This story has been updated.
The Office of Personnel Management is alerting more than 48,000 federal employees their personal information may have been exposed following a breach at KeyPoint Government Solutions, which conducts background investigations of federal employees seeking security clearances.
The total number of employees affected is 48,439, according to an email from OPM Chief Information Officer Donna Seymour obtained by Nextgov.
Seymour said OPM worked closely with the Department of Homeland Security to investigate the incident, “and while we found no conclusive evidence that [personally identifiable information] was taken by the intruder, OPM has elected to conduct these notifications out of an abundance of caution.”
Affected employees will receive free credit monitoring.
DHS spokesman S.Y. Lee on Thursday evening told Nextgov the breach was detected by a DHS entity.
"Recently, the DHS National Cybersecurity and Communications Integration Center became aware of a potential intrusion of a private sector company that conducts U.S. government security background investigations for OPM," he said in a statement. "Working with OPM and other interagency partners, the NCCIC, per standard procedure, deployed an on-site [U.S.-Computer Emergency Readiness Team] to assess and mitigate any risks identified."
"As we examine the potential impact on DHS employees, we are committed to ensuring the privacy of our workforce and will take all appropriate measures to safeguard it," he added.
Background investigators conduct interviews with employees or applicants seeking security clearances, as well as their family members, neighbors and former employers. Investigators also compile police and court records on interview subjects. Their reports are used by federal officials to determine potential employees’ suitability to hold security clearances and are a treasure trove of personal information.
An OPM statement provided to Nextgov read in part: "We take very seriously our responsibility to protect sensitive data in background investigations, and our top priority is to make sure the networks that handle that data are secure. KeyPoint has worked closely with OPM to implement additional security controls that will afford its network greater protection.”
It’s the second time this year hackers have targeted a private background-check company. Over the summer, USIS, once the government’s largest provider of checks, revealed its systems had been breached, potentially exposing information on 25,000 employees. OPM subsequently temporarily suspended work with the company in the wake of that breach and later severed ties altogether.
“Following the discovery of the problem, KeyPoint implemented numerous controls to strengthen the security of its network,” Seymour's email stated. “The immediacy with which KeyPoint was able to remediate vulnerabilities has allowed us to continue to conduct business with the company without interruption.”
A month before the USIS hack, OPM's own networks were breached, with news reports indicating Chinese hackers had infiltrated OPM's databases, potentially in pursuit of the personnel files of security clearance holders.
KeyPoint did not immediately return phone calls and emails seeking comment.
DHS says it inspected other background check firms for vulnerabilities following the USIS breach.
The U.S.-CERT, the agency's cyber-response squad, analyzed similar companies for “indicators of compromise,” revealed Brad Nix, US-CERT’s deputy director, who spoke earlier in the week at a Washington, D.C., cyber summit.
Camille Tuutti, Jack Moore and Aliya Sternstein contributed to this report.