Trump II The administration has the first federal cyber security disaster to deal with it.
The violation of the system of providing electronic cases in the United States, which was discovered on around 4 July, has prompted some courts to backup plans yet. breakthrough The sealed court records are at risk and may endanger the identities of the laborators and the cooperative witnesses in various American states.
More than a month after the discovery of the breach – and despite the recent reports of New York Times and Politico Russia has participated in the perpetration of penetration – it is still not clear exactly what happened and any data and systems were affected.
Politico I mentioned for the first time Violation of “cases/electronic cases”, or CM/ECF, which may affect criminal cages, detention orders, and sealed accusations. The CM/ECF system also suffered a breach in 2020 during the first Trump administration, and politics I mentioned On Tuesday, in the last attack, infiltrators took advantage of the software weaknesses that remained unmunvenion after its discovery five years ago in response to this first incident. Security researchers say that the gaps in general information about the situation are related, especially when it comes to clarity about the data affected.
“We are more than a month to discover this infiltration and we still do not have a complete accountability for what is affected,” says Jake Williams, a former National Security Agency and Vice President of Research and Development at Strategy. “If we do not have enough registration to rebuild the attack activity, it will be very disappointing, because this system has been targeted over and over over the years.”
In response to the request for comment, the United States’ Wireless Courts were referred August 7 statementWho says the Federal judiciary “takes additional steps to enhance protection for sensitive cases documents” and “further enhance the security of the regime.” The courts also state that “the vast majority of documents brought to the electronic cases management system of the judiciary are not actually available to the public,” while admitting that “some deposits contain secret or owned information that is closed from a general view.”
The Ministry of Justice has not immediately responded to suspension requests about the scope of penetration or who committed them.
This week’s reports that Russia has participated in the attack or may be difficult to explain the only perpetrator of the crime, given other indications that the actors in spying are supported by multiple countries – and perhaps the organized crime has been involved in the breach of its breach.
John Hultquist, the Google’s Senior Intelligence Group, says it is not uncommon to see many actors flowing on a sensitive system, and perhaps weak. “Investigations are regularly targeting electronic actors from several countries,” he says.
The news of the breach comes as the Trump administration continues to reduce the federal workforce, including combing cybersecurity and cyber security agencies Remove officials Or press them to resign.
“I think federal investigators may know who was behind the attack, but looking at the climate, I think no one wants to say with certainty,” says Williams of Hunter.
Multiple departments struggled to deal with malicious espionage, especially the campaigns committed by Chinese and Russian actors. But the researchers assert that the weaknesses that allow the attack on the CM/ECF should have been addressed after a breach of 2021.
“The enforcement of policies that require sealed or high -sensitive documents to be addressed through closed air systems or secluded isolated networks instead of CM/ECF or Paceer, the limited exposure is significantly. It has already been recommended after 2012,” says Tim Beck, a senior researcher at Cyblessuration Securonix. “The consistent and central registration mode – among the other things – can be all the different CM/ECF counterparts have been able to detect early and rapidly dilute before the data nomination escalate as much as it happened.”
In other words, very targeted systems, such as American courts, are likely to suffer from violations. But the best way to reduce the possibility and intensity of these attacks is to make sure of actually fixing defects after exploiting them for the first time.
https://media.wired.com/photos/689ca97c4b04830d9eb71a38/191:100/w_1280,c_limit/fed-court-hack-sec-564096327.jpg
Source link