Cyberattack exposes 123,000 TSP accounts

kentoh/shutterstock.com

A sophisticated cyberattack on the computer of a third-party Thrift Savings Plan contractor compromised the personal information of tens of thousands of TSP participants.

The Federal Retirement Thrift Investment Board and Serco Inc., a contractor that provides services to the TSP, learned in April of a July 2011 attack on a Serco computer. The FBI told Serco and the board that the incident led to “unauthorized access” to accounts of as many as 123,000 TSP participants and other recipients of TSP payments.

The FBI analysis determined that files accessed by the cyberattacker contained the names, addresses and Social Security numbers of more than 43,000 individuals; some of those files also contained financial account and routing numbers. Another group of 79,000 had their Social Security number and other TSP-related information taken.

FBI officials told Government Executive Friday they could not comment on their ongoing investigation into the attack.

According to FRTIB, there is no indication the data has been misused or TSP’s website has been affected by the cyber breach. The compromised computer was immediately shutdown following the incident.

FRTIB, which oversees the TSP, sent letters Friday to all affected individuals offering information on services that can help with credit monitoring. Those participants should receive the letters Saturday or Tuesday, May 29, according to Kim Weaver, the board’s director of external affairs.

Additionally, the board and Serco have formed a response team to conduct a systemwide review of all computer security procedures. FRTIB will receive alerts to their internal records to allow for additional scrutiny of affected accounts, Weaver said.

“We sincerely regret that this event occurred,” Greg Long, executive director of the board, said in a statement Friday. “We are working with Serco and other security experts to ensure that TSP data is protected and secure.”

According to a statement from Serco, Inc. Friday, the complete forensic analysis of the breach required opening and reviewing thousands of files to determine the identity of the individuals affected and the nature of the information at risk.

“This incident fits with the increasing number of cyberattacks in which the goal of those seeking unauthorized access does not appear to include identity theft or financial misappropriation,” Serco officials said. “It is unfortunate reminder that federal government and private company IT assets, computers and data are under pervasive, sophisticated attack.”

This story has been updated.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.