The US Marshals Service (USMS) has confirmed falling victim to a ransomware attack that resulted in the compromise of sensitive law enforcement information.
A federal law enforcement agency within the Department of Justice, USMS supports the federal justice system by tracking down fugitives, protecting government witnesses and their families, executing federal court orders, and more.
The incident, chief of the Marshals Service public affairs office Drew Wade said on Monday, was identified on February 17 and involved a standalone system that was immediately disconnected from the network.
In addition to sensitive information about USMS investigations, Wade said, the infected system contained personally identifiable information.
“The affected system contains law enforcement sensitive information, including returns from legal process, administrative information, and personally identifiable information pertaining to subjects of USMS investigations, third parties, and certain USMS employees,” the spokesperson said.
USMS, which has discovered that data was exfiltrated from the impacted system, is treating the attack as a major incident but says it has been able to continue operations.
According to NBC News, no information related to the Witness Security Program, also known as the witness protection program, was compromised in the attack, and no one in the program is at risk because of the incident.
The Department of Justice has launched a forensic investigation into the ransomware attack, Wade said.
SecurityWeek has contacted USMS for a statement on the attack and will update this article as soon as a reply arrives.
“The US Marshals Service is one of America’s highest ranking law enforcement authorities, and it possesses highly sensitive information related to national security, witness protection programs and convicted felons. As a result, the information obtained in this breach will be highly sensitive and could be used in extortion, sold onto nation state actors, or even put the safety of US citizens at risk if their personal information, like address details, are exposed,” Ryan McConechy, senior consultant at Barrier Networks, said in an emailed comment.
Related: Ransomware Attack Forces Produce Giant Dole to Shut Down Plants
Related: Ransomware Attack Pushes City of Oakland Into State of Emergency
Related: 3.3 Million Impacted by Ransomware Attack at California Healthcare Provider

More from Ionut Arghire
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- Latitude Financial Services Data Breach Impacts 300,000 Customers
Latest News
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
