Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

EXCLUSIVE: Signs of OPM Hack Turn Up at Another Federal Agency
NextGov ^ | June 22, 2015 | Aliya Sternstein

Posted on 06/23/2015 1:07:49 PM PDT by 2ndDivisionVet

The National Archives and Records Administration recently detected unauthorized activity on three desktops indicative of the same hack that extracted sensitive details on millions of current and former federal employees, government officials said Monday. The revelation suggests the breadth of one of the most damaging cyber assaults known is wider than officials have disclosed.

The National Archives' own intrusion-prevention technology successfully spotted the so-called indicators of compromise during a scan this spring, said a source involved in the investigation, who was not authorized to speak publicly about the incident. The discovery was made soon after the Department of Homeland Security's U.S. Computer Emergency Readiness Team published signs of the wider attack -- which targeted the Office of Personnel Management -- to look for at agencies, according to NARA.

It is unclear when NARA computers were breached. Suspected Chinese-sponsored cyberspies reportedly had been inside OPM's networks for a year before the agency discovered what happened in April. Subsequently, the government uncovered a related attack against OPM that mined biographical information on individuals who have filed background investigation forms to access classified secrets.

The National Archives has found no evidence intruders obtained "administrative access," or took control, of systems, but files were found in places they did not belong, the investigator said.

NARA "systems" and "applications" were not compromised, National Archives spokeswoman Laura Diachenko emphasized to Nextgov, “but we detected IOCs," indicators of compromise, "on three workstations, which were cleaned and re-imaged," or reinstalled.

"Other files found seemed to be legitimate," such as those from a Microsoft website, she said. "We have requested further guidance from US-CERT on how to deal with these" and are still awaiting guidance on how to proceed.

It will take additional forensics assessments to determine whether attackers ever "owned" the National Archives computers, the investigator said.

Diachenko said, "Continued analysis with our monitoring and forensic tools has not detected any activity associated with a hack," including alerts from the latest version of a governmentwide network-monitoring tool called EINSTEIN 3A.

EINSTEIN, like NARA's own intrusion-prevention tool, is now configured to detect the tell-tale signs of the OPM attack.

"OPM isn't the only agency getting probed by this group," said John Prisco, president of security provider Triumphant, the company that developed the National Archives’ tool. "It could be happening in lots of other agencies."

Prisco said he learned of the incident at a security industry conference June 9, from an agency official the company has worked with for years.

"They told us that they were really happy because we stopped the OPM attack in their agency," Prisco said.

The malicious operation tries to open up ports to the Internet, so it can excise information, Prisco said.

“It's doing exploration work laterally throughout the network and then it's looking for a way to communicate what it finds back to its server,” he added.

Homeland Security officials on Monday would not confirm or deny the situation at the National Archives. DHS spokesman S.Y. Lee referred to the department’s earlier statement about the OPM hack: “DHS has shared information regarding the potential incident with all federal chief information officers to ensure that all agencies have the knowledge they need to defend against this cybersecurity incident.”

The assault on OPM represents the seventh raid on national security-sensitive or federal personnel information over the past year.

Well-funded hackers penetrated systems at the State Department, the White House, U.S. Postal Service and, previously in March 2014, OPM. Intruders also broke into networks twice at KeyPoint Government Solutions, an OPM background check provider, and once at USIS, which conducted most of OPM's employee investigations until last summer.

On Wednesday, the House Oversight and Government Reform Committee is scheduled to hold a hearing on the OPM incident that, among other things, will examine the possibility that hackers got into the agency’s systems by using details taken from the contractors.


TOPICS: Computers/Internet; Conspiracy; Government
KEYWORDS: chinahackers; chinesehackers; databreach; hackers; identitytheft; nationalarchives; opmhacked; outsourcedtochina

1 posted on 06/23/2015 1:07:50 PM PDT by 2ndDivisionVet
[ Post Reply | Private Reply | View Replies]

To: 2ndDivisionVet

I’ve read...perhaps here, that the OPM had outsourced much of it’s IT work to either companies located in China or American companies that in turn would outsource to Asia. Do you know if this is true ? I’ve found that facts are the best way to defend my position with those that are of a liberal bent.


2 posted on 06/23/2015 1:38:46 PM PDT by rights with responsibilities (If you like your free speech, you can keep your free speech..if you're careful)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rights with responsibilities

Encryption “would not have helped” at OPM, says DHS official (Outsourced to China)
http://www.freerepublic.com/focus/f-news/3301335/posts


3 posted on 06/23/2015 1:39:59 PM PDT by 2ndDivisionVet (You can help: https://donate.tedcruz.org/c/FBTX0095/)
[ Post Reply | Private Reply | To 2 | View Replies]

To: 2ndDivisionVet

And yet they are still referring to it as “hacking”.


4 posted on 06/23/2015 1:52:15 PM PDT by wastoute (Government cannot redistribute wealth. Government can only redistribute poverty.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: wastoute

“And yet they are still referring to it as “hacking”.”

Exactly. This wasn’t hacking, they were given complete and total access. This is just like the Sony “hacking” whereby a Sony employee gave someone else complete and total access.


5 posted on 06/23/2015 1:54:46 PM PDT by CodeToad (Islam should be outlawed and treated as a criminal enterprise!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: rights with responsibilities

Yes, for the OPM at least.
They gave Chinese nationals in China root level access for system maintenance tasks.
They probably put the malware on the system at that time.

The OPM Data Breach – What To Do Now and In the Future to Protect Ourselves
http://tamarawilhite.hubpages.com/hub/The-OPM-Data-Breach-What-To-Do-Now-and-In-the-Future-to-Protect-Ourselves


6 posted on 06/23/2015 6:33:16 PM PDT by tbw2
[ Post Reply | Private Reply | To 2 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson