Security News > 2011 > January > Hackers didn't retrieve data in Defense pharmacy website attack
http://www.nextgov.com/nextgov/ng_20110125_5321.php By Bob Brewin NextGov 01/25/2011 No data has been siphoned off the Defense Department PharmacoEconomic Center website and domain as the result of a hacker attack reported by a security firm last week, a Military Health System spokesman said. Austin Camacho, a spokesman for the TRICARE Management Activity, part of MHS, said in an e-mail that the PharmacoEconomic Center website has been taken down while security teams from the Army, which manages the center, review security flaws to identify potential vulnerabilities. The PharmacoEconomic Center website is a public access site and does not house any personally identifiable information, nor does it contain data regarding patient drug profiles, Camacho said. He added there is no data from the Prescription Medication Analysis and Reporting Tool, which is used to manage medication profiles, on the PharmacoEconomic Center website. Clinicians access PMART information from a separate secure server, Camacho said. [...] ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/
News URL
http://www.nextgov.com/nextgov/ng_20110125_5321.php
Related news
- Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining (source)
- North Korean govt hackers linked to Play ransomware attack (source)
- Hackers increasingly use Winos4.0 post-exploitation kit in attacks (source)
- Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks (source)
- Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations (source)
- Hackers breach US firm over Wi-Fi from Russia in 'Nearest Neighbor Attack' (source)
- Hackers abuse Avast anti-rootkit driver to disable defenses (source)
- North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks (source)
- Hackers Use Corrupted ZIPs and Office Docs to Evade Antivirus and Email Defenses (source)
- Russian hackers hijack Pakistani hackers' servers for their own attacks (source)