UPDATED 13:03 EST / FEBRUARY 10 2016

NEWS

100K taxpayers compromised in latest IRS hack

Some changes are clearly in order at the cybersecurity department of the U.S. Internal Revenue Service. Less than six months after admitting that hackers pilfered personal information about more than 300,000 individuals from its website, the agency has revealed that another 101,000 accounts were compromised in a similar attack a few weeks ago. The breach occurred shortly before a mysterious outage disabled electronic tax return filing for two days.

To dispel potential concerns, the IRS clarified in a statement that the two incidents are believed to be unrelated. The alert goes on to detail that the hackers employed Social Security Numbers harvested from an external source, likely one of the numerous private companies that were breached over the last few months, to exploit the E-Filing PIN form on its website. Taxpayers have to submit the application in order to receive a personalized code that is used to verify the authenticity of their return claims.

The assimilants presumably sought to replicate the success of the first attack against the IRS last year, which yielded an estimated $50 million in unlawful refunds along with a treasure trove of personal details. Thankfully, however, the agency says that the leak didn’t affect much else besides the PINs of the 101,000 compromised accounts. That should provide some limited measure of comfort for the affected taxpayers, although the methodology of the hack raises bigger questions about the IRS’s cybersecurity.

The agency said that the attack employed a bot programmed to automatically input SSNs and other requisite information from its creators’ stolen data cache into the E-Filing PIN application. Only one out of four attempts was successful, meaning that more than 400,000 requests were made before the IRS managed to detect the effort. This seems to suggest that its website, or at the form tool, lack a reliable mechanism to protect against brute-force attacks. Considering that even e-commerce stores often block access after a certain number of repeated actions like failed logins, the absence of such a system constitutes a major failure on the agency’s part.

The issue reflects the broader need for better security in the public sector amid today’s growing cyber threats. The repercussions of poor network protection became all too clear after the breach at the Office of Personnel Management last year, which reportedly saw Chinese hackers make away with the records of 18 million federal employees, many of whom hold security clearances.

Image via JavadR

Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.