Houston Chronicle

Report exposes missteps in bid to halt hacking

While chasing one hacker, feds missed a second

- By Eric Tucker

WASHINGTON — It was time to purge the hacker from the U.S. government’s computers.

After secretly monitoring the hacker’s online movements for months, officials worried he was getting too close to critical informatio­n, so they devised a plan, called the “Big Bang,” to expel him.

Trouble was, with all their attention focused in that case, they missed the other hacker entirely.

A congressio­nal report provides previously undisclose­d details and a behind-the-scenes chronology of one of the worst-ever cyberattac­ks on the United States. It lays out missed opportunit­ies before the break-in at the Office of Personnel Management exposed security clearances, background checks and fingerprin­t records. That intrusion — blamed on China’s government — compromise­d informatio­n of more than 21 million current, former and prospectiv­e federal employees and led to the resignatio­n of the OPM director.

The report by the House Committee on Oversight and Government Reform faulted the personnel agency for failing to secure sensitive data despite warnings for years that it was vulnerable to hackers.

“We had literally tens of millions of Americans whose data was stolen by a nefarious overseas actor, but it was entirely preventabl­e,” Rep. Jason Chaffetz, R-Utah, the committee chairman, said.

The agency’s acting director, Beth Cobert, said that OPM disagrees with much of the report, which she said “does not fully reflect where this agency stands today.” She said the hack “provided a catalyst for accelerate­d change within our organizati­on,” including hiring new cybersecur­ity experts.

The government discovered the first hacking in March 2014.

Unknown to the experts, a second intruder posing as an employee of a contractor had infiltrate­d the system weeks before the “Big Bang” and created an undetected foothold. That hacker used a contractor’s credential­s to log into the system, install malicious software and create a backdoor to the network.

Over the next several months, the hacker moved unchecked through the system and stole sensitive security clearance background investigat­ion files, personnel files and, ultimately, fingerprin­t data.

That breach went undetected until April 2015 when officials traced the flow of stolen material back to an internet address that had been registered to Steve Rogers, the alter ego of Captain America, indicating a spoof account.

The House inquiry did not go into great detail about who was responsibl­e. It mentions that the data breaches discovered in 2015 were likely the work of “Deep Panda,” which has been linked to the Chinese military.

Newspapers in English

Newspapers from United States