Army commands databases hacked, info of 36k accessed

Share this article:

Databases belonging to various Army commands were hacked, allowing thousands of individuals' sensitive information to be accessed by attackers.

How many victims? Around 36,000 people

What type of personal information? Names, birth dates and places, Social Security numbers, home addresses and salaries.

What happened? During the breach, which was discovered Dec. 6, information of Fort Monmouth visitors was taken, as well as personnel files from the U.S. Army Communications-Electronics Command (CECOM) Software Engineering Center, which provides services equipment and electronic system support for the Army.

What was the response? The hacked databases were taken, and currently remain, offline. Those affected will receive free credit monitoring services for a year provided by the Army. The CECOM Chief Information Office is also answering questions by phone.

Details: Those impacted may include the commands CECOM and Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR), which were both located at Fort Monmouth before it closed in September 2011. The commands are now located at Aberdeen Proving Ground in Arberdeen, Md.

Source: www.app.com, Asbury Park Press, “Hackers take data of 36,000 people at fort,” Dec. 28, 2012.

Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in The Data Breach Blog

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US

More in The Data Breach Blog

Sourcebooks payment card breach impacts more than 5,000 customers

More than 5,000 customers had personal information stolen, but roughly 9,000 notification letters were sent out as a precautionary measure.

Cyberswim notifies customers that payment card data may be at risk

Malicious software installed on Sept. 24 may have compromised personal information for visitors that made purchases between May 12 and Aug. 28.

Marquette University notifies graduate applicants of possible breach

Settings for an internal file server were inadvertently modified, making graduate school applications accessible to anyone with Marquette University login credentials.