05:44 PM
Connect Directly

Federal Workers Warned Of Potential Data Compromise At SRA

Virus found on government contractor's network could threaten sensitive data

Federal government employees are being notified of a potential compromise of personal information following the discovery of a virus on the network of SRA International, a major government contractor.

In a breach disclosure notification submitted to the Maryland attorney general's office on Jan. 20 (PDF), SRA revealed that it has launched an investigation into the virus. The company is "swiftly implementing mitigation and remediation actions to eradicate the virus," the notification says.

This is the second time that SRA has suffered a publicly disclosed security breach. In July 2007, the Associated Press reported that it was able to pull sensitive documents directly from SRA's anonymous FTP server, enabling reporters to gain access to military networks. The servers were subsequently pulled down and replaced with more secure servers, according to news reports.

SRA has not disclosed details on what the virus looks like or how it might have gotten onto the SRA network. The company did say that the malicious software may have allowed hackers to get access to data maintained by SRA, including "employee names, addresses, Social Security numbers, dates of birth, and health care provider information."

The virus was apparently not detected by the company's antivirus software, according to the notification letter. SRA says it is working with its antivirus vendor to add the ability to detect the malware. The company also says it believes that other companies may have been hit by the same problem.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio