Attacks/Breaches
12/28/2012
04:07 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

SSNs, Salary Information Exposed In Breach Of Army Servers

'Unknown' attackers access databases of information on 36,000 people

Army officials have confirmed that cybercriminals obtained personal information of 36,000 people from multiple Army commands and visitors to the former Fort Monmouth base via a server hack.

The Army Communications-Electronics Command (CECOM) told The Asbury Park Press that the data breach "may have affected CECOM, C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) and nongovernmental personnel as well as persons who may have visited Fort Monmouth."

The Fort Monmouth facility was shuttered in September 2011, and the databases storing its information have since been managed by CECOM personnel based at the Aberdeen Proving Ground in Maryland, where CECOPM and C4ISR were relocated after the Fort Monmouth closing.

A CECOM spokesperson told the newspaper that, at the least, names and Social Security numbers were stolen, and that the databases also included birthplace, home addresses, and salary information.

In a Dec. 18 letter to victims whose data was exposed in the breach, CECOM commanding general Maj. Gen. Robert Ferrell said the hack was detected on Dec. 6 and that the breached databases were taken offline.

The databases included information from CECOM Software Engineering Center personnel files and from Fort Monmouth visitor logs, Ferrell said.

The Army's Cyber Command is overseeing the investigation into the breach, and the Army is offering victims free credit-monitoring service for one year. An Army spokesperson says the attack was waged by an "unknown" attacker and its purpose was also unknown.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0986
Published: 2015-05-26
Multiple stack-based buffer overflows in Moxa VPort ActiveX SDK Plus before 2.8 allow remote attackers to insert assembly-code lines via vectors involving a regkey (1) set or (2) get command.

CVE-2015-3808
Published: 2015-05-26
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

CVE-2015-3809
Published: 2015-05-26
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not properly track the current offset, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

CVE-2015-3810
Published: 2015-05-26
epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.

CVE-2015-3811
Published: 2015-05-26
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-...

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.