Skip to main content

Office of the Personnel Management (OPM) Data Breach: A Case Study

OPM Breach Numbers ‘Enormous’ - BankInfoSecurity

WHAT HAPPENED IN THE OPM DATA BREACH

    As the relationship between humanity and technology develops, an emergent area of concern lies in the security of the information ferried over and handled by this technology. A myriad of information security and data breaches reported upon by news media in the recent past has had the simultaneously fortunate and unfortunate effect of bringing information and network security into the public consciousness. One such incident was the United States (US) Office of the Personnel Management (OPM) data breach.

    While there are many aspects of the OPM data breach that are notable, chief among them is that the perpetrator of this data breach has been widely attributed to China. As China increases its economic clout and develops its technological capabilities, its international presence is becoming more and more pronounced—and not always in the best light. Sanger (2018) has noted that by 2009, Google executives had noticed state-sponsored Chinese hackers inside their networks (p. 107). Google is not the only victim. Since 2009, Goldsmith (2015) has documented no fewer than twenty cyberattacks on US organizations that range from airlines (United and American Airlines) to the energy sector (SolarWorld, Westinghouse), media outlets (New York Times) to research and development (R & D) entities (Penn State University and NASA). These attacks are all widely attributed to China. Furthermore, as recent as last year, the New York Times (Sanger, Perlroth, Thrush & Rappeport, 2018) has reported that not only has there been another large-scale US data breach—this time it was the Marriott chain of hotels—but that this was also attributable to Chinese attackers. As such, there is evidence to suggest that the OPM data breach is only one of several of its kind. Albeit significant and expansive in scope, presumably, it is only

    one of many operations designed and implemented to serve China’s foreign policy. In looking at the OPM data breach in context with other attacks of a similar nature, the patterns established not only reify many of the ideas and concepts discussed by Classical Strategists such as Sun Tzu, Thucydides, Clausewitz and Corbett, but they also suggest a worrying trend in US-China relations that, if mismanaged, could lead to unwelcome internecine escalation.

    News of the OPM data breach first rattled the public in the middle of 2015. Yet, inklings of the incident were reported as early as July of 2014 (Schmidt, Sanger & Perlroth, 2014). Whereas Washington, in 2014, confidently stated that they had “no reason to believe personally identifiable information for employees was compromised” (Schmidt et al., 2014) in the OPM cyberattack in November 2013, by 2015, the winds had shifted drastically. The initial report of the hack on OPM was presented as fairly innocuous: it involved the stealing of “manuals about OPM IT assets” (Sternstein & Moore, 2015). The perpetrators of this hack were dubbed X1 (Fruhlinger, 2018). However, later discoveries indicated that by December of 2013, hackers had successfully infiltrated two of OPM’s contractors, US Investigation Services (USIS) and KeyPoint Government Solutions. The attackers had been in “both contractors’ systems for months before being detected.” (Sternstein & Moore, 2015) It is believed that these attackers, dubbed X2, had used stolen credentials from KeyPoint to access OPM servers. According to Fruhlinger, (2018) once X2 had accessed OPM servers and gained root access, it not only had access to all of OPM’s networks, but it was also then able to install a variant of the PlugX malware, “a remote-access tool commonly deployed by Chinese-speaking hacking units” (Koerner, 2016). By May of 2014, X2 intruders had successfully accessed past and present personnel files (Koerner, 2016).

    It was almost fortuitous and by chance that the Americans discovered this data breach. As Koerner (2016) has reported, on the morning of April 15, 2015, an OPM security engineer, Brendan Saulsbury, had uncovered some outbound traffic going to a domain named “opmsecurity.org”. This was peculiar because OPM did not own this domain. Further investigation by Saulsbury and his colleagues revealed that the source of the outbound traffic came from a file named “mcutil.dll” (Koerner, 2016) which is the name of a customary component of proprietary McAfee security software. This would be fine if OPM used McAfee security software, but OPM did not. Saulsbury and his colleagues would later find that mcutil.dll was a cloak intended to hide a piece of malware that gave an intruder access to the OPM servers. (Koerner, 2016) Further investigation revealed that the malicious actor had installed approximately 2000 different pieces of malware over OPM’s network (Koerner, 2016). Yet, further investigation into the domain “opmsecurity.org” (Koerner, 2016) revealed that it was registered to Steve Rogers, the civilian name of the Marvel character Captain America. Furthermore, “opmsecurity.org” (Koerner, 2016) was shown to have been registered in April 25, 2014, which meant that traffic could have been going to this domain for a whole year. All signs were pointing to foul play.

    As the story developed, revelations about the OPM data breach proved worrisome. As Segal (2018) has reported, this data breach affected “22 million records, including security background checks and data on intelligence and military personnel, as well as the fingerprint data of 5.6 million people.” (p. 115) Not only did the OPM data breach include Standard Form 86 (SF-86)—a comprehensive 127-page screening form that anyone who seeks a security clearance with the American government is required to complete—but this data breach also, according to Adams (2016), included “clearance adjudication information”. This information is used to determine “eligibility for access to classified information” (Adams, 2016) and is even more expansive and probing than the scope of SF-86. Data from SF-86 forms could include sensitive and personal pieces of information such as family details, social security numbers, foreign relationships, travel history and the mental and physical health of person (Inklea, Christensen, Fischer, Lawrence, & Theohary, 2015). Yet, clearance adjudication information could be even more probing “rang[ing] from information on ‘sexual behavior’ that ‘reflects lack of discretion or judgement’ to evidence of ‘foreign influence’ ”. (Adams, 2016) Furthermore, “a simple Top Secret single-scope background investigation includes a ‘Personal Subject Interview’ and ‘interviews with neighbors, employers, educators, references and spouses/cohabitants.’ ” (Adams, 2016)

    In investigating the malware and trying to piece together the actions of X1 and X2 and what they had stolen, the evidence seemed to suggest that X1 and X2 were attributable to China. Digital footprints left by X1 and X2 hackers such as destination “IP addresses… [and] telltale email accounts” (Koerner, 2016) strongly suggest that the source of the attack is China. Furthermore, around the same time that the OPM data breach occurred, American healthcare insurer Anthem experienced a similarly large-scale data breach involving the medical records of 80 million Americans (Goldsmith, 2015). Investigations into the Anthem data breach revealed a similarity: traffic going to a domain, not registered to Anthem, but to a Tony Stark, the civilian handle of Marvel’s Iron Man. What is even more damning is that the domain was called “opm-learning.org” and this data breach was largely attributed to China as well (Koerner, 2016). Furthermore, several characteristics about these data breaches also suggest that they are state-sponsored attacks: (1) The exfiltrated data—from both OPM and Anthem—has not appeared on the Internet or been sold for commercial gain (Inklea et al., 2015). (2) The expansive scope of these data breaches coupled with the attackers’ persistence suggests motives beyond petty crime. As previously mentioned, the OPM network had over 2000 different pieces of malware installed over various parts of the network. Such redundancy is suggestive of a state-sponsored attack as it is significantly less likely that a private actor would expend such time, effort or resources let alone have access to such resources.


Note: For Complete report "Analyzing US-China Relations through the Lens of Classical Strategy Office of the Personnel Management (OPM): A Case Study" Please contact either of the Authors.


Credit:

Carmen Wong

Charvik Patel

Gordon Bazinet


References:   

    Adams. M. (2016, March 11). Why the OPM hack is far worse than you imagine. Lawfare. Retrieved from https://www.lawfareblog.com/why-opm-hack-far-worse-you-imagine

    Fruhlinger, J. (2018). The OPM hack explained: bad security practices meet China’s Captain America. CSO. Retrieved from https://www.csoonline.com/about/about.html

    Gidda, M. (2013). Edward Snowden and the NSA files. The Guardian. Retrieved from https://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa-files-timeline

    Goldsmith, J. (2015). Disconcerting US cyber deterrence trouble continues. Lawfare. Retrieved from https://www.lawfareblog.com/disconcerting-us-cyber-deterrence-troubles-continue

    Inklea, K., Christensen, M., Fischer, E., Lawrence, S., & Theohary, C. (July 17, 2015). Cyber intrusion into US Office of Personnel Management: In Brief. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/natsec/R44111.pdf

    Koerner, B. I. (2016, October 23). Inside the cyberattack that shocked the US government. Retrieved from https://www.wired.com/2016/10/inside-cyberattack-shocked-us- government/

    Macias, A. (2018). The extraordinary reading habits of defense secretary James Mattis. CNBC. Retrieved from https://www.cnbc.com/2018/09/13/defense-secretary-james-mattis- extraordinary-reading-habits.html

    Maurer, T. (2018). Cyber mercenaries: the state, hackers, and power [Amazon Kindle version]. Cambridge: Cambridge University Press. Retrieved from Amazon.com

    McGee, M. K. (2017). A new in-depth analysis of anthem breach. Bank Info Security. Retrieved from https://www.bankinfosecurity.com/new-in-depth-analysis-anthem-breach-a-9627

Comments

  1. I generally check this kind of article and I found your article which is related to my interest. Genuinely it is good and instructive information. Thankful to you for sharing an article like this.Hire a hacker

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete
  3. It is really a helpful blog to find some different source to add my knowledge.
    poofe

    ReplyDelete
  4. I got some valuable points through this blog. Thank you sharing this blog.
    Security services

    ReplyDelete
  5. Nice and interesting information and informative too.
    women perfume set

    ReplyDelete

Post a Comment

Thanks

Popular posts from this blog

Emotional and Psychological Trauma

What is Emotional and psychological trauma ? Emotional and psychological trauma is any stressful event that occurs in a lifetime that makes you struggle with your emotions, memory,different activities and make you feel helpless and hopeless in this ruthless world. The event may not be objectively scaled it is a subjective sensation about a event and every individual respond differently to the event . For example a death in a family due to accident due to an pothole makes one dad react positively and he goes on to correct every pothole of the city and some other may react it negatively Emotional and psychological trauma can be caused by: In Indian scenarios emotional and psychological trauma can be caused by accident,disasters, sexual assault that may have occurred at any course of life Ongoing family issues, neighbourhood problems , continues rejection from various interviews , household violence , neglect, low performance at school or institution, contin

Are You Prepared Against Cyber Threats?

What is the worth of information Security in 21 st century? Imagine small or medium scale business having around 2500-4000 employees working. What if there is a data bridge of small or medium scale compony? Information carries by Venture are employees’ names, Address, Banking Forms, Tax forms which also includes Social incurrence Number and their dependents names and supporting information which may be sell or used for personal blackmails by intruders which was kind of storyline of Scotty’s Holdings data bridge [1] . Main base of this data bridge was email phishing which were send to all over compony employee pretending to be CEO. Which contains Employer identification number (EIN), Employer’s name, address, and ZIP code, Wages, tips, other compensation and many more fields. But it’s not the first or last compony to be a part of Email phishing Attack. Main purpose of Email Phishing scams is stealing banking credentials or any other form of credentials. Preventions Employer and Emp