Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

The System Remains Vulnerable

The Office of Personnel Management (OPM) was the victim of a cyber-attack in 2014.  Hackers (the Chinese are suspected) gained access to OPM’s local-area network on or about May 7, 2014 by stealing credentials and then planting malware and creating a backdoor for exfiltration.  Actual exfiltration of data on background investigations did not begin until July 3, 2014, and it continued until August. In October 2014, the hackers pivoted to the Interior Department center where OPM’s personnel records resided. On December 15, 2014, the intruders siphoned that data away.  OPM did not discover that they had a problem until April 15, 2015.  The attack was successful in stealing personal data on 22 million current or former federal employees.

While the number of personnel files is staggering, why is this the most significant breach of the U.S. Government (USG) to date?

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

The Houthi Balancing Act After Israel’s Attack on Iran

OPINION — How will the Houthis respond to the devastating Israeli strikes on Iran? This moment could prove decisive for both the Iran-led axis and [...] More
The Attack that Knocked Back Iran’s Nuclear Program

The Attack that Knocked Back Iran’s Nuclear Program

EXPERT INTERVIEW — Israeli airstrikes against targets associated with Iran’s nuclear program early Friday have seemingly dealt a devastating blow as [...] More

Dead Drop: June 13

SHOULD GREENLAND AND PANAMA BE (EVEN MORE) NERVOUS: Defense Secretary Pete Hegseth was engaged in a war of words this week with lawmakers during a [...] More
Report for Friday, June 13, 2025

Report for Friday, June 13, 2025

9:07 AM America/New_York Friday, June 13 [...] More

China Wants Our Hearts. Literally.

OPINION — China is pre-positioning itself on U.S. networks for disruptive and destructive attacks against our critical infrastructure. In the past [...] More