Sean Gallagher reports at Ars Technica that Dr. Andy Ozment, Assistant Secretary for Cybersecurity in the Department of Homeland Security, told members of the House Oversight and Government Reform Committee that in the case of the recent discovery of an intrusion that gave attackers access to sensitive data on millions of government employees and government contractors, encryption would "not have helped" because the attackers had gained valid user credentials to the systems that they attacked—likely through social engineering.
Ozment added that because of the lack of multifactor authentication on these systems, the attackers would have been able to use those credentials at will to access systems from within and potentially even from outside the network. "If the adversary has the credentials of a user on the network, they can access data even if it's encrypted just as the users on the network have to access data," said Ozment. "That did occur in this case. Encryption in this instance would not have protected this data."
The fact that Social Security numbers of millions of current and former federal employees were not encrypted was one of few new details emerged about the data breach and House Oversight member Stephen Lynch (D-Mass.) was the one who pulled the SSN encryption answer from the teeth of the panel where others failed. "This is one of those hearings where I think that I will know less coming out of the hearing than I did when I walked in because of the obfuscation and the dancing around we are all doing here. As a matter of fact, I wish that you were as strenuous and hardworking at keeping information out of the hands of hackers as you are in keeping information out of the hands of Congress and federal employees. It's ironic. You are doing a great job stonewalling us, but hackers, not so much."
See our earlier stories: U.S. Government Employees Hit By Massive Data Breach and Hacking of Federal Security Forms Much Worse than Originally Thought
(Score: 1, Interesting) by Anonymous Coward on Thursday June 18 2015, @02:02PM
Who dunnit or even how. All they know their pants are down and their arse is hurting.
It's always a good guess to blame social engineering, like asking But Does It Scale? Yet, it's not like here arent defences, mostly simple common sense stuff, after all sociel engineering is much older than computers. https://en.wikipedia.org/wiki/Social_engineering_%28security%29#Countermeasures [wikipedia.org]
This does not increase my confidence on the competence of the DHS...
(Score: 2) by c0lo on Thursday June 18 2015, @07:33PM
No, they do know!
'twas those pesky Chinese state-sponsored hackers, they called from Shanghai and did some social engineering. 't worked, none of them had British accent, nothing for us to suspect.
https://www.youtube.com/watch?v=aoFiw2jMy-0