China blamed as US govt agency hacked, 4 million federal workers affected
It is not known who is responsible for the breach, but officials told Reuters that a foreign government or entity is to blame. The and cited unnamed government officials who blamed Chinese hackers.
Sen. Susan Collins (R-Maine) also said Chinese hackers are believed to be behind the attack, according to the Associated Press.
The Chinese Embassy in the US has called the accusations against Chinese hackers "hypothetical" and irresponsible.
"Jumping to conclusions and making a hypothetical accusation is not responsible" and is "counterproductive," the embassy's spokesman, Zhu Haiquan, said in reply to a inquiry, adding that it is difficult to track hacker activity across borders. China is applying great efforts to combat cyber-attacks, Zhu said.
The security breach was revealed Thursday by the US Office of Personnel Management (OPM), which is also the affected agency. However, the attack itself occurred in April.
In a press release, OPM said it will contact roughly 4 million people whose personally identifiable information may have been compromised.
said OPM Director Katherine Archuleta in a statement.
An unnamed US official told the Associated Press that the hack could potentially affect every federal agency.
Striking the OPM is particularly notable, since the department is responsible for more than 90 percent of all federal background checks, the AP reported.
According to the , the attackers may have accessed information such as peoples' job assignments, work evaluations. and training.
said OPM Chief Information Officer Donna Seymour to the newspaper.
Following reports of officials blaming Beijing for the attack, the Chinese Embassy in Washington said the US should not be
embassy spokesman Zhu Haiquansaid in an email to Reuters.
Meanwhile, the FBI announced it is looking into the situation.
it said in a statement.
Since the attack, OPM said it has implemented new security measures, such as restricting access and powers of remote administrators, and utilizing anti-malware software for further protection. A review of all connections to the network was also initiated.
0 reacties:
Post a Comment