Monday, October 7, 2024
HomeCyber AttackNASA Hacked - Hackers Compromised NASA Servers & Personal Data May have...

NASA Hacked – Hackers Compromised NASA Servers & Personal Data May have been Stolen

Published on

NASA announced a critical data breach on its own server that contains a
personally identifiable information (PII) of current and old employees.

NASA recently conducting an internal security audit that reveals one of the NASA server where Social Security numbers and other PII data were stored.

Security experts learned this incidents on Oct. 23, 2018 but it tooks nearly 2 months to notify to NASA emoloyees.

- Advertisement - EHA

The incident has been notified to all the employees that states attackers may have been stolen the personal data.

According to spaceref,  NASA and its Federal cybersecurity partners are continuing to examine the servers to determine the scope of the potential data exfiltration and identify potentially affected individuals. This process will take time. The ongoing investigation is a top agency priority, with senior leadership actively involved”,  

NASA believes that no other data’s and mission were compromised by this data breach and NASA Provided the specific data including past and present, whose PII was affected, to include offering identity protection services and related resources.

Also NASA stats that, “Those NASA Civil Service employees who were on-boarded, separated from the agency, and/or transferred between Centers, from July 2006 to October 2018, may have been affected. “

NASA security experts took immediate action to secure the servers where the data contained and reports says entire leadership team takes the protection of personal information very seriously. Information security remains a top priority for NASA.

Also Read:

15,779 Indian Websites Hacked During This Year (Jan – Nov) – CERT-India

100,000 Printers Hacked Worldwide Again by Hackers to Promote PewDiePie YouTube Channel

Quora Hacked – 100 Million User’s Data Stolen By Hackers

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA,...

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files

The researcher investigated the potential security risks associated with debugging dump files in Visual...

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been identified in the Cacti network monitoring tool that...

Microsoft & DOJ Dismantles Hundreds of Websites Used by Russian Hackers

Microsoft and the U.S. Department of Justice (DOJ) have disrupted the operations of Star...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA,...

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files

The researcher investigated the potential security risks associated with debugging dump files in Visual...

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been identified in the Cacti network monitoring tool that...