WASHINGTON — Hackers who broke into a Washington, D.C. health insurance marketplace stole sensitive personal data on members of Congress, their employees and family and the size and scope of the impact “could be extraordinary,” House leadership says.
DC Health Link, which runs the exchange, said an unspecified number of customers were affected and it was notifying them and working with law enforcement to quantify the damage. It said it was offering identity theft service to those affected and extending credit monitoring to all customers.
Some 11,000 of the exchange’s more than 100,000 participants work in the House and Senate or are relatives.
In a letter to the exchange's director posted on Twitter, House Speaker Kevin McCarthy and Minority Leader Hakeem Jeffries said the breach “significantly increase the risk that Members, staff and their families will experience identity theft, financial crimes, and physical threats.”
They said the FBI had informed them that it was able to purchase the stolen data on the dark web, where it was offered for sale for an unspecified amount Monday on a hacker forum popular with cybercriminals.
The FBI said in a brief statement Wednesday evening it said it was aware of the incident and was assisting.
In the letter, McCarthy and Jeffries said “the individuals selling the information appear unaware of the high-level sensitivity of the confidential information in their possession, and its relation to Members of Congress" but that would change as media reports publicized the breach.
They said the FBI had not yet determined the extent of the breach but that thousands of House members, employees and their families have enrolled in health insurance through DC Health Link since 2014. “The size and scope of impacted House customers could be extraordinary.”
It was not clear whether and how the FBI could guarantee that copies of the stolen data are not circulating in the cybercrime underworld.
In the sale offer, a broker on the online crime forum claimed to have records on 170,000 DC Health Link customers and said they were stolen Monday. Reached on Wednesday via encrypted chat, the broker said they were acting on behalf of a seller known as “thekilob.”
By Thursday, the offer and sample stolen data posted to the forum had been removed. The data listed Social Security numbers, addresses, names of employers, phone numbers, emails and addresses for a dozen DC Link participants. The AP reached one by phone on Wednesday evening.
“Oh my God,” the man said when informed the information was public. All 12 people listed work for the same company or are family members.
In an email to all Senate email account holders on Wednesday, the sergeant at arms recommended that anyone registered on the health insurance exchange freeze their credit to prevent identity theft.
An email sent out by the office of the Chief Administrative Office of the House on behalf of McCarthy and Jeffries called the breach “egregious” and urged members to use credit and identity theft monitoring resources.
In an emailed statement on Wednesday, Rep. Joe Morelle of New York said House leadership was informed by Capitol Police that DC Health Link “suffered an extraordinarily large data breach of enrollee information" that posed a “great risk” to members, employees and their family members. He said the FBI was still determining the “cause, size, and scope of the data breach.”
The hack follows several recent breaches affecting U.S. agencies. Hackers broke into a U.S. Marshals Service computer system and activated ransomware on Feb. 17 after stealing personally identifiable data about agency employees and targets of investigations.
An FBI computer system was recently breached at the bureau's New York field office, CNN reported in mid-February. Asked about that intrusion, the FBI issued a statement calling it "an isolated incident that has been contained.” It declined further comment, including when it occurred and whether ransomware was involved.
There was no indication the DC Health breach was ransomware-related.
___
Bajak reported from Boston.