U.S.
undercover investigators among those exposed in data breach
Send a link to a friend
[August 23, 2014]
By Jim Finkle and Mark Hosenball
BOSTON/WASHINGTON (Reuters) - A cyber
attack at a firm that performs background checks for U.S. government
employees compromised data of at least 25,000 workers, including some
undercover investigators, and that number could rise, agency officials
said on Friday.
|
The breach at Falls Church, Virginia-based US Investigations
Services (USIS) exposed highly personal information of workers at
the Department of Homeland Security's headquarters as well as its
U.S. Immigration and Customs Enforcement and U.S. Customs and Border
Protection units, two officials familiar with the investigation into
the breach told Reuters.
Some employees have already received letters warning them about the
breach that say compromised information includes Social Security
numbers, education and criminal history, birth dates along with
information about spouses, other relatives and friends including
their names and addresses.
"Records including this data were exposed to unauthorized users
during the cybersecurity intrusion," according to a notification
letter obtained by Reuters. "We do not yet know whether the data was
actually taken."
One DHS official told Reuters the agency has identified some 25,000
employees whose information it believes were exposed in the breach.
"More could be notified in coming weeks as we learn more about the
breach," said the official, who asked not to be identified by name.
The company disclosed the attack earlier this month, but did not say
how many records had been compromised or which agencies were
affected. It did say the intrusion has "all the markings of a
state-sponsored attack."
While the number of employees affected is relatively small compared
to breaches at retailers such as Target Corp, which have affected
tens of millions of customers, security experts say the attack on
USIS is nonetheless quite serious.
Files on background checks contain highly sensitive data that
foreign intelligence agencies could attempt to exploit to intimidate
government workers with access to classified information.
[to top of second column] |
"They would be collecting this data to identify individuals who
might be vulnerable to extortion and recruitment," said Dmitri
Alperovitch, chief technology officer with cybersecurity firm
CrowdStrike, which sells intelligence on state-sponsored cyber
attacks.
The Department of Homeland Security has suspended all work with USIS
since the breach was disclosed and the FBI launched an
investigation.
USIS says it is the biggest commercial provider of background
investigations to the federal government, with over 5,700 employees,
and provides services in all U.S. states and territories, as well as
abroad.
Officials with USIS, which is a division of Altegrity Inc, could not
immediately be reached for comment.
A spokeswoman for Altegrity, which is majority owned by Providence
Equity Partners, declined to comment.
(Reporting by Jim Finkle in Boston; Additional reporting by Mark
Hosenball; Editing by Meredith Mazzilli, Leslie Adler and Tom Brown)
[© 2014 Thomson Reuters. All rights
reserved.] Copyright 2014 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
|