mailing list archives
follow-up: South Carolina Offers Details of Data Theft and Warns It Could Happen Elsewhere
From: security curmudgeon <jericho () attrition org>
Date: Wed, 21 Nov 2012 11:25:44 -0600 (CST)
---------- Forwarded message ----------
From: InfoSec News <alerts () infosecnews org>
By ROBBIE BROWN
The New York Times
November 20, 2012
ATLANTA -- Gov. Nikki R. Haley said on Tuesday that South Carolina
officials had not done enough to stop computer hackers who recently stole
millions of personal financial records.
A new report shows that outdated computers and security flaws at the
state?s Department of Revenue allowed international hackers to steal 3.8
million tax records, the governor said. She announced that the agency?s
director, James Etter, would resign at the end of the year.
?Could South Carolina have done a better job? Absolutely,? she said. ?We
did not do enough.?
Experts say the cyberattack, which resulted in the theft of 3.8 million
Social Security numbers and 387,000 credit and debit card numbers, was the
largest ever against a state government agency.
On Tuesday, the computer security firm Mandiant released a report with new
details about the attack. Hackers broke into the agency?s computer system
by sending state employees spam e-mail that contained an embedded link. If
employees clicked on the link, software was activated on their computers
that stole their user names and passwords, Mandiant found. Using this
information, the hackers were able to log in as tax officials and steal
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list
Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
Tenable Network Security (http://www.tenable.com/)
Tenable Network Security provides a suite of solutions which unify real-time
vulnerability, event and compliance monitoring into a single, role-based, interface
for administrators, auditors and risk managers to evaluate, communicate and
report needed information for effective decision making and systems management.
- follow-up: South Carolina Offers Details of Data Theft and Warns It Could Happen Elsewhere security curmudgeon (Nov 21)