U.S. National Archives Finds Same Malware That Stole Government Personnel Data

In the wake of the discovery of malware on the network of the Office of Personnel Management (OPM), the National Archives and Records Administration discovered three desktop computers that had been infected with the same remote access malware. The malware was detected by the National Archives’ own intrusion detection system after receiving signature data from the Department of Homeland Security, according to a report by NextGov.

Comment: I must say I am not surprised that the malware was found at NARA. In fact, I might have been more surprised if it was NOT found.

I wrote earlier about that malware on the Privacy Blog at http://goo.gl/bnMHBr and at http://goo.gl/Pz9U6z.

The same malware is appearing on all sorts of government computers. The problem has now been found at NARA. I suspect if anyone performs the correct search, it will be found in computers at most all U.S. government agencies.

Sadly, the entire problem could have easily been avoided by encrypting the information. This is another example of your government NOT at work. I won’t single out NARA alone. The problem exists throughout all, or most all, the U.S. government agencies.

5 Comments

Daniel M Littley Jr June 25, 2015 at 2:38 am

From the Wall Street Journal – “Obama administration officials defined the hack of Office of Personnel Management employee documents as two distinct breaches, a decision that allowed officials to initially deny millions of the government’s most sensitive employee-security records had been stolen, according to officials familiar with the matter.”

The cover-up has started. Incompetence at all levels accompanied by a “cover your butt” mentality does nothing to resolve the problem or prevent more occurrences. No accountability and no honesty.

Like

“Recorded Future identified the possible exposures of login credentials for 47 United States government agencies across 89 unique domains.
“As of early 2015, 12 of these agencies, including the Departments of State and Energy, allowed some of their users access to computer networks with no form of two-factor authentication. The presence of these credentials on the open Web leaves these agencies vulnerable to espionage, socially engineered attacks, and tailored spear-phishing attacks against their workforce.
[read more]
http://wraltechwire.com/cia-backed-tech-company-finds-stolen-government-log-ins-all-over-web-/14735868/

Like

No wonder Hillary Clinton wanted to use her own private server!

Like

As a retired government employee, I understand the problems of agencies trying to deal with web security. The agency where I worked faced funding cuts every year of my career. Computer equipment was old when we acquired it, operating programs were cobbled together in different systems that only worked part time and never truly meshed, IT workers were simply moved from the general employee population, with no additional training, to work as ‘computer specialists’. Agency wide security was installed on a lowest bid protocol. This was all part of the drive to “starve the government” so the work of agencies could be privatized by for-profit corporations.
This is the result of that political agenda. Government agencies collect private information about us so we can do business with them, and that information is not protected.

Like

Carol JR, you hit the nail on the head. Thank you for the experienced comment. Without funds, educated personel, and state of the art equipment, it is like trying to defend the nation with water baloons and squirt guns. But we buy state of the art defence weapons and leave our security up to 1980 standards. I am so confused about this mentality.

Like

Leave a Reply

Name and email address are required. Your email address will not be published.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <pre> <q cite=""> <s> <strike> <strong> 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: