to cloud technologies and pentesting.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.

Two Candlesticks

Two Candlesticks

Two Candlesticks is a global cybersecurity service provider delivering high level consultancy, strategy, and frameworks to governments, regulators and midsized companies.

CyberMindr

CyberMindr

CyberMindr is a SaaS platform for Automated & Continuous Attack Path and Threat Exposure Discovery helps you to proactively identify & assess your attack surface to mitigate associated threats.