spacer
Sections spacer
  • News
  • Mobile & Wireless
  • Open Source
  • Personal Tech
  • Security
Blogs

South Carolina faults weak IRS standard in massive data breach

Gov. Nikki Haley has written to the IRS emphasizing the importance of encrypting Social Security numbers

By Jeremy Kirk, IDG News Service |  Data Protection

November 21, 2012, 12:11 AM South Carolina's governor faulted an outdated Internal Revenue Service standard as a contributing factor to a massive data breach that exposed Social Security numbers of 3.8 million taxpayers plus credit card and bank account data.

Gov. Nikki Haley's remarks on Tuesday came after a report into the breach revealed that 74.7 GB was stolen from computers belonging to South Carolina's Department of Revenue (DOR) after an employee fell victim to a phishing email.

People who filed tax returns electronically from 1998 on were affected, although most of the data appears to be after 2002, Haley said during a news conference.

South Carolina is compliant with IRS rules, but the IRS does not require SSNs to be encrypted, she said. The state will now encrypt SSNs and is in the process of revamping its tax systems with stronger security controls. She said she has sent a letter to IRS to encourage the agency to update its standards to mandate encryption of SSNs.

The lack of encryption and strong user access controls plus dated 1970s-era equipment made DOR systems ripe for an attack, she said.

"This is a new era in time where you can't work with 1970 equipment," Haley said. "You can't go with compliance standards of the federal government."

The report, written by the security company Mandiant, found that an employee's computer became infected with malware after the user opened a phishing email. The hacker captured the person's username and password, which allowed access to the agency's Citrix remote access service.

From there, the hacker installed various tools that captured user account passwords on six servers. The hacker eventually gained access to three dozen other systems. Mandiant wrote that the hacker used at least 33 unique utilities and malware, including password dumping tools, administrative utilities, batch scripts and generic database command utilities.

The hacker used a utility called 7-Zip to compress information, creating 15 encrypted archived files that, if uncompressed, contained 74.7 GB of data. The data was moved to another server within DOR before it was eventually moved to another system on the Internet, the report said.

The 23 stolen database files contained a mix of encrypted and unencrypted data, the report said. The hacker appears to have only obtained an encrypted key for the encrypted data, which could not be accessed. But there was plenty of other plain-text data.

The data included SSNs for 3.8 million tax filers and information on 1.9 million dependants, Haley said. Information belonging to 699,900 businesses was compromised, along with 3.3 million bank accounts and 5,000 credit card numbers, she said.

  • 1
  • 2
  • next ›
  • last »
Twitter Google+ LinkedIn Facebook Email
The Most

The Most

  • Read
  • Emailed
  • Commented
  1. Red Hat doubles down on platform as a service (PaaS)

  2. Russian dashboard cameras, YouTube beam meteor explosion worldwide

  3. COBOL will outlive us all

  4. Obama executive order redefines critical infrastructure

  5. Facebook can stick with its real name policy for now, German court rules

  1. COBOL will outlive us all

  2. 7 days with the Amazon Kindle Fire HD: Revealing its inner power-tablet

  3. California terminates contract with SAP over massive, troubled IT project

  4. BYOD nightmare: iOS devices hobble Exchange servers when they synch

  5. 10 facts about Earth you maybe didn't know

  1. 7 frustrating things about being a programmer

    6 comments

  2. COBOL will outlive us all

    6 comments

  3. 7 days with the Amazon Kindle Fire HD: Revealing its inner power-tablet

    4 comments

  4. Big Data is a solution looking for a problem: Gartner

    3 comments

  5. New Xbox 720 rumor: Now Kinect is required!

    3 comments

White Papers & Webcasts

Data ProtectionWhite Papers & Webcasts

White Paper

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster

White Paper

Meeting the Backup Challenges of Mixed Physical and Virtual Environments

White Paper

A Practical Guide To Protection and Leveraging Your Virtual Environment For Rapid Recovery

See more White Papers | Webcasts

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.