US Marshals Ransomware Hit Is ‘Major’ Incident

Share This Post

The US Marshals Service (USMS), which is tasked with hunting down fugitives and administering the Witness Security Program, was hit with a “major” ransomware incident and data breach in mid-February, officials said.

Despite the ransomware element, USMS’s fugitive-hunting operations have continued in the wake of the cyberattack, officials said. However, on Feb. 17, unidentified cyberattackers absconded with a treasure trove of important data, according to Drew Wade, a Justice Department spokesperson.

“The affected system contains law enforcement sensitive information, including returns from legal process, administrative information, and personally identifiable information [PII] pertaining to subjects of USMS investigations, third parties, and certain USMS employees,” he told NBC News.

Meanwhile, the outlet cited unnamed sources within the DoJ as confirming that the Witness Security Program (known as the “witness protection program” in films and TV) was not affected.

The attack impacted a “standalone USMS system,” Wade said, which was quarantined from the rest of the network. Even so, the incursion should be seen as a “major incident,” he added.

A concrete motive for the attack and the culprits behind it may emerge over the course of the investigation, but targeting the PII could be a prelude to a broader cyber offensive, according to Lior Yaari, CEO and co-founder of Grip Security.

“The US Marshals data breach is another example of how cybercriminals aim for identities — the most common threat target,” he says, noting that the data in general would be valuable to a wide range of attacker types. “In this case, attackers were able to exfiltrate and add to the identity fabric for individuals in the USMS system, including prisoners. Compromised identities give cybercriminals an embedded position in identity fabric, thereby extending their presence anywhere and everywhere the identity goes.”

Read More

Dark Reading

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.