DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Hackers stole feds’ information four years ago. Now we know what criminals did with it.

Posted on June 19, 2018 by Dissent

Wow. Rachel Weiner reports that data in the Office of Personnel Management (OPM) hack may have shown up as part of a fraud scheme:

Four years after hackers stole personal information from over 22 million people through the Office of Personnel Management, a fraud scheme exploiting that data has come to light in southeast Virginia.

Two people have admitted in Newport News federal court that they used the stolen identities to take out fake loans through a federal credit union. The case appears to be the first involving OPM data to be publicly revealed by the Justice Department.

Read more on The Washington Post.

Update: So that headline may have been a bit optimistic. Looking through the court filings in Cross’s case, I don’t see any hard evidence that the data used in this fraud scheme came from the OPM hack. So far, the closest I’ve found is one sentence in the “Statement of Facts” used as part of the plea deal that says:

6. Investigators determined that many of the identity theft victims had been victims of the United States Office of Personnel Management data breach and resided in Colorado.

Not exactly super-compelling, is it? So maybe we do have some evidence of misuse of the data. Or maybe we don’t.

Category: Government SectorHackOf NoteU.S.

Post navigation

← 95 e-commerce fraudsters arrested in international operation – Europol
Flightradar24 suffers security breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Oklahoma Expands its Security Breach Notification Law
  • Ransomware group Gunra claims to have exfiltrated 450 million patient records from American Hospital Dubai.
  • North Shore University Sleep Disorders Center employee charged with secretly recording patients in restrooms
  • When ransomware listings create confusion as to who the victim was
  • Rajkot civic body’s GIS website hit by cyber attack, over 400 GB data feared stolen
  • Taiwan’s BitoPro hit by NT$345 million cryptocurrency hack
  • Texas gastroenterology and surgical practice victim of ransomware attack
  • Romanian Citizen Pleads Guilty to ‘Swatting’ Numerous Members of Congress, Churches, and Former U.S. President
  • North Dakota Enacts Financial Data Security and Data Breach Notification Requirements
  • Pro-Ukraine hacker group Black Owl poses ‘major threat’ to Russia, Kaspersky says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Florida ban on kids using social media likely unconstitutional, judge rules
  • State Data Minimization Laws Spark Compliance Uncertainty
  • Supreme Court Agrees to Clarify Emergency Situations Where Police Don’t Need Warrant
  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.