Sunday, March 23, 2025
HomeCyber AttackNASA Hacked - Hackers Compromised NASA Servers & Personal Data May have...

NASA Hacked – Hackers Compromised NASA Servers & Personal Data May have been Stolen

Published on

SIEM as a Service

Follow Us on Google News

NASA announced a critical data breach on its own server that contains a
personally identifiable information (PII) of current and old employees.

NASA recently conducting an internal security audit that reveals one of the NASA server where Social Security numbers and other PII data were stored.

Security experts learned this incidents on Oct. 23, 2018 but it tooks nearly 2 months to notify to NASA emoloyees.

The incident has been notified to all the employees that states attackers may have been stolen the personal data.

According to spaceref,  NASA and its Federal cybersecurity partners are continuing to examine the servers to determine the scope of the potential data exfiltration and identify potentially affected individuals. This process will take time. The ongoing investigation is a top agency priority, with senior leadership actively involved”,  

NASA believes that no other data’s and mission were compromised by this data breach and NASA Provided the specific data including past and present, whose PII was affected, to include offering identity protection services and related resources.

Also NASA stats that, “Those NASA Civil Service employees who were on-boarded, separated from the agency, and/or transferred between Centers, from July 2006 to October 2018, may have been affected. “

NASA security experts took immediate action to secure the servers where the data contained and reports says entire leadership team takes the protection of personal information very seriously. Information security remains a top priority for NASA.

Also Read:

15,779 Indian Websites Hacked During This Year (Jan – Nov) – CERT-India

100,000 Printers Hacked Worldwide Again by Hackers to Promote PewDiePie YouTube Channel

Quora Hacked – 100 Million User’s Data Stolen By Hackers

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control

JumpServer, a widely used open-source Privileged Access Management (PAM) tool developed by Fit2Cloud, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...