Information
Equipo Nizkor
        Bookshop | Donate
Derechos | Equipo Nizkor       

04Jun15


Chinese breach data of 4 million federal workers


Hackers working for the Chinese state breached the computer system of the Office of Personnel Management in December, U.S. officials said Thursday, and the agency will notify about 4 million current and former federal employees that their personal data may have been compromised.

The hack was the largest breach of federal employee data in recent years. It was the second major intrusion of the same agency by China in less than a year and the second significant foreign breach into U.S. government networks in recent months. Russia last year compromised White House and State Department e-mail systems in a campaign of cyber-espionage.

The OPM, using new tools, discovered the breach in April, according to officials at the agency who declined to discuss who was behind the hack.

Other U.S. officials, who spoke on the condition of anonymity, citing the ongoing investigation, identified the hackers as being state-sponsored.

The intruders gained access to information that included employees' Social Security numbers, job assignments, performance ratings and training information, agency officials said. No direct-deposit data was exposed, officials said. They could not say for certain what data was taken, only what the hackers gained access to.

"Certainly, OPM is a high-value target," OPM Chief Information Officer Donna Seymour said in an interview. "We have a lot of information about people, and that is something that our adversaries want."

The personal information exposed could be useful in crafting "spear-phishing" e-mails, which are designed to fool recipients into opening a link or an attachment so that the hacker can gain access to computer systems. Using the stolen OPM data, for instance, a hacker might send a fake e-mail purporting to be from a colleague at work.

After the earlier breach discovered in March 2014, the OPM undertook "an aggressive effort to update our cybersecurity posture, adding numerous tools and capabilities to our networks," Seymour said. "As a result of adding these tools, we were able to detect this intrusion into our networks."

"Protecting our federal employee data from malicious cyber incidents is of the highest priority at OPM," the agency's director, Katherine Archuleta, said in a statement.

In the current incident, the hackers targeted an OPM data center housed at the Interior Department. The database did not contain information on background investigations or employees applying for security clearances, officials said.

By contrast, in March 2014, OPM officials discovered that hackers had breached an OPM system that manages sensitive data on federal employees applying for clearances. That often includes financial data, information about family and other sensitive details. That breach, too, was attributed to China, other officials said.

OPM officials declined to comment on whether the data affected in this incident was encrypted or had sensitive details masked. They said it appeared that the intruders are no longer in the system.

"There is no current activity," an official said. But Chinese hackers frequently try repeat intrusions.

Seymour said the agency is working to better protect the data stored in its servers throughout the government, including by using data masking or redaction. "We've purchased tools to be able to implement that capability for all" the data, she said.

Among the steps taken to protect the network, the OPM restricted remote access to the network by system administrators, officials said.

When the OPM discovered the breach, it notified the FBI and Department of Homeland Security.

A senior DHS official, who spoke on the condition of anonymity because of the ongoing investigation, said the "good news" is that the OPM discovered the breach using the new tools. "These things are going to keep happening, and we're going to see more and more because our detection techniques are improving," the official said.

FBI spokesman Josh Campbell said his agency is working with DHS and OPM officials to investigate the incident. "We take all potential threats to public- and private-sector systems seriously and will continue to investigate and hold accountable those who pose a threat in cyberspace," he said.

The intruders used a "zero-day" -- a previously unknown cyber-tool -- to take advantage of a vulnerability that allowed the intruders to gain access into the system.

China is one of the most aggressive nations targeting U.S. and other Western states' networks. In May 2014, the United States announced the indictments of five Chinese military officials for economic cyberespionage -- hacking into the computers of major steel and other companies and stealing plans, sensitive negotiating details and other information.

"China is everywhere," said Austin Berglas, head of cyber investigations at K2 Intelligence and a former top cyber official at the FBI's New York field office. "They're looking to gain social and economic and political advantage over the United States in any way they can. The easiest way to do that is through theft of intellectual property and theft of sensitive information."

Adam B. Schiff (Calif.), ranking Democrat on the House Intelligence Committee, said the past few months have seen a massive series of data breaches affecting millions of Americans.

"This latest intrusion .?.?. is among the most shocking because Americans may expect that federal computer networks are maintained with state-of-the-art defenses," he said. "The cyberthreat from hackers, criminals, terrorists and state actors is one of the greatest challenges we face on a daily basis, and it's clear that a substantial improvement in our cyber-databases and defenses is perilously overdue."

The president of the nation's second-largest federal worker union, the National Treasury Employees Union, said the union "is very concerned" about the breach. "Data security, particularly in an era of rising incidence of identity theft, is a critically important matter," President Colleen M. Kelley said.

"It is vital to know as soon as possible the extent to which, if any, personal information may have been obtained so that affected employees can be notified promptly and encouraged to take all possible steps to protect themselves from financial or other risks," she said.

[Source: By Ellen Nakashima, The Washington Post, 04Jun15]

Bookshop Donate Radio Nizkor

Privacy and counterintelligence
small logoThis document has been published on 08Jun15 by the Equipo Nizkor and Derechos Human Rights. In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.