Tuesday, January 21, 2025
HomeCyber AttackU.S. Marshals Service Hacked - Sensitive Information Leaked

U.S. Marshals Service Hacked – Sensitive Information Leaked

Published on

SIEM as a Service

Follow Us on Google News

The theft of critical law enforcement data is currently under investigation by the U.S. Marshals Service (USMS), triggered by a ransomware attack that targeted a stand-alone USMS system. 

The USMS has confirmed that the compromised information is of a sensitive nature and is working to identify the culprits behind the attack.

The United States Marshals Service (USMS) is a crucial bureau operating under the Department of Justice, catering to every facet of the federal justice system. 

Their functions span from executing federal court orders and seizing assets that have been acquired illegally, to safeguarding the well-being of government witnesses and their kin. Additionally, USMS provides a range of other services that are essential to the efficient functioning of the federal justice system.

As per a report by NBC, the federal law enforcement agency has confirmed that the recently stolen data contains personally identifiable information of its employees. The agency is taking immediate measures to contain the damage and has urged its employees to be extra vigilant with their personal information.

Here’s what the USMS spokesperson, Drew Wade stated:-

“On February 17th, a stand-alone USMS system was hit by a ransomware attack that resulted in a data exfiltration event.” 

However, the Marshals Service immediately took notice of the situation and launched an investigation to identify the attackers behind this incident. Even they also disconnected the affected system from the network to stop the further spread.

Sensitive Information Leaked

There is sensitive information contained within the affected system that is relevant to law enforcement, including:-

  • Returns from legal process
  • Administrative information
  • PII related to USMS investigations
  • PII related to third parties
  • PII related to USMS employees

USMS’ Witness Security Files Information System was not accessed by the attackers, as they were unable to establish any access to the system. While this security breach has not led to any danger to anyone in the witness protection program.

The recent incident involving the USMS system is a matter of significant concern, as it involves the theft of sensitive information related to ongoing investigations by the Marshals Service. 

The compromised data is of high importance to law enforcement agencies and could potentially jeopardize the safety and security of the subjects of these investigations. 

The USMS is treating this matter with utmost seriousness and taking all necessary measures to contain the damage caused by the breach.

Despite the recent ransomware attack and data exfiltration event, the USMS has managed to develop a temporary solution to ensure that their operations are not affected. 

The agency is working diligently to track down fugitives and suspects, even as it investigates the extent of the damage caused by the attack. While the situation remains precarious, the USMS is confident that their measures will allow them to continue their efforts until a permanent solution can be found.

Network Security Checklist – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS

Researchers uncovered several significant vulnerabilities within Azure DevOps, specifically focusing on potential Server-Side Request...

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Socket’s threat research team has identified a series of malicious npm packages specifically designed...

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking...

New IoT Botnet Launching Large-Scale DDoS attacks Hijacking IoT Devices

Large-scale DDoS attack commands sent from an IoT botnet's C&C server targeting Japan and...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS

Researchers uncovered several significant vulnerabilities within Azure DevOps, specifically focusing on potential Server-Side Request...

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Socket’s threat research team has identified a series of malicious npm packages specifically designed...

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking...