Feeds

US Army loses 16,000 personnel records in South Korea

Not a M*A*S*H* rerun - ARMY 'fessed up to haXXor attack yesterday

The Power of One eBook: Top reasons to choose HP BladeSystem

Sensitive information of more than 16,000 US Army personnel stationed in South Korea, plus data on local employees and job applicants, appears to have been compromised after databases loaded with names, identification numbers and addresses were accessed by unauthorised and unknown parties.

Specific details of how the 28 May raid was launched were not disclosed. but banking details and classified data was not compromised.

The Army's South Korean outpost apologised in a letter (PDF) to troops and job seekers signed by US Army Commander Curtis M Scaparrotti.

"United States Forces Korea (USFK) was made aware of a potential theft of personal information from the Korean National Recruitment System maintained by the US Department of the Army," Scaparrotti said.

"We deeply regret and apologise for any inconvenience and concern this matter may cause you. USFK takes this compromise very seriously and is reviewing policies and practices with a view of determining what must be charged to preclude a similar occurrence in the future."

The Army was consulting with senior US and Korean officials over the incident and has pulled the affected machine from its network and switched to a different system to handle employment applications.

One of the most significant breaches to affect Defence occurred in 2008 when an infected USB drive was plugged into a laptop at a US Army base in the Middle East.

Deputy Defence secretary William Lynn said at the time the incident created a "digital beachhead" for further attacks and data exfiltration.

Another major breach occurred in 2009, when a hard drive containing details on 70 million US Army Veterans was sent to a recycling plant without first being irreversibly erased. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.