Thursday, July 25, 2024
EHA

NASA Hacked – Hackers Compromised NASA Servers & Personal Data May have been Stolen

NASA announced a critical data breach on its own server that contains a
personally identifiable information (PII) of current and old employees.

NASA recently conducting an internal security audit that reveals one of the NASA server where Social Security numbers and other PII data were stored.

Security experts learned this incidents on Oct. 23, 2018 but it tooks nearly 2 months to notify to NASA emoloyees.

The incident has been notified to all the employees that states attackers may have been stolen the personal data.

According to spaceref,  NASA and its Federal cybersecurity partners are continuing to examine the servers to determine the scope of the potential data exfiltration and identify potentially affected individuals. This process will take time. The ongoing investigation is a top agency priority, with senior leadership actively involved”,  

NASA believes that no other data’s and mission were compromised by this data breach and NASA Provided the specific data including past and present, whose PII was affected, to include offering identity protection services and related resources.

Also NASA stats that, “Those NASA Civil Service employees who were on-boarded, separated from the agency, and/or transferred between Centers, from July 2006 to October 2018, may have been affected. “

NASA security experts took immediate action to secure the servers where the data contained and reports says entire leadership team takes the protection of personal information very seriously. Information security remains a top priority for NASA.

Also Read:

15,779 Indian Websites Hacked During This Year (Jan – Nov) – CERT-India

100,000 Printers Hacked Worldwide Again by Hackers to Promote PewDiePie YouTube Channel

Quora Hacked – 100 Million User’s Data Stolen By Hackers

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Website

Latest articles

ShadowRoot Ransomware Attacking Organizations With Weaponized PDF Documents

A rudimentary ransomware targets Turkish businesses through phishing emails with ".ru" domain sender addresses....

BreachForumsV1 Database Leaked: Private messages, Emails & IP Exposed

BreachForumsV1, a notorious online platform for facilitating illegal activities, has reportedly suffered a massive...

250 Million Hamster Kombat Players Targeted Via Android And Windows Malware

Despite having simple gameplay, the new Telegram clicker game Hamster Kombat has become very...

Beware Of Malicious Python Packages That Steal Users Sensitive Data

Malicious Python packages uploaded by "dsfsdfds" to PyPI infiltrated user systems by exfiltrating sensitive...

Chinese Hackers Using Shared Framework To Create Multi-Platform Malware

Shared frameworks are often prone to hackers' abuses as they have been built into...

BlueStacks Emulator For Windows Flaw Exposes Millions Of Gamers To Attack

A significant vulnerability was discovered in BlueStacks, the world's fastest Android emulator and cloud...

Google Chrome 127 Released with a fix for 24 Security Vulnerabilities

Google has unveiled the latest version of its Chrome browser, Chrome 127, which is...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles