DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Chinese government has arrested hackers it says breached OPM database

Posted on December 2, 2015 by Dissent

If I knew emojis, I’d include one for “highly skeptical” to accompany this story.  Ellen Nakashima reports:

The Chinese government recently arrested a handful of hackers it says were connected to the breach of Office of Personnel Management’s database earlier this year, a mammoth break-in that exposed the records of more than 22 million current and former federal employees.

The arrests took place shortly before a state visit in late September by President Xi Jinping, and U.S. officials say they appear to have been carried out in an effort to lessen tensions with Washington.

The identities of the suspects — and whether they have any connection to the Chinese government — remain unclear.

Read more on Washington Post.


Related:

  • Revealed: Afghan data breach after MoD official left laptop open on train
  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Canada says hacktivists breached water and energy facilities
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • Alan Turing institute launches new mission to protect UK from cyber-attacks
Category: Government SectorHackU.S.

Post navigation

← Target in $39.4 mln settlement with banks over data breach
House committee OKs bill to counter stolen credit card forums →

1 thought on “Chinese government has arrested hackers it says breached OPM database”

  1. IA Eng says:
    December 3, 2015 at 6:31 am

    If your a corrupt government entity, somewhere in the justice system side of the house and you need a few people to take the fall, I am sure it is easy enough to concoct a semi-believable story. They can say what ever they want about the breach – at least you now know it came from their country.
    Most everyone I speak with in the network security world hold little faith that China is going to turn itself around in respect to telling the truth about these breaches and who actually does, and pays for the effort.
    I anticipate they – the Chinese think this is old news and probably have other things that are more closely held. They are testing our network security intelligence. They want to see exactly how much we know about their operation. They throw some meat out there and want to see if we are going to say its BS and knee-jerk some information they decipher and use to plug holes, or get rid of moles.
    The data has had the opportunity to change hands 1000 times over. Most of the information is very dangerous if it can duplicate a person who in turn can get a security clearance or access to a base facilities in general. Its a trivial effort, MUCH too late.

    If the shoe was on the other foot, they would be frothing at the mouth – maybe. One has to give a crap about your society – or any society for that matter. Its simply Corrupt Highlands In Norther Asia. I vote to add this caveat to all traveling brochures.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.