FEMA Has Apparently Been Pwned… And Pwned Big

It is being reported that an unidentified hacker stole sensitive data from Customs and Border Protection and Federal Emergency Management Agency employees in a “widespread” breach this summer that lasted several weeks. 

Ensar Seker, CISO at SOCRadar had this to say:

“This breach targeting both FEMA and Customs and Border Protection highlights the growing risk of lateral movement across interconnected federal systems, especially when regional network segments are left exposed. A compromise that lasted “several weeks” without detection suggests not just a failure of preventive security controls, but likely gaps in real-time monitoring and behavioral anomaly detection.

The fact that the attacker gained deep access to a FEMA environment that supports critical emergency operations across several states is particularly alarming. This isn’t just a data breach; it’s a breach of trust in systems that Americans rely on during disasters. If the attacker maintained persistence long enough to pivot laterally, they could have exfiltrated sensitive employee PII, internal operational planning data, and potentially even response coordination protocols, all of which could be weaponized in future incidents.

What makes this more concerning is that no threat actor has been named yet. The longer attribution remains unclear, the greater the uncertainty for federal employees, partners, and the public. The incident underscores the urgency for agencies like DHS to implement more robust Zero Trust architectures, extend attack surface visibility into traditionally siloed regional environments, and continuously audit access paths, especially for hybrid or legacy systems.

We’re seeing a rise in state-linked threat actors exploiting weakly segmented infrastructure and federated identities across agencies. This breach is a textbook case of why cybersecurity shouldn’t be managed in operational silos. For federal agencies, the stakes aren’t just reputational or financial. They’re national security.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech

“A breach that lasts several weeks usually implies that DHS failed to properly secure the data. If the data was left exposed to the internet for that long, then any number of hackers could have found and stolen it in that time. I surmise that hackers exploited the CitrixBleed vulnerability in an unpatched version of the Citrix NetScaler software, which is used for VPNs and other network gateways.  CISA, which is also run by the federal government, issued guidance on how to avoid CitrixBleed in 2023. 

The big questions we should be asking now is if it’s possible that more than one unauthorized party accessed the data, whether any of them were state-sponsored or political actors, and what data was stolen.”

This is not just bad. It’s insanely bad. The fact that the threat actor was running around for weeks inside a government network should not be a thing. Yet here we are talking about it. This shows that there needs to be a big shake up when it comes to cybersecurity in the US government.

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading