Austin, Texas DPS Victims Of Suspected Russian Data Breach

The city of Austin and the state of Texas are both victims of a massive breach in state and federal computer networks by purported Russian intelligence agencies, according to confirmed reports.

Executives from the city of Austin say they are following measures recommended by the Cybersecurity and Infrastructure Security Agency (CISA) and FBI.

Austin councilmembers on December 8 awarded a contract for citywide cyber liability insurance for up to $2.43 million to Alliant Insurance Services, Inc.

According to the solicitation documents issued in February 2020, the city was seeking insurance agents and brokers experienced and qualified to provide cyber liability consulting services and placement of comprehensive cyber liability insurance coverage for large public entities.

CISA issued an emergency directive on December 13 after it was discovered that hackers had gained access to multiple computer networks via SolarWinds’ Orion products. SolarWinds Corporation is headquartered in Austin.

Officials at the Texas Department of Public Safety (DPS) did not confirm if the agency had been breached, but they referred inquiries to FBI Special Agent Michelle Lee in the bureau’s San Antonio office.

On its website, SolarWinds stated that it believes “the vulnerability was inserted into its Orion platform products and it existed in updates released to customers between March and June 2020.”

The breach to SolarWinds permitted attackers to gain access to an estimated 17,000 network traffic management systems out of the company’s 33,000 Orion customers.

The Multi-State Information Sharing and Analysis Center reported that multiple vulnerabilities have been discovered in SolarWinds N-Central. Two of these vulnerabilities, when used in conjunction with each other, could allow for remote code execution.

SolarWinds N-Central is a remote monitoring and management automation platform for managed service providers and IT professionals.

Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

This story originally published by Strategic Partnerships. 

Share
Published by
Staff

Recent Posts

San Marcos City Council reviews Sidewalk Maintenance and Gap Infill Program

The San Marcos City Council received a presentation on the Sidewalk Maintenance and Gap Infill…

2 years ago

San Marcos River Rollers skate on and rebuild

The San Marcos River Rollers have skated through obstacles after taking a two-year break during…

2 years ago

After 8 Years, San Marcos Corridor News Bids Our Readers Farewell

San Marcos Corridor News has been reporting on the incredible communities in the Hays County…

2 years ago

High bacteria levels at Jacobs Well halts swimming season

Visitors won't be able to swim in the crystal clear waters of the Jacobs Well Natural…

2 years ago

Pets of the Week: Meet Sally & Nutella!

Looking to adopt or foster animals from the local shelter? Here are the San Marcos…

2 years ago

Texas still leads in workplace deaths among Hispanics

The Lone Star State leads the nation in labor-related accidents and especially workplace deaths and…

2 years ago

This website uses cookies.