29.07.2016 Views

Cyber Primer

AEWhbF

AEWhbF

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Cyber</strong> threats<br />

Annex 2A – Threat actor case studies<br />

Case study 1 – <strong>Cyber</strong> used for personal data theft<br />

Theft of personal data – United States Office of Personnel Management<br />

Who<br />

What<br />

There has been no official attribution of those responsible, although General<br />

(Retired) James Clapper, the United States National Director for Intelligence, has<br />

been quoted as saying China remains the ‘lead suspect’. According to the Wall<br />

Street Journal, United States government officials suspect that Chinese hackers<br />

perpetrated the breach. The Washington Post has also reported that the attack<br />

originated in China, citing unnamed government officials.<br />

In 2015, the United States Office of Personnel Management (OPM) announced<br />

that it had been the target of two separate, but related, cyber security<br />

breaches. In the first event records of as many as four million people may have<br />

been compromised with personally identifiable information such as Social<br />

Security numbers, as well as names, dates and places of birth, and addresses<br />

being targeted. The data breach was noticed by the OPM in April 2015 and is<br />

believed to have started in March 2014, but may started even earlier. In the<br />

second event, identified in June 2015, OPM discovered that the background<br />

investigation records of current, former and prospective Federal employees and<br />

contractors had been stolen. The OPM and the interagency incident response<br />

concluded with high confidence that sensitive information, including the Social<br />

Security numbers of 21.5 million individuals, was stolen from the background<br />

investigation databases. This included 19.7 million individuals that applied for a<br />

background investigation, and 1.8 million non-applicants, primarily spouses or<br />

co-habitants of applicants. Some records also included findings from interviews<br />

conducted by background investigators and approximately 5.6 million include<br />

fingerprints and the usernames and passwords that background investigation<br />

applicants used to fill out their background investigation forms. The theft was<br />

more significant as this was the first event where physical data was stolen in the<br />

form of the 5.6 million sets of fingerprints. These breaches were described by<br />

Federal officials as among the largest breach of government data in the history<br />

of the United States.<br />

36<br />

<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!