Avatar feed
Responses: 5
SPC David S.
5
5
0
Edited >1 y ago
This is not good -

Personal information on 2.1 million current employees. While they say this can be fixed the only for sure method is to wipe the system clean and rebuild as there is more than likely a trojan or two buried in the network. Additionally there is the possibility of a mole in OPM or one of it vendors.
(5)
Comment
(0)
SPC David S.
SPC David S.
>1 y
Seems it was a contractor - US-CERT team discovered that the earliest incursion they could identify had been made with an OPM credential issued to a contractor from KeyPoint Government Solutions. KeyPoint had announced a breach of its own network in December 2014. For KeyPoint credential data should have been moved behind an air gap. However I think OPM was breached in earlier in 2014.
(0)
Reply
(0)
Avatar small
SSgt GG-15 RET Jim Lint
4
4
0
I am not sure I would agree with the number of 4 million. It might be higher with some of the info from the other OPM hacks.
(4)
Comment
(0)
Avatar small
Capt Richard I P.
3
3
0
Everyone on RallyPoint needs needs to read this. Thanks for posting it @ahmed faried (rp mobile tagging failing).
It's looking more and more like the U.S. Gov't is just failing in this new domain.
(3)
Comment
(0)
CPT Ahmed Faried
CPT Ahmed Faried
9 y
its even more appallikng when you realize that our vulnerabilities have been known for ages.
(2)
Reply
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close