DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CNN sources: IRS believes massive data theft originated in Russia

Posted on May 27, 2015 by Dissent

Chris Frates reports:

The IRS believes that a major cyber breach that allowed criminals to steal the tax returns of more than 100,000 people originated in Russia, two sources briefed on the data theft tell CNN.

Read more on CNN.

If you bet Russia, drink. If you bet China or North Korea, just be patient, as they may get blamed before this is all over.

In the meantime, Kevin McCoy helpful reminds everyone that IRS had been warned for years about their less than stellar security:

Government monitors repeatedly warned of IRS computer security risks long before Tuesday’s disclosure that identity thieves had stolen tax agency data for roughly 100,000 U.S. households.

At least seven federal audits and other reports from 2007 to 2014 outlined dangers that ranged from failures in IRS database controls to hiring an ex-con without a background check and failing to screen for other workers who had access to personal data for millions of taxpayers.

 Read more on USA Today.


Related:

  • Scattered Spider is running a VMware ESXi hacking spree
  • Fans React After NASCAR Confirms Ransomware Breach
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn't so safe: hackers leak 13,000 user photos and IDs from the Tea app
  • Au: Qantas hackers gave airline 72-hour deadline
  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
Category: Government SectorHackID TheftU.S.

Post navigation

← Medical Management LLC breach added to HHS breach tool
JP: Convenience store employee arrested for stealing customers’ credit card info →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.