Army commands databases hacked, info of 36k accessed

Share this article:

Databases belonging to various Army commands were hacked, allowing thousands of individuals' sensitive information to be accessed by attackers.

How many victims? Around 36,000 people

What type of personal information? Names, birth dates and places, Social Security numbers, home addresses and salaries.

What happened? During the breach, which was discovered Dec. 6, information of Fort Monmouth visitors was taken, as well as personnel files from the U.S. Army Communications-Electronics Command (CECOM) Software Engineering Center, which provides services equipment and electronic system support for the Army.

What was the response? The hacked databases were taken, and currently remain, offline. Those affected will receive free credit monitoring services for a year provided by the Army. The CECOM Chief Information Office is also answering questions by phone.

Details: Those impacted may include the commands CECOM and Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR), which were both located at Fort Monmouth before it closed in September 2011. The commands are now located at Aberdeen Proving Ground in Arberdeen, Md.

Source: www.app.com, Asbury Park Press, “Hackers take data of 36,000 people at fort,” Dec. 28, 2012.

Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in The Data Breach Blog

Sign up to our newsletters

POLL

More in The Data Breach Blog

Florida medical center hit with breach for third time in two years

Aventura Hospital and Medical Center has reported a data breach for the third time in two years.

Tampa General Hospital breach impacts hundreds of patients

Tampa General Hospital is notifying 675 patients that their personal information may have been accessed, without authorization, by a former employee.

George Mason University travel system targeted for malware attack

The incident could have exposed the names and Social Security numbers of users, although no evidence has surfaced to suggest that's the case.