DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

No need for Russia to hack the House of Representatives if the House keeps leaving its doors open.

Posted on November 5, 2018April 3, 2025 by Dissent

In early August, “Flash Gordon” (@s7nsins on Twitter) contacted me to say that he discovered a leak involving the House of Representatives.

Oops. Leak discovered by “Flash Gordon” in August. IP address redacted by DataBreaches.net.

In light of all the talk about Russia trying to hack our elections, I decided that we probably should notify the House right away in case there was any kind of sensitive files exposed. At the very least, Flash had informed me that there were email addresses and passwords in the exposed intranet files, although the passwords were not in plain text, he reported.  Ironically, perhaps, the exposed material contained more than 17,000 references to “security,” including cybersecurity attacks.

Notifying the House of their leak was one of those misadventures in notification that I should probably write a book about one day.  Calling the House switchboard and asking to speak to whomever was responsible for their cybersecurity resulted in me being bounced from extension to extension for the next hour or so. No one seemed to know what office I should be connected to.  And in the middle of this frustrating weirdness, an intern, who shall go nameless, even said to me that the cybersecurity team already knew that the intranet was leaking and they were probably working on it. What??

Eventually I found someone who was willing to take a message. Within a few hours, I received a call back from someone who was actually involved in cybersecurity. He told me that I should have asked for the “Chief Administrative Officer of the House.” I told him that they needed to review with the switchboard how to direct or escalate calls, as I doubt most callers would know to ask for that chief administrative officer, and when people get bounced all over the effing place, they may give up and not notify the House of a leak.

The person I spoke with agreed and said the feedback was helpful and that he had never heard that before.

Well sure. He probably never heard it before because everyone else gave up before they ever got through to him.

In any event, they locked down the leak and I decided not to report publicly on everything at the time.

But then last week, yet another researcher (Lee Johnstone, @Cyber_War_News on Twitter) got in touch with me and told me that the House was leaking. This leak appeared to involve a different IP address and a backup directory.

The files reportedly contained a number of usernames and passwords, although once again, the passwords were not plain text. And unlike the first leak, this had sql databases for several members of Congress: Rep Dave Joyce of Ohio, Rep. Billy Long of Missouri, and Rep. Richard Neal of Massachusetts.

Oops. Yet another leak from the House. IP address redacted by DataBreaches.net.
Oops#2. IP address redacted by DataBreaches.net. 

According to Johnstone:

The three subdomains leaked by congress are joyce.house.gov, long.house.gov, neal.house.gov, then there is also configuration files for carter.house.gov.

Configuration files within all subdomains file systems show that they are connecting to a shared database as the root user with a common password [actual password redacted by DataBreaches.net] and that this appears repeated for each installation of drupal being used.

Somewhat curious as to what would happen when I called the House and asked for the Chief Administrative Officer of the House, I called the House switchboard. My request for the Chief Administrative Officer of the House was transferred to a recording identifying the extension as “First Call.” I duly left a detailed message my name/number, their IP address and port, and said that I would be reporting on it because this was the second time in a few months that researchers were finding and contacting me about leaks from the House – and the files contained usernames and passwords.

I asked them to get back to me.

I fully anticipate that if and when they do call me, there will be an attempt to minimize the importance of these leaks, so let me state clearly that yes, I realize that the material leaked may not be the most sensitive, although since I haven’t gone through it all, I can’t be sure of that.

And it’s not like people might ever re-use their passwords, right? Oh wait…

It’s now noon on Monday, and I received no call back yesterday or today. And as of my last check, the door is still wide open. So I’ve decided to report on this now and tweet it to members of Congress. Maybe their staff can get through to the right person to secure their data.

Sometimes the lights are on but nobody in cybersecurity seems to be home. Stock image credit: Orhan Cam..

Update 1:38 pm. One of my followers on Twitter has a contact in the Chief Administrative Office, it seems, and he alerted the contact, who said he’ll check into it. That would be nice.

Update 5:14 pm.  More than 24 hours after I called them, the data now appear to have been secured, although I’m not sure whether it would have been secured if not for a follower’s contact.

Category: Commentaries and AnalysesExposureGovernment SectorOf NoteU.S.

Post navigation

← Another State Data Security Law: Ohio Gets in on the Action
Bowker Investigating Breach of ISBN Site →

1 thought on “No need for Russia to hack the House of Representatives if the House keeps leaving its doors open.”

  1. Regret says:
    November 5, 2018 at 10:40 pm

    Great work, again.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.