Feeds

US feds pull travel site offline after hacker break-in

GovTrip trips up

Reducing security risks from open source software

A travel reservations website used by US government agencies remains offline more than a week after it was infected with malware that tried to install malicious code on the PCs of those who visited the site.

Agencies including the Federal Aviation Administration, the Environmental Protection Agency, and the Department of Transportation all reportedly directed employees not to use the website until further notice. (Those advisories presumably were sent prior to the the site being taken down).

"Employees should not access GovTrip from any DOT/FHWA PC while at work and we strongly suggest employees refrain from any attempts to access GovTrip using a home system or government-issued laptop as this could cause the PC to be infected with a virus that may not be detected by your anti-virus software," a Department of Transportation email sent to employees read, according to Brian Krebs's Security Fix blog, which first reported the security lapse.

The breach comes two weeks after hackers broke into the Federal Aviation Administration's computer system and accessed the names and Social Security numbers of 45,000 employees and retirees.

The General Services Administration issued a statement earlier this week that confirmed the attack took place on February 11 and said "no personal data was known to be compromised." It has yet to issue an update, and representatives didn't immediately return a phone call. Defense contractor Northrop Grumman, which Security Fix says manages the computer system, has declined to comment.

"While the attack and potential compromising of employees personal and financial information is troubling enough, perhaps more so is the complete lack of information released on this subject," Nextgov.com complained. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
L33t haxxors compete to p0wn popular home routers
EFF-endorsed SOHOpelessly Broken challenge will air routers' dirty zero day laundry
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.