Submit your comments on this article |
Cyber |
U.S. Marshals suffer 'major' hack that compromised sensitive materials |
2023-03-01 |
Was WITPRO in the "data exfiltration event"? [JustTheNews] The United States Marshals Service on Monday announced that it had been hacked roughly one week ago and that the perpetrators had compromised sensitive information. USMS personnel confirmed that the Feb. 17 hacking event accessed a stand-alone system, which was subsequently disconnected from the network following a "ransomware and data exfiltration event." "The affected system contains law enforcement sensitive information, including returns from legal process, administrative information, and personally identifiable information pertaining to subjects of USMS investigations, third parties, and certain USMS employees," USMS spokesperson Drew Wade said, according to NBC News. USMS has not yet identified a responsible party and an investigation remains ongoing. U.S. Military Email Server Was Exposed for Two Weeks From a week ago, but still pertinent for those in or near anyone affected, or those who care about those affected. Note that this one was USSOC, not the Marshals, and it was a mistake, not a hack. [PJMEDIA] On Tuesday, a top U.S. defense official verified to Fox News that a Department of Defense email server was left exposed for two weeks and that, as a result, internal emails were accessible without a password.The exposed server was allegedly the result of a misconfiguration. Anyone who knew what the server’s IP address was could access the emails with a web browser. “The server contained around three terabytes of military emails, with many related to the U.S. Special Operations Command, which is a military unit which conducts special operations,” Fox News reports. The emails on the server went back several years and contained personal information. TechCrunch reportedly discovered the vulnerability and reached out to the Pentagon about it. The server was secured within a day of TechCrunch alerting the Pentagon to the issue. According to U.S. Special Operations Command spokesperson Ken McGraw, there is no evidence that the server was hacked. “We can confirm at this point is no one hacked U.S. Special Operations Command’s information systems,” he told TechCrunch in a statement. |
Posted by:Skidmark |
#3 ^^^ |
Posted by: Abu Uluque 2023-03-01 14:11 |
#2 Deep State IT Secured by the Best Pakistani H1B1 Visa Staff Joe Biden Can Find. |
Posted by: Mad Eye Omeretch7959 2023-03-01 06:46 |
#1 internal emails were accessible without a password “We can confirm at this point is no one hacked U.S. Special Operations Command’s information systems” Uhm...guess a hack wasn't required. |
Posted by: Skidmark 2023-03-01 00:19 |