Ransomware Attack Hits US Marshals Service

Share This Post

The US Marshals Service (USMS) has confirmed falling victim to a ransomware attack that resulted in the compromise of sensitive law enforcement information.

A federal law enforcement agency within the Department of Justice, USMS supports the federal justice system by tracking down fugitives, protecting government witnesses and their families, executing federal court orders, and more.

The incident, chief of the Marshals Service public affairs office Drew Wade said on Monday, was identified on February 17 and involved a standalone system that was immediately disconnected from the network.

In addition to sensitive information about USMS investigations, Wade said, the infected system contained personally identifiable information.

“The affected system contains law enforcement sensitive information, including returns from legal process, administrative information, and personally identifiable information pertaining to subjects of USMS investigations, third parties, and certain USMS employees,” the spokesperson said.

USMS, which has discovered that data was exfiltrated from the impacted system, is treating the attack as a major incident but says it has been able to continue operations.

According to NBC News, no information related to the Witness Security Program, also known as the witness protection program, was compromised in the attack, and no one in the program is at risk because of the incident.

The Department of Justice has launched a forensic investigation into the ransomware attack, Wade said.

SecurityWeek has contacted USMS for a statement on the attack and will update this article as soon as a reply arrives.

“The US Marshals Service is one of America’s highest ranking law enforcement authorities, and it possesses highly sensitive information related to national security, witness protection programs and convicted felons. As a result, the information obtained in this breach will be highly sensitive and could be used in extortion, sold onto nation state actors, or even put the safety of US citizens at risk if their personal information, like address details, are exposed,” Ryan McConechy, senior consultant at Barrier Networks, said in an emailed comment.

Related:Ransomware Attack Forces Produce Giant Dole to Shut Down Plants

Related:Ransomware Attack Pushes City of Oakland Into State of Emergency

Related:3.3 Million Impacted by Ransomware Attack at California Healthcare Provider

SecurityWeek RSS Feed

Read More

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.