The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived

Spread the love

The second trump There is a first federal cybercuity defeat to deal with the administration.

A violation of the Electronic Case filing system of the Federal judiciary of the United States, discovered near July 4, pushed back the backup paper-filing plan Hack The compromised sealing court records and probably the identity of the confidential informants and cooperation witnesses across the United States of the United States.

More than a month after the invention of the violation – and despite the recent report New York Times And Politico The Russia hack was involved in the Hack – it is still clear what it happened and what data and systems were affected.

Politico First report “Case Management/Electronic Case files,” or CM/ECF, system violations, which can affect criminal docket, shipping warrants and sildened complaints. CM/ECF System also was the first Trump administration in 2021 and was subjected to Politico violation Report Tuesday, in recent attacks, hackers used the disappearing software weaknesses after the discovery five years ago in response to the first incident. Protection researchers say that the gaps of public information about the situation are related to the gaps of the information, especially when it lacks precision about what data it is affected.

“We have for more than a month to detect this intrusion and still have the entire accounting of what has been affected,” the former NSA hacker of Hunter Strategy and the current vice president of research and development Jack Williams said. “If we do not have enough logging to restructure our attack activities, it will be extremely disappointing, because this system has been targeted repeatedly over the years.”

In response to the request of the comment, the United States Courts have mentioned the wired The statement of August 7Which is said that the Federal Judicial Department is taking additional steps to strengthen the protection for sensitive case documents “and” increasing the protection of the system. ” The courts also mentioned that “the vast majority of documents filed with the Electronic Case Management System of the judiciary are not confidential and are easily available to the public,” some filing contains confidential or owned information that has been sealed from public view. “

The judiciary did not respond with the request to comment on the opportunity to violate or who did it.

This week it has reported that Russia was involved in the attack or the only criminal that could be the only criminal, spy -backed actors – and perhaps organized crime syndicates – may be involved in violation for their own exhaustion or involved in piggacking.

John Hullwest, chief analyst of Google’s threat intelligence group, has said that multiple actors are sensitive and potentially weak, it is not uncommon to shake the system. “Investigations are regularly targeted by cyberspenage actors in several countries,” he said.

News of the Trump administration detectives and cybercuity agencies continued to make federal staff forces with combing Removal of officers Or press them to resign.

“I think federal investigators probably know who was behind the attack, but because of the climate, I would doubt that no one wants to say with certainty,” said Williams of Hunter Strategy, “Hunter Strategy said.

Multiple administrations have fought to operate on the notorious spy operations, especially the promotions committed by Chinese and Russian actors. However, researchers emphasized that after the 2021 violation, the weaknesses of the CM/ECF should be addressed.

Senior threat to Cybercuity Firm Security Researcher Tim Pek said, “CM/ECF or pacers are sealing via Air -gaped systems or secure networks or managing highly sensitive documents.” Establishing continuous, centralized logging – all other things – all different CM/ICF exchanges before detecting all other things. And may enable rapid mites. “

In other words, high -target systems like the US court are probably going to be subjected to violations. However, the best way to reduce the possibility and severity of these attacks is to make sure the flaws are actually fixed after the first absorption.

Leave a Reply

Your email address will not be published. Required fields are marked *