{"id":21368,"date":"2023-02-28T16:10:38","date_gmt":"2023-03-01T00:10:38","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/02\/28\/news-15099\/"},"modified":"2023-02-28T16:10:38","modified_gmt":"2023-03-01T00:10:38","slug":"news-15099","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/02\/28\/news-15099\/","title":{"rendered":"US Marshals Service hit by ransomware and data breach"},"content":{"rendered":"<p>The US Marshals Service (USMS) says it&#8217;s suffered a ransomware attack in which a threat actor managed to get hold of sensitive information about staff and fugitives.<\/p>\n<p>On&nbsp;February 17, 2023,&nbsp;the attacker infiltrated a system that held information about ongoing investigations, including personally identifiable information (PII) of fugitives, staff, and third parties.<\/p>\n<p>As with most ransomware attacks nowadays, the attacker also exfiltrated data before starting the encryption routine. Ransomware gangs&nbsp;threaten to disclose stolen&nbsp;data on so-called leak sites as&nbsp;extra leverage to get&nbsp;a victim to pay the ransom.&nbsp;<\/p>\n<p>One of the tasks of the USMS is to assure the safety of endangered government witnesses and their families.&nbsp;Luckily, according to sources, the attackers didn&#8217;t gain access to any data related to the witness protection program WITSEC.<\/p>\n<p>The USMS says it is using a workaround to keep its investigations going.<\/p>\n<h2>Major incident<\/h2>\n<p>The&nbsp;USMS says the ransomware and data exfiltration event affected a single standalone USMS system.<\/p>\n<p>But even though it wasn&#8217;t connected to a larger federal network, the cyberattack was considered a major incident by officials.&nbsp;That&#8217;s&nbsp;because the breached data contains law enforcement sensitive information pertaining to the subjects of Marshals Service investigations.<\/p>\n<p>Federal agencies are required to report major incidents to Congress within seven days of identification.<\/p>\n<h2>Investigation<\/h2>\n<p>According to Drew Wade, spokesperson for the USMS:<\/p>\n<blockquote><p>&#8220;Shortly after that discovery, the USMS disconnected the affected system, and the Department of Justice initiated a forensic investigation.&#8221;<\/p><\/blockquote>\n<p>For now it is unclear which ransomware group is behind the attack. Nor is it clear how the access was obtained or whether there has been a ransom demand. It is very unlikely that such a demand will be met. A 2020 ruling by the US Department of Treasury&rsquo;s Office of Foreign Assets Control (OFAC) and the Financial Crimes Enforcement Network (FinCEN) states most cases of paying a ransom may be considered a violation of US anti-money laundering and domestic and international sanctions.<\/p>\n<h2>How to avoid ransomware<\/h2>\n<ul>\n<li><strong>Block common forms of entry<\/strong>. Create a plan for <a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">patching vulnerabilities<\/a> in internet-facing systems quickly; disable or <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/03\/blunting-rdp-brute-force-attacks-with-rate-limiting\">harden remote access<\/a> like RDP and VPNs; use <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">endpoint security software<\/a> that can detect exploits and malware used to deliver ransomware.<\/li>\n<li><strong>Detect intrusions<\/strong>. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">EDR<\/a> or <a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">MDR<\/a> to detect unusual activity before an attack occurs.<\/li>\n<li><strong>Stop malicious encryption<\/strong>. Deploy Endpoint Detection and Response software like <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">Malwarebytes EDR<\/a> that uses multiple different detection techniques to identify ransomware.<\/li>\n<li><strong>Create offsite, offline backups<\/strong>. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.<\/li>\n<li><strong>Write an incident response plan<\/strong>. The period after a ransomware attack can be chaotic. Make a plan that outlines how you&#8217;ll isolate an outbreak, communicate with stakeholders, and restore your systems.<\/li>\n<\/ul>\n<hr \/>\n<p dir=\"ltr\">Have a burning question or want to learn more about our cyberprotection? Get a free business trial below.<\/p>\n<p style=\"text-align: center;\"><span class=\"blue-cta-bttn\" style=\"background-color: #0d3ecc; line-height: 50px; padding: 0 20px;\"><a style=\"color: #fff;\" href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">GET STARTED<\/a><\/span><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/us-marshals-service-hit-by-ransomware-and-data-breach\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/ransomware\" rel=\"category tag\">Ransomware<\/a><\/p>\n<p>Tags: US Marshalls<\/p>\n<p>Tags:  WITSEC<\/p>\n<p>Tags:  usms<\/p>\n<p>Tags:  ransomware<\/p>\n<p>The US Marshals Service has suffered a ransomware attack in which an attacker managed to get hold of sensitive information about staff and fugitives.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/us-marshals-service-hit-by-ransomware-and-data-breach\" title=\"US Marshals Service hit by ransomware and data breach\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/us-marshals-service-hit-by-ransomware-and-data-breach\">US Marshals Service hit by ransomware and data breach<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[32,3765,28771,28773,28772],"class_list":["post-21368","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-news","tag-ransomware","tag-us-marshalls","tag-usms","tag-witsec"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21368"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21368\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21368"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}