New York State Confirms Breach of Government NetworkNew York State Confirms Breach of Government Network
The January incident led state officials to hire an external forensics firm and change thousands of employee passwords.
April 16, 2020
New York State officials are investigating a breach of the state government computer network. The attack, discovered in late January, is believed to have originated outside of the United States.
On Jan. 28, 2020, New York's Office of Information Technology Services (ITS) discovered an intrusion into state government networks, The Wall Street Journal reports. Attackers had built tunnels into multiple servers used to transmit encrypted information. Richard Azzopardi, senior adviser to Governor Andew Cuomo, says there is no evidence to indicate personal data belonging to New York residents or state employees was stolen or compromised in the attack.
The breach was not previously reported but was confirmed by the state when the WSJ inquired. Officials say New York hired security firm CrowdStrike in mid-February "to assess the scope of the situation." ITS hired a third party when, a few weeks into its internal investigation, it discovered a previously unknown backdoor. New York is working with the FBI to learn the hackers' identities; sources familiar with the case think a foreign attacker is responsible.
CrowdStrike's review found "more than 25 servers and encrypted networking appliances" compromised in the attack. These assets were used by several government groups, including the New York State Police and the departments of Civil Service and Environmental Conservation.
The incident led New York to implement additional security tools and reset thousands of employee passwords at state agencies.
Read more details here.
A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19.
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums