Massive Data Breach Exposes Hundreds of US Employees with "Top Secret" Security Clearances

Security Vulnerability Exposes "Top Secret" Data of Hundreds of US Officials


Silhouette of a human head filled with bookshelves

Highly Critical Security Vulnerability: A recent investigation revealed a highly critical security vulnerability, exposing sensitive personal data of over 450 individuals holding "Top Secret" security clearances for the U.S. government. Top Secret security clearances are the highest level of security classification in the United States, granting individuals access to national security information that, if disclosed without authorization, could cause exceptionally grave damage to national security. These clearances require extensive background investigations to ensure the eligibility of their holders. Source: FBI and Source: U.S. Department of State. This database, which includes over 7,000 job applicants for House Democrats over the past two years, contains sensitive information that could pose a significant risk.

Vulnerability Discovery and Data Securing


Illustrative image of knowledge graph embedding

Cybersecurity Expert: A cybersecurity expert (ethical security researcher) - who preferred to remain anonymous due to the sensitivity of the findings - discovered this exposed data late last September. The discovery came during their routine search for unsecured online databases, where it was found on a site known as "DomeWatch." House Democrats oversee this platform, which provides live streams of House sessions, parliamentary event schedules, voting updates, along with a job board and resume bank.

Database Securing: Immediately after the researcher attempted to notify the House Chief Administrative Officer's office on September 30, the database was secured within a few hours. The response the researcher received was brief: "Thank you for the heads-up." However, it remains unclear how long this sensitive data remained exposed and whether unauthorized parties accessed the information during the period it was unsecured.


GIF from GIPHY

Nature and Severity of the Exposed Data

Full Names

Phone Numbers

Email Addresses

Resume Summaries

Security Clearances

Military Service

Proficient Languages

Risk of Targeting Secret Clearance Holders


Internal Index: The independent researcher described the discovered database as an "internal index" for job applicants, confirming that full resumes were not included. Nevertheless, the database contained essential details of the job application process, including written resume summaries, military service information, security clearance levels, and languages proficiently spoken by applicants. Additionally, it included personal details such as full names, phone numbers, and email addresses, with a unique internal identification number assigned to each applicant.

Data Falling into the Wrong Hands: The researcher explained to "Wired" that "some of the individuals whose data was listed spent two decades on Capitol Hill," indicating that the information goes beyond mere intern or junior staff data. This aspect raises the level of concern about the discovery, as the researcher fears that if this data fell into the wrong hands - whether a hostile state or professional hackers - it would enable the targeting of government employees or military personnel with access to highly classified information. According to the cybersecurity expert, "From the perspective of any foreign adversary, this data is a treasure trove for targeting."

Response from Concerned Authorities and Expert Analysis


Image showing a modern office workspace

Comment on the Incident: To obtain a comment on the incident, "Wired" magazine reached out to the Chief Administrative Officer's office and House Democrats. However, some relevant staff members were unavailable to respond due to the ongoing government shutdown in the United States.

Statement from Joy Lee: In a statement issued on October 22, Joy Lee, spokesperson for House Democratic Whip Katherine Clark, told "Wired" magazine: "Our office was informed today about the potential exposure of information stored on an internal site by a third-party vendor." It is worth noting that DomeWatch is directly overseen by Clark's office. Lee further clarified that "the third-party vendor in question is an independent consultant providing backend support" for the DomeWatch website.

Unsecured Databases: It is noted that numerous unsecured databases are publicly accessible online. The researcher stated that they might not have paused to investigate DomeWatch's data had it not been for their observation of keywords related to "Top Secret" security clearances. This underscores the danger of the database, despite its limited size, containing information that could be effectively exploited for espionage by nation-states. For example, one entry included information about an individual with expertise in "intelligence" and "U.S.-China relations."

Alexander Leslie: Alexander Leslie, a Senior Government Affairs Advisor at Recorded Future, a leading threat intelligence company, who was not involved in this research, stated: "Exposed databases represent a widespread and non-partisan challenge in cybersecurity. If left unaddressed, they facilitate targeted espionage, fraudulent activities, and identity misuse." Leslie added: "If the accuracy of this data is confirmed, it is highly sensitive. Information such as military history and security clearance status provides adversaries with precise intelligence opportunities for reconnaissance and impersonation purposes. Furthermore, foreign intelligence agencies can exploit this data to carry out sophisticated phishing attacks, impersonations, and targeted social engineering operations to gain access to or compromise accounts."

Political Affiliations: The researcher clarified that the data also included information about individuals' political affiliations. Among approximately 7,000 records, nearly 4,200 individuals had prior experience working in Congress. In total, 6,300 individuals were identified as affiliated with the Democratic Party, 17 with the Republican Party, while over 250 others were classified as independents or having other affiliations. The researcher also noted the presence of links to files or documents stored within external cloud storage systems.

2015 OPM Hack: Leslie from Recorded Future also noted that known U.S. government employment-related data breaches, such as the 2015 Office of Personnel Management hack, contribute to "long-term national security and American personnel risks."

Sole Purpose: The researcher who discovered the unsecured database concluded by saying: "This investigation did not target any specific political party or affiliation. The sole purpose was to find the data, understand its exposure, and consider all the ways it could be exploited not only by criminals but also by foreign adversaries. This information should never have been publicly exposed."

Next Post Previous Post
No Comment
Add Comment
comment url