Someday government will take security seriously, but this in not that day. Sensitive US military emails spill online | TechCrunch
Why are sensitive military emails not end-to-end encrypted? And who is responsible for this kind of crap?
The exposed server was hosted on Microsoft’s Azure government cloud for Department of Defense customers, which uses servers that are physically separated from other commercial customers and as such can be used to share sensitive but unclassified government data. The exposed server was part of an internal mailbox system storing about three terabytes of internal military emails, many pertaining to U.S. Special Operations Command, or USSOCOM, the U.S. military unit tasked with conducting special military operations.
The server was "misconfigured" so it was access was available without a password.
The breach was disclosed to Tech Crunch by a white-hat security researcher, and TC informed the DoD.
The server was packed with internal military email messages, dating back years, some of which contained sensitive personnel information. One of the exposed files included a completed SF-86 questionnaire, which are filled out by federal employees seeking a security clearance and contain highly sensitive personal and health information for vetting individuals before they are cleared to handle classified information.
Now apparently no truly classified info was involved, but what was involved was bad enough to have been leaked over a stupid screw up.
Everybody makes mistakes. Humans are not perfect. That is why you put procedures in place to check and double check things. Once notified it took more than 24 hours for the DoD to secure the server, which they are blaming on the holiday weekend.
Or maybe I should say, "people and organizations who value security" put procedures in place... That quoted phrase apparently doesn't include large swaths of the .gov and military. (Have you ever looked at CISA directives on software updates? Apparently some parts of the .gov are going years without updating software that is known to be vulnerable and known to be exploited because, "You IT people always want to update something. Everything is fine!")
Somwhich contractor configured that and who signed off on the work?
ReplyDelete