Press "Enter" to skip to content

The first federal computer security disaster of Trump 2.0 has arrived

The second Trump The Administration has its first debacle of federal IT security to face.

WhatsApp Group Join Now
Telegram Group Join Now

A violation of the electronic storage system of the Federal Judiciary of the United States, discovered around 4 July, has pushed some courts to paper backup plans for the paper scale after the hack has compromised the registers of the sealed court and possibly exposed the identities of confidential informants and collaborations of witnesses in several US states.

More than a month after the discovery of the violation and despite the recent reports from The New York Times AND Political That Russia was involved in the perpetration of the Hack: it is not yet clear exactly what happened and what data and systems have been affected.

Political For the first time The violation of the “cases of cases of cases/electronic cases” or cm/ECF, system, which may have had an impact on criminal documents, arrest mandates and sealed accusations. The CM/ECF system also underwent a violation in 2020 during the first Trump and politician administration shown Tuesday that, in the recent attack, hackers have exploited the vulnerabilities of the software that remained unwanted after being discovered five years ago in response to that first accident. Security researchers say that the gaps in public information on the situation is worrying, in particular when it comes to clarity on which data they have been interested.

“We are more than a month in detecting this intrusion and we do not yet have a complete accounting of what is influenced,” says Jake Williams, a former NSA hacker and current vice -president of research and development at the Hunter strategy. “If we do not have enough registration to reconstruct the attack activity, it would be extremely disappointing, because this system has been repeatedly targeted over the years.”

In response to a commentary request, the United States Courts referred to the wired His declaration of August 7thWhich states that the federal judiciary “is adopting further measures to strengthen the protections for the sensitive documents” and “further improve the safety of the system”. The courts also mention that “the vast majority of documents filed with the management system of the electronic cases of the judiciary are not reserved and in fact they are promptly available to the public”, admitting that “some documents contain confidential or proprietary information that are sealed by the public vision”.

The Department of Justice did not immediately respond to requests for comments on the field of violation or who perpetrated it.

Reports of this week according to which Russia was involved in the attack or could be the only author was difficult to interpret, given other indications that the espionage actors supported by multiple countries – and possibly organized crime unions – may have been involved or for the violation of their exfiltration.

John Hulti, leading analyst of the Intelligence group of Google threats, says that it is not uncommon to see more actors that affect a sensitive and potentially vulnerable system. “The investigations are regularly targeted by the actors of cyberespionage in different countries,” he says.

The news of the violation comes while the Trump administration has continued to cut the federal workforce, including the hairstyle of intelligence and computer security agencies to remove officials or pressure to resign.

“I think federal investigators probably know who was behind the attack, but given the climate, suspicions that no one wants to say with certainty,” says Hunter Strategy’s Williams.

Several administrations have struggled to manage insidious espionage operations, in particular campaigns perpetrated by Chinese and Russian actors. But the researchers underline that the vulnerabilities that allow the attack to cm/ECF should have been faced after the violation of 2021.

“Apply policies to request that sealed or highly sensitive documents are managed through air-to-end systems or safe isolated networks instead of by means of cm/ECF or Pacer would have a drastically limited exposure. And this has actually been recommended post-2021”, says Tim Peck, senior threats to threats to the Securon Cybersiculia security company. “Establishing a coherent and centralized recording – among other things – all the disparate instances cm/ECF could have allowed the previous rapid detection and mitigation before the exfiltration of the data intensified for how much it was not done.”

In other words, highly targeted systems such as those of the US courts will probably suffer violations. But the best way to reduce the probability and seriousness of these attacks is to make sure to fix the defects after they have exploited the first time.

Source link

Be First to Comment

Leave a Reply