Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Alleged Data Breach of the United States Department of Defense and National Security Agency

Pietro Melillo : 11 July 2024 09:16

Recently, alarming news has emerged on a well-known underground forum regarding alleged data breaches of the United States Department of Defense and the National Security Agency (NSA). The announcements, posted by the user “Gostingr,” have raised concerns among users and cybersecurity experts, particularly due to the sensitive nature of the information involved.

Details of the Alleged Breaches

According to the post published by the user, the compromised data includes 325,498 lines containing names, emails, phone numbers, and addresses. The file, in CSV format, was compressed into a ZIP archive with a size of 6.3 MB, while the uncompressed size reaches 14.6 MB.

The malicious actor did not provide a precise date of the breach, leaving an uncertainty about the exact moment the Department of Defense system was compromised.

National Security Agency USA

Acquista il corso Dark Web & Cyber Threat Intelligence (e-learning version)
Il Dark Web e la Cyber Threat Intelligence rappresentano aree critiche per comprendere le minacce informatiche moderne. Tra ransomware, data breach e attività illecite, le organizzazioni devono affrontare sfide sempre più complesse per proteggere i propri dati e le infrastrutture. Il nostro corso “Dark Web & Cyber Threat Intelligence” ti guiderà attraverso i meccanismi e le strategie utilizzate dai criminali informatici, fornendoti competenze pratiche per monitorare, analizzare e anticipare le minacce.

Accedi alla pagina del corso condotto dall'Prof. Pietro Melillo sulla nostra Academy e segui l'anteprima gratuita.

Per un periodo limitato, potrai utilizzare il COUPON CTI-16253 che ti darà diritto ad uno sconto del 20% sul prezzo di copertina del corso
Per ulteriori informazioni, scrivici ad [email protected] oppure scrivici su Whatsapp al 379 163 8765 

Supporta RHC attraverso:


Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo

In a further post, the same actor claimed to have breached the data of the National Security Agency (NSA) of the United States. According to the report, the size of the compromised file is 1.4 GB and contains full names, emails, office phone numbers, personal cell phone numbers, government, military, and Pentagon email addresses. Additionally, the data is said to include classified information and communications between the “5 Eyes,” “14 Eyes,” and the US allies. This breach allegedly occurred by infiltrating the systems of Acuity Inc., a company that works directly with the US government and its allies.

Implications and Risks

The implications of such breaches are extremely serious. The personal information of hundreds of thousands of individuals could be used for various malicious purposes, including identity theft, phishing, and other forms of cyber-attacks. Moreover, the fact that these data belong to organizations of national importance such as the Department of Defense and the NSA makes the situation even more critical, as they might involve data of military personnel and government employees.

Lack of Official Confirmation

At the moment, it is not possible to confirm the accuracy of the breaches. Neither the Department of Defense nor the NSA of the United States has yet released any official press statements regarding the incidents. Without an official declaration, it is difficult to determine the actual extent of the damage and whether the information disseminated on the forum is authentic.

Final Considerations

These episodes once again highlight the importance of cybersecurity and the protection of sensitive data. Organizations, especially those handling information of national importance, must adopt stringent security measures to prevent such incidents.

Until further details and official confirmations are available, these reports should be treated as intelligence sources and closely monitored for any updates. In the meantime, it is advisable for potentially involved individuals to take precautions to protect their personal information and remain vigilant against possible phishing attempts or other fraudulent activities.

As is our custom, we always leave room for a statement from the company should they wish to provide updates on the matter. We would be happy to publish such information with a specific article highlighting the issue.

RHC will monitor the evolution of the situation in order to publish further news on the blog should there be substantial updates. If there are individuals informed about the facts who wish to provide information anonymously, they can use the encrypted whistleblower email.

Pietro Melillo
Head of the Dark Lab group. A Computer Engineer specialised in Cyber Security with a deep passion for Hacking and technology, currently CISO of WURTH Italia, he was responsible for Cyber Threat Intelligence & Dark Web analysis services at IBM, carries out research and teaching activities on Cyber Threat Intelligence topics at the University of Sannio, as a Ph.D, author of scientific papers and development of tools to support cybersecurity activities. Leads the CTI Team "RHC DarkLab"