recommended reading

48,000 Federal Employees Potentially Affected by Second Background Check Hack

wk1003mike/Shutterstock.com

This story has been updated. 

The Office of Personnel Management is alerting more than 48,000 federal employees their personal information may have been exposed following a breach at KeyPoint Government Solutions, which conducts background investigations of federal employees seeking security clearances.

The total number of employees affected is 48,439, according to an email from OPM Chief Information Officer Donna Seymour obtained by Nextgov.

Seymour said OPM worked closely with the Department of Homeland Security to investigate the incident, “and while we found no conclusive evidence that [personally identifiable information] was taken by the intruder, OPM has elected to conduct these notifications out of an abundance of caution.”

Affected employees will receive free credit monitoring.

DHS spokesman S.Y. Lee on Thursday evening told Nextgov the breach was detected by a DHS entity. 

"Recently, the DHS National Cybersecurity and Communications Integration Center became aware of a potential intrusion of a private sector company that conducts U.S. government security background investigations for OPM," he said in a statement. "Working with OPM and other interagency partners, the NCCIC, per standard procedure, deployed an on-site [U.S.-Computer Emergency Readiness Team] to assess and mitigate any risks identified."

"As we examine the potential impact on DHS employees, we are committed to ensuring the privacy of our workforce and will take all appropriate measures to safeguard it," he added. 

Background investigators conduct interviews with employees or applicants seeking security clearances, as well as their family members, neighbors and former employers. Investigators also compile police and court records on interview subjects. Their reports are used by federal officials to determine potential employees’ suitability to hold security clearances and are a treasure trove of personal information.

An OPM statement provided to Nextgov read in part: "We take very seriously our responsibility to protect sensitive data in background investigations, and our top priority is to make sure the networks that handle that data are secure. KeyPoint has worked closely with OPM to implement additional security controls that will afford its network greater protection.”

It’s the second time this year hackers have targeted a private background-check company. Over the summer, USIS, once the government’s largest provider of checks, revealed its systems had been breached, potentially exposing information on 25,000 employees. OPM subsequently temporarily suspended work with the company in the wake of that breach and later severed ties altogether. 

“Following the discovery of the problem, KeyPoint implemented numerous controls to strengthen the security of its network,” Seymour's email stated. “The immediacy with which KeyPoint was able to remediate vulnerabilities has allowed us to continue to conduct business with the company without interruption.”

A month before the USIS hack, OPM's own networks were breached, with news reports indicating Chinese hackers had infiltrated OPM's databases, potentially in pursuit of the personnel files of security clearance holders.

KeyPoint did not immediately return phone calls and emails seeking comment. 

DHS says it inspected other background check firms for vulnerabilities following the USIS breach. 

The U.S.-CERT, the agency's cyber-response squad, analyzed similar companies for “indicators of compromise,” revealed Brad Nix, US-CERT’s deputy director, who spoke earlier in the week at a Washington, D.C., cyber summit.

Camille Tuutti, Jack Moore and Aliya Sternstein contributed to this report. 

(Image via wk1003mike/Shutterstock.com)

Threatwatch Alert

Software vulnerability

Malware Has a New Hiding Place: Subtitles

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.