Connecting to LinkedIn...



Classified information at risk after US government website hacked

19/09/2014 by


The security breach involves account information for an estimated 5,000 U.S. government recruiters for The breach, which occurred August 13th of this year, was discovered when IntelCrawler, a California based security company, found a database of names and account information being sold "underground." The compromised accounts belong to a wide range of recruiters, including those from every branch of the U.S. military, the National Security Agency (NSA) and other government agencies, along with accounts for top government defense contractors. The company reported incident to the Homeland Security’s U.S. Computer Emergency Readiness Team (US-CERT), who is investigating the security breach according to The Daily Caller.

Authorities worry that hackers may use the information to impersonate government recruiters in an attempt to gain obtain classified information from job seekers. There is also concern that the stolen information can be compared to information gained from other hacking incidents. Information related to financial records, alcohol or drug use or other sensitive information could be used for blackmail purposes according to IntelCrawler. Politico quotes Dan Clements, president of IntelCrawler, as saying:

"Hackers with such information could impersonate recruiters and tap job seekers who have knowledge of sensitive government projects, or seek damaging information about applicants to blackmail them into spying for them. They could cross-reference job-hunter lists with information, stolen in earlier hacks of commercial firms, on applicants' use of drugs, alcohol and pornography or their financial transactions. Like many Internet users, some recruiters reuse their passwords, which can put their contacts at other sites at risk as well."

Peter Osapay, operations manager for the company who runs, said he was not been notified of the data breach, but dismissed the importance of the information gained by the hackers. In an email statement Osapay said:
"Even without a hack, if an employer went through our resume database and resold it, it is mostly old data with not much use really, as it lacks many personal details acquired later at interviews."

This article has been extracted from, please click on this link to read the article in full

Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News


Dear 18-year-old me: It’s a woman’s world too

2017-03-08 09:00:00 +0000

With International Women’s Day being all about celebrating the cultural, economic, political and social achievements of women, it highlights the issue of women in technology, which remains a contentious one. Recent research from WISE, which campaigns for gender balance in science, technology and engineering, found that women only make up just 17 per cent of all IT professionals in the UK. Montash Recruitment Consultant Sadiye Booker has shared her exper...


UK threatened by serious cyber attacks every ...

2017-02-15 16:00:00 +0000

The security of the UK has been threatened by 188 serious cyber attacks in the last three months, a government security chief has said. National Cyber Security Centre (NCSC) Chief Executive Ciaran Martin told The Sunday Times that national security was put at risk by many of these attacks. Martin was speaking ahead of the official opening of the NCSC, which has been set up to protect critical services in the UK from such attacks and improve underlying i...