SSNs, Salary Information Exposed In Breach Of Army Servers
'Unknown' attackers access databases of information on 36,000 people
Army officials have confirmed that cybercriminals obtained personal information of 36,000 people from multiple Army commands and visitors to the former Fort Monmouth base via a server hack.
The Army Communications-Electronics Command (CECOM) told The Asbury Park Press that the data breach "may have affected CECOM, C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) and nongovernmental personnel as well as persons who may have visited Fort Monmouth."
More Security Insights
- The 12 Critical Questions You Need To Ask When Choosing an AD Bridge Solution
- A New Set of Network Security Challenges
The Fort Monmouth facility was shuttered in September 2011, and the databases storing its information have since been managed by CECOM personnel based at the Aberdeen Proving Ground in Maryland, where CECOPM and C4ISR were relocated after the Fort Monmouth closing.
A CECOM spokesperson told the newspaper that, at the least, names and Social Security numbers were stolen, and that the databases also included birthplace, home addresses, and salary information.
In a Dec. 18 letter to victims whose data was exposed in the breach, CECOM commanding general Maj. Gen. Robert Ferrell said the hack was detected on Dec. 6 and that the breached databases were taken offline.
The databases included information from CECOM Software Engineering Center personnel files and from Fort Monmouth visitor logs, Ferrell said.
The Army's Cyber Command is overseeing the investigation into the breach, and the Army is offering victims free credit-monitoring service for one year. An Army spokesperson says the attack was waged by an "unknown" attacker and its purpose was also unknown.
Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.