US Marshals Ransomware Hit Is 'Major' IncidentUS Marshals Ransomware Hit Is 'Major' Incident
Unknown attackers made off with a raft of PII, the Justice Department says — but witnesses in the protection program are still safe.
February 28, 2023

The US Marshals Service (USMS), which is tasked with hunting down fugitives and administering the Witness Security Program, was hit with a "major" ransomware incident and data breach in mid-February, officials said.
Despite the ransomware element, USMS's fugitive-hunting operations have continued in the wake of the cyberattack, officials said. However, on Feb. 17, unidentified cyberattackers absconded with a treasure trove of important data, according to Drew Wade, a Justice Department spokesperson.
"The affected system contains law enforcement sensitive information, including returns from legal process, administrative information, and personally identifiable information [PII] pertaining to subjects of USMS investigations, third parties, and certain USMS employees," he told NBC News.
Meanwhile, the outlet cited unnamed sources within the DoJ as confirming that the Witness Security Program (known as the "witness protection program" in films and TV) was not affected.
The attack impacted a "standalone USMS system," Wade said, which was quarantined from the rest of the network. Even so, the incursion should be seen as a "major incident,” he added.
A concrete motive for the attack and the culprits behind it may emerge over the course of the investigation, but targeting the PII could be a prelude to a broader cyber offensive, according to Lior Yaari, CEO and co-founder of Grip Security.
"The US Marshals data breach is another example of how cybercriminals aim for identities — the most common threat target," he says, noting that the data in general would be valuable to a wide range of attacker types. "In this case, attackers were able to exfiltrate and add to the identity fabric for individuals in the USMS system, including prisoners. Compromised identities give cybercriminals an embedded position in identity fabric, thereby extending their presence anywhere and everywhere the identity goes."
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023