Rantburg

Today's Front Page   View All of Thu 05/16/2024 View Wed 05/15/2024 View Tue 05/14/2024 View Mon 05/13/2024 View Sun 05/12/2024 View Sat 05/11/2024 View Fri 05/10/2024
2023-03-01 Cyber
U.S. Marshals suffer 'major' hack that compromised sensitive materials
Was WITPRO in the "data exfiltration event"?
[JustTheNews] The United States Marshals Service on Monday announced that it had been hacked roughly one week ago and that the perpetrators had compromised sensitive information.

USMS personnel confirmed that the Feb. 17 hacking event accessed a stand-alone system, which was subsequently disconnected from the network following a "ransomware and data exfiltration event."

"The affected system contains law enforcement sensitive information, including returns from legal process, administrative information, and personally identifiable information pertaining to subjects of USMS investigations, third parties, and certain USMS employees," USMS spokesperson Drew Wade said, according to NBC News.

USMS has not yet identified a responsible party and an investigation remains ongoing.

U.S. Military Email Server Was Exposed for Two Weeks
From a week ago, but still pertinent for those in or near anyone affected, or those who care about those affected. Note that this one was USSOC, not the Marshals, and it was a mistake, not a hack.
[PJMEDIA] On Tuesday, a top U.S. defense official verified to Fox News that a Department of Defense email server was left exposed for two weeks and that, as a result, internal emails were accessible without a password.

The exposed server was allegedly the result of a misconfiguration. Anyone who knew what the server’s IP address was could access the emails with a web browser.

“The server contained around three terabytes of military emails, with many related to the U.S. Special Operations Command, which is a military unit which conducts special operations,” Fox News reports. The emails on the server went back several years and contained personal information.

TechCrunch reportedly discovered the vulnerability and reached out to the Pentagon about it. The server was secured within a day of TechCrunch alerting the Pentagon to the issue.

According to U.S. Special Operations Command spokesperson Ken McGraw, there is no evidence that the server was hacked. “We can confirm at this point is no one hacked U.S. Special Operations Command’s information systems,” he told TechCrunch in a statement.
Posted by Skidmark 2023-03-01 00:00|| || Front Page|| [11 views ]  Top

#1 internal emails were accessible without a password

“We can confirm at this point is no one hacked U.S. Special Operations Command’s information systems”

Uhm...guess a hack wasn't required.
Posted by Skidmark 2023-03-01 00:19||   2023-03-01 00:19|| Front Page Top

#2 Deep State IT Secured by the Best Pakistani H1B1 Visa Staff Joe Biden Can Find.
Posted by Mad Eye Omeretch7959 2023-03-01 06:46||   2023-03-01 06:46|| Front Page Top

#3  ^^^
Posted by Abu Uluque 2023-03-01 14:11||   2023-03-01 14:11|| Front Page Top

20:17 Raj
19:44 ed in texas
19:39 ed in texas
19:37 ed in texas
19:16 SteveS
19:02 Ululating Platypus
18:54 Ululating Platypus
18:50 Frank G
18:49 Frank G
18:49 Ululating Platypus
18:48 Frank G
18:24 Lord Garth
17:52 NN2N1
17:22 Bobby
17:00 swksvolFF
16:52 swksvolFF
16:46 swksvolFF
16:42 swksvolFF
16:41 Super Hose
16:40 Skidmark
16:38 Super Hose
16:19 Super Hose
16:05 jpal
16:04 MikeKozlowski









Paypal:
Google
Search WWW Search rantburg.com