• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • December 13th, 2019
  • Home
  • About Us
  • Team
  • Advertise
  • Submit News
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Google+
    • Linkedin
    • Youtube
Home » Security » Private Details of 240,000 DHS Employees Accessed after Data Breach

Private Details of 240,000 DHS Employees Accessed after Data Breach

January 4th, 2018 Uzair Amir Leaks, Security 0 comments
Private Details of 240,000 DHS Employees Accessed after Data Breach
Share on FacebookShare on Twitter

A data breach targeted towards the Department of Homeland Security (DHS) has resulted in the exposure of personally identifiable information of over 240,000 DHS employees (247,167 to be precise) including both current and former personnel.

Reportedly, the DHS Office of the Inspector General (OIG) Case Management System was accessed and data belonging to individuals linked with previous investigations by the department was obtained. The breach occurred in 2014 while affected individuals were employed by the DHS in 2014. The investigations were carried out by the OIG between 2002 and 2014.

More: Misconfigured Amazon S3 Buckets Exposed US Military’s Social Media Spying Campaign

As per the details provided by the agency, the data breach is not a result of a cyber-attack or malicious activity but documents that were in possession of a former OIG employee was discovered by threat actors. The former OIG employee’s identity hasn’t been revealed by the department as yet and the criminal investigation’s direction is also being kept under wraps. The breach was identified on 10 May 2017.

In a statement issued by the DHS on Wednesday, it was noted that affected individuals have been notified of the data breach, which the department referred to as a “privacy incident.” Furthermore, it was revealed that according to the evidence, the affected individuals’ private data was not the “primary target.”

Information leaked by the data breach includes names, dates of birth, Social Security numbers, duty stations, positions, and grades. It took the department seven months’ time to notify the affected employees primarily because of the complexity of the issue since the data was connected to an on-going criminal investigation.

“May through November 2017, DHS conducted a thorough privacy investigation, extensive forensic analysis of the compromised data, an in-depth assessment of the risk to affected individuals, and comprehensive technical evaluations of the data elements exposed.”

Moreover, DHS revealed that not just private data of its employees, extensive details about the investigations carried out by the department have become vulnerable. The details include information about the “subjects, witnesses and complainants” that include both DHS and non-DHS employees.

The department also noted that personal information from the investigation contains varying records about individuals since every case required a different set of evidence, interviews, and documentation. The data, however, does not include information about spouses or family members of the employees.

At the time the breach occurred, retired USMC General John F. Kelly was DHS chief and now he is serving as chief of staff for President Donald Trump while Trump’s ex-deputy chief Kirstjen Nielsen took the position of DHS last month.

More: Unprotected S3 Cloud Bucket Exposed 100GB of Classified NSA Data

  • Tags
  • breach
  • DHS
  • hacking
  • internet
  • LEAKS
  • Military
  • Privacy
  • security
  • USA
Facebook Twitter Google+ LinkedIn Pinterest
Previous article New Android Malware Disguised as Uber App
Next article Meltdown and Spectre Flaws Collateral Damage to OS & Cloud Services Unavoidable
Uzair Amir

Uzair Amir

I am an Electronic Engineer, an Android Game Developer and a Tech writer. I am into music, snooker and my life motto is 'Do my best, so that I can't blame myself for anything.'

Related Posts
"The Smartest Lock Ever” KeyWe is Vulnerable to Hacking

"The Smartest Lock Ever” KeyWe is Vulnerable to Hacking

Plundervolt: A new attack on Intel processors threatening SGX data

Plundervolt: A new attack on Intel processors threatening SGX data

2.7 billion email addresses & plain-text passwords exposed online

2.7 billion email addresses & plain-text passwords exposed online

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

LATEST POSTS
NGINX office in Moscow raided by police
Cyber Events

NGINX office in Moscow raided by police

428
How to identify malware on your phone with these 7 signs
How To

How to identify malware on your phone with these 7 signs

425
"The Smartest Lock Ever” KeyWe is Vulnerable to Hacking
Security

"The Smartest Lock Ever” KeyWe is Vulnerable to Hacking

171
Plundervolt: A new attack on Intel processors threatening SGX data
Security

Plundervolt: A new attack on Intel processors threatening SGX data

421

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us