- Apparently, a data violation has reached the United States Coast Guard.
- Payment checks of more than a thousand employees have been affected
- The Coast Guard is investigating the incident
A data violation has affected the personnel and payroll systems of the United States Coast Guard, and has impacted the payment of the members, and has forced the agency to be offline to avoid greater intrusion until “to the” less on February 19, 2025 “.
The Coast Guard told Cybernews that “investigates the violation of the data within its personnel and payroll system, which has affected the punctuality of the biweekly payment to 1,135 members.”
According to reports, the confidential financial information of the members of the service was presented in the Hack, which means that they could be at risk of fraud or theft of identity, so it could be dangerous for anyone exposed, this is what we know until now.
Committed accounts
The data violation was discovered by a Junior NCO, which alerted the irregular activity agency in its account, and the source of rape is still unknown.
The complete scope of the violation has not been determined either, and the Coast Guard has confirmed that “it will ensure that it is resolved as soon as possible.”
“At the same time, the Personnel Service Center of the Coast Guard and the Personnel and Personnel Center are speeding up the payment to any member of the Coast Guard impacted,” the agency said, calling “the men and women of the force USCG labor our most valuable resource. “
The payment center and service personnel have eliminated its military direct access system and the out -of -line benefits system while investigating the problem, but the spokesman confirmed that the members will be paid “as soon as possible.”
The spokesman for the coast guard reiterated Cybernews Its members “deserve transparency in the causes and resolution of this incident” and that through “continuous response and research”, the USCG “will continue to provide timely updates to the workforce.”
In April 2024, the Coast Guard Reserve suffered a violation of data that presented the private information of thousands of people, including housing addresses, employee identification numbers and names.
With an increase in the cybercriminal activity of dishonest national states worldwide, it is not surprising that critical infrastructure and government agencies are being attacked. In fact, military and defense contractors of the United States have been increasingly attacked by infostalist malware, with the US Army, Navy, Lockheed Martin, Boeing and others affected.
Employees at risk
Since personal identification information was leaked as part of this violation, there is a risk for those affected. Financial information puts staff at risk of fraud, such as fake credit card claims, so employees must ensure monitoring their accounts with great care.
With any data violation, a serious danger is the risk of identity theft for families and employees, with which these plans can help. Staying aware of their accounts and data is the basis of this, but plans often offer insurance, dark web monitoring and antivirus software to keep it protected in one place.
In addition to that, social engineering attacks such as phishing are a risk, because attackers can use the personal information obtained from rape to build a specific (generally) email that refers to family members, websites, websites that uses, the company for which you work or other convincing fraud.
This will often drive the victim to the action, such as clicking on a link, enter credentials or scan a QR code. Our advice is never clicking on links or scan codes that do not trust 100%, and be very cautious of the communications that you do not expect.
It is unlikely that banks send an email or call it out of nowhere, and so are social media companies or the communication platforms they use, and they will not ask for their information. If you receive an email from one of these, you are not sure, look for the official email address and compare, or call the company to verify.
Be sure to create a strong and safe password and a single for all platforms that contain medical or financial information (such as banks and messaging applications); This takes care of any account that suffers a data violation.
It is also important to enable multifactor or MFA authentication. Although this can be a nuisance, it is an additional security layer and gives it peace of mind knowing that criminals would face an additional barrier to steal their data.