Original Story on (SecurityWeek)
A federal law enforcement agency within the Department of Justice, USMS supports the federal justice system by tracking down fugitives, protecting government witnesses and their families, executing federal court orders, and more.
The incident, chief of the Marshals Service public affairs office Drew Wade said on Monday, was identified on February 17 and involved a standalone system that was immediately disconnected from the network.
In addition to sensitive information about USMS investigations, Wade said, the infected system contained personally identifiable information.
“The affected system contains law enforcement sensitive information, including returns from legal process, administrative information, and personally identifiable information pertaining to subjects of USMS investigations, third parties, and certain USMS employees,” the spokesperson said.
USMS, which has discovered that data was exfiltrated from the impacted system, is treating the attack as a major incident but says it has been able to continue operations.
According to NBC News, no information related to the Witness Security Program, also known as the witness protection program, was compromised in the attack, and no one in the program is at risk because of the incident.
The Department of Justice has launched a forensic investigation into the ransomware attack, Wade said.
SecurityWeek has contacted USMS for a statement on the attack and will update this article as soon as a reply arrives.
“The US Marshals Service is one of America’s highest ranking law enforcement authorities, and it possesses highly sensitive information related to national security, witness protection programs and convicted felons. As a result, the information obtained in this breach will be highly sensitive and could be used in extortion, sold onto nation state actors, or even put the safety of US citizens at risk if their personal information, like address details, are exposed,” Ryan McConechy, senior consultant at Barrier Networks, said in an emailed comment