Home page logo
/

dataloss logo Data Loss mailing list archives

follow-up: South Carolina Offers Details of Data Theft and Warns It Could Happen Elsewhere
From: security curmudgeon <jericho () attrition org>
Date: Wed, 21 Nov 2012 11:25:44 -0600 (CST)



---------- Forwarded message ----------
From: InfoSec News <alerts () infosecnews org>

http://www.nytimes.com/2012/11/21/us/more-details-of-south-carolina-hacking-episode.html

By ROBBIE BROWN
The New York Times
November 20, 2012

ATLANTA -- Gov. Nikki R. Haley said on Tuesday that South Carolina 
officials had not done enough to stop computer hackers who recently stole 
millions of personal financial records.

  A new report shows that outdated computers and security flaws at the 
state?s Department of Revenue allowed international hackers to steal 3.8 
million tax records, the governor said. She announced that the agency?s 
director, James Etter, would resign at the end of the year.

?Could South Carolina have done a better job? Absolutely,? she said. ?We 
did not do enough.?

Experts say the cyberattack, which resulted in the theft of 3.8 million 
Social Security numbers and 387,000 credit and debit card numbers, was the 
largest ever against a state government agency.

On Tuesday, the computer security firm Mandiant released a report with new 
details about the attack. Hackers broke into the agency?s computer system 
by sending state employees spam e-mail that contained an embedded link. If 
employees clicked on the link, software was activated on their computers 
that stole their user names and passwords, Mandiant found. Using this 
information, the hackers were able to log in as tax officials and steal 
the data.

[...]

_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
compliance challenges. 

Tenable Network Security (http://www.tenable.com/)
Tenable Network Security provides a suite of solutions which unify real-time
vulnerability, event and compliance monitoring into a single, role-based, interface
for administrators, auditors and risk managers to evaluate, communicate and
report needed information for effective decision making and systems management.


  By Date           By Thread  

Current thread:
  • follow-up: South Carolina Offers Details of Data Theft and Warns It Could Happen Elsewhere security curmudgeon (Nov 21)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]