Monday, April 14, 2025
HomeCyber AttackNASA Hacked - Hackers Compromised NASA Servers & Personal Data May have...

NASA Hacked – Hackers Compromised NASA Servers & Personal Data May have been Stolen

Published on

SIEM as a Service

Follow Us on Google News

NASA announced a critical data breach on its own server that contains a
personally identifiable information (PII) of current and old employees.

NASA recently conducting an internal security audit that reveals one of the NASA server where Social Security numbers and other PII data were stored.

Security experts learned this incidents on Oct. 23, 2018 but it tooks nearly 2 months to notify to NASA emoloyees.

- Advertisement - Google News

The incident has been notified to all the employees that states attackers may have been stolen the personal data.

According to spaceref,  NASA and its Federal cybersecurity partners are continuing to examine the servers to determine the scope of the potential data exfiltration and identify potentially affected individuals. This process will take time. The ongoing investigation is a top agency priority, with senior leadership actively involved”,  

NASA believes that no other data’s and mission were compromised by this data breach and NASA Provided the specific data including past and present, whose PII was affected, to include offering identity protection services and related resources.

Also NASA stats that, “Those NASA Civil Service employees who were on-boarded, separated from the agency, and/or transferred between Centers, from July 2006 to October 2018, may have been affected. “

NASA security experts took immediate action to secure the servers where the data contained and reports says entire leadership team takes the protection of personal information very seriously. Information security remains a top priority for NASA.

Also Read:

15,779 Indian Websites Hacked During This Year (Jan – Nov) – CERT-India

100,000 Printers Hacked Worldwide Again by Hackers to Promote PewDiePie YouTube Channel

Quora Hacked – 100 Million User’s Data Stolen By Hackers

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kaspersky Shares 12 Essential Tips for Messaging App Security and Privacy

In an era where instant messaging apps like WhatsApp, Telegram, Signal, iMessage, Viber, and...

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Kaspersky Shares 12 Essential Tips for Messaging App Security and Privacy

In an era where instant messaging apps like WhatsApp, Telegram, Signal, iMessage, Viber, and...

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...