Adversaries of the U.S. along with Chinese hackers are digging for background check files of powerful people. Among the companies targeted have been Keypoint and USIS along with the OPM (Office of Personnel Management). Also the information of certain individuals and family members can be found from undermining the data integrity of health insurance companies. After the records of 1000’s of federal workers were exposed background check provider USIS lost it’s OPM contract. The cyber attack enabled malware which took screen shots whenever background check software was in use.

Digital forensics company Stroz Friedberg wrote to USIS lawyers in 2014 advising that the attacks found their way in to the USIS network via a supplier. The cyber attack navigated to USIS through the 3rd party environment in to the network (USIS) by forcing a password within an application server. Once the server had been accessed by login a ‘malicious back door’ was installed giving access.

The exact motives to the USIS cyber attacks remain unclear. However experts conjecture that collating data on government officials may lead to blackmail, bribery or espionage recruitment.

Please follow and like us:
Follow by Email

DISCLAIMER: Please note the content within this blog/site is for informational, educational and entertainment purposes and should not be construed or perceived as professional or legal advice in respect of any of the subject matter. Any information you may rely on you do so at your own risk. The site owner/s will not be held responsible or liable for any damages from or related to your use of content, information and blog posts. The site owner/s take reasonable care to ensure that the information contained within this site is complete and correct but does not warrant this to be the case and accepts no liability for any errors, spelling mistakes or omissions. Any opinion or information in this site are put forth by the site owner/s on the basis of information obtained from sources believed to be reliable but not verified independently.