Attacks/Breaches
2/5/2013
06:12 PM
50%
50%

U.S. Energy Department Hack Exposes Employee, Contractor Information

No classified data was compromised, but the attack is believed to have affected several hundred people

Hackers hit the U.S. Department of Energy (DOE) in mid-January and accessed personal information belonging to possibly hundreds of employees and contractors, according to an internal DOE email.

The email circulated Friday and was reported Monday after The Washington Free Beacon broke the story. The revelation came on the heels of reports that several news organizations had been targeted in cyber-attacks as part of an espionage campaign reputed to have originated in China. The Chinese government however has denied any connection to the attacks on the media outlets.

It is important to remember that it is difficult to prove who is behind an Internet attack, as hackers can easily "bounce their attacks between multiple compromised computers" across the globe, Graham Cluley, senior technology consultant at Sophos, notes in a blog post.

"And there is a chance that China could become an all-too-convenient bogeyman, that can easily be blamed for any embarrassing security breach," he adds.

The DOE email does not name any specific culprit, but states that an investigation turned up no evidence that classified information was compromised in the attack.

"We believe several hundred DOE employees’ and contractors’ PII (personally-identifiable information) may have been affected," according to the email. "As individual affected employees are identified, they will be notified and offered assistance on steps they can take to protect themselves from potential identity theft."

The email also urges employees to encrypt all files and emails containing PII and sensitive data, including files stored on hard drives or on the shared networks. In addition, employees were told not to store or email non-government related PII on DOE network computers.

Once the full nature and extent of the attack is known, the email continues, the department will "implement a full remediation plan."

"The Department is also leading an aggressive effort to reduce the likelihood of these events occurring again," according to the email. "These efforts include leveraging the combined expertise and capabilities of the Department’s Joint Cybersecurity Coordination Center to address this incident, increasing monitoring across all of the Department’s networks and deploying specialized defense tools to protect sensitive assets."

A remediation plan would be a good step forward to Richard Towle, head of federal markets at FireMon.

“If not for a troubling history preceding this incident, this report could be seen as an opportunity to improve," Towle says. "If classified information was truly not compromised, the organization could use what was taken to inform themselves about risks in the “reach-ability” of critical assets and associated access vulnerabilities."

"However, based on track record – not just of government, but also the industry at large – the typical response is to simply plug the wounds after they have already bled out, and try and defend similar points of entry," he continues. "We need to break the cycle and make security about understanding and addressing risk, as opposed to trying to get better and faster at reaction."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DarkReadingTim
50%
50%
DarkReadingTim,
User Rank: Strategist
2/6/2013 | 5:00:26 PM
re: U.S. Energy Department Hack Exposes Employee, Contractor Information
I love the last quote in this story.- Enterprises and government continue to spend money to plug the holes, and the breaches keep coming.- Seems like time to rethink security, not just from a technology perspective, but from an architectural perspective.
--Tim Wilson, editor, Dark Reading
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.