Nation-state Hackers Breaches Alaska Department of Health

Share post:

Alaska’s Department of Health and Social Services (DHSS) released a statement revealing that the security breach which attackers infiltrated DHSS networks was committed by a sophisticated attacker on a national level.

According to reports, the person gained access to the organization’s network through one of its publicly accessible websites before moving on to deeper resources.

Back in August, an update to the investigation showed that the intrusion was a direct, sophisticated attack and not a mere ransomware attack.

Scott McCutcheon, DHSS technology officer, commented on how advanced and sophisticated the attackers were: “This was not a ‘one-and-done’ situation, but rather a sophisticated attack intended to be carried out undetected over a prolonged period. The attackers took steps to maintain that long-term access even after they were detected.”

In the attack in question, the attackers gained access to “any data stored on the department’s information technology infrastructure,” including full names, dates of birth, social security numbers, and more.

For more information, read the original story in Arstechinca.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, April 26, 2024 – Patch warnings for Cisco ASA gateways and a WordPress plugin

This episode reports on the malicious plugin worm that refuses to die

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways