The United States Marine Corps (USMC) has been allegedly breached by a threat actor who claims to have the data of over 13,000 personnel.
To continue reading the rest of this article, please log in.
Create free account to get unlimited news articles and more!
In a post to a popular hacking forum, threat actor “natohub” said they had two files containing 2,435 users and 10,878 users, respectively.
While the threat actor provided little information as to the nature of the incident, they did provide samples of the data.
Based on the samples, data includes full names, email addresses, ranks, branches, unit codes, birth dates, time zones and more.
Cyber Daily’s analysis of the data suggests that some of the records pertain to legitimate current and former USMC personnel. However, Cyber Daily has been unable to verify whether or not all the data is real.
Cyber Daily reached out to the USMC, which said it was looking into the claims. It has yet to verify the incident’s legitimacy.
Natohub is infamous for the leaks of data belonging to NATO and its members.
Last month, the threat actor also listed a “US military data breach”, which allegedly contained the data of over 385,000 military personnel and contractors of the US Army, Navy, Marine Corps, Air Force and Coast Guard.
Data reportedly included “EDIPI, name, email, phone, service, component, primary MOS, billet MOS, billet desc, unit information, company, platoon, work section, street address, city/state/zip”, according to the threat actor.
Once again, a sample of the data was posted; however, Cyber Daily was unable to verify any of the names listed.
It is unclear whether or not these two leaks are linked; however, the wider leak was listed for sale.
Back in July, the threat actor listed another US Army, Navy, Air Force and Coast Guard leak, and in August, another USMC leak.
The threat actor has also listed and reportedly sold NATO databases, EU databases and more.