Unsecured webpage put 7,000 vets at risk for years
- By Adam Mazmanian
- Jan 05, 2015
The Department of Veterans Affairs has disclosed a security flaw in a patient database that put information on more than 7,000 veterans in public view.
The information, including names, Social Security numbers and birthdates was contained in a single document that could be accessed via a specific web address on a public facing telehealth website run by a Veterans Health Administration contractor. The name of the contractor was not released. The flaw was first reported to the VA on Nov. 4, and was publicly announced in a Christmas Eve news release.
According to a VA incident report released by the agency, the personal information was exposed for several years. The web address was not linked within the site, per the incident report, and a user would have to have knowledge of the address to access the document.
The VA was alerted to the security flaw via an anonymous email, believed to have been sent by a contractor employee, which included personal information on five veterans. The email was sent to senior leaders at VA, triggering an investigation. The security flaw was quickly patched with the assistance of the VA's Network and Security Operations Center (NSOC), and monitoring services were offered to 7,054 veterans whose information was potentially compromised.
A VA spokesperson contacted by FCW didn't clarify whether the anonymous source for the security flaw was acting as a whistleblower, or had some other agenda. The incident report indicates that the vendor identified and fired one employee as the likely culprit, although that employee denied being the source of the email. An NSOC review of the vendor's user logs couldn't definitely conclude who had accessed the data, or whether the entire contents of the database were compromised. The document in question was accessed, according to usage logs, but it's not known by whom, or whether the information was copied by the user.
VA is a popular target for cyber criminals. Network defenses detected more than 15 million intrusion attempts in November alone, and blocked more than 88 million suspicious inbound emails. The Einstein 3 network monitoring tool operated by the Department of Homeland Security is the first line of defense for the agency, and regularly deflects millions of potentially risky inbound emails and other possible attacks.
But even with Einstein 3 in place, the VA still has work to do to satisfy internal security auditors. The VA flunked its fiscal 2014 audit as required under the Federal Information Security Management Act. In a November call with reporters, VA CIO Stephen Warren said that outstanding fixes from the 2013 FISMA report needed to be put in place, and that the 2014 report, due out in March, will seek improved standardization in system configuration and tighter access controls.
Although the website flaw has been fixed, the VA is planning to further investigate the possible exfiltration of the veterans' data from the VA network, according to the incident report.
Adam Mazmanian is executive editor of FCW.
Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy and the Department of Veterans Affairs. Prior to joining FCW, Mazmanian was technology correspondent for National Journal and served in a variety of editorial roles at B2B news service SmartBrief. Mazmanian has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, New York Press, Architect Magazine and other publications.
Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.