U.S. Office of Personnel Management Breach
Summary
The U.S. Office of Personnel Management breach was a 2015 federal data breach involving two separate but related cybersecurity incidents. OPM said the incidents affected Federal Government employees, contractors, and others through the theft of personnel records and background-investigation records.
OPM reported that approximately 21.5 million individuals were impacted by the background-investigation-records incident and approximately 4.2 million individuals were impacted by the personnel-records incident. Most people in the personnel-records incident were also affected by the background-investigation incident, while approximately 600,000 people were impacted only by the personnel-records incident.
The exposed data included Social Security numbers and other sensitive information. OPM said some background-investigation records included interview findings, approximately 5.6 million fingerprints, and usernames and passwords used by applicants to complete background-investigation forms.
Technical Analysis
The public OPM record describes the breach as malicious cyber activity that resulted in the exposure of background-investigation and personnel data. OPM said the background-investigation incident involved records for current, former, and prospective Federal employees and contractors, including people who applied for background investigations and non-applicants such as spouses or cohabitants.
Public records do not identify a specific initial-access method, malware family, command-and-control path, or confirmed intrusion timeline. Available documentation supports a finding that sensitive records were stolen from OPM-managed systems, but does not assign the intrusion to a named actor.
GAO reviewed OPM’s post-breach security work and found that OPM had implemented or made progress toward implementing 19 US-CERT recommendations. GAO also found that some actions were incomplete or needed further improvement, including completion-date tracking, corrective-action validation, selected encryption requirements, and oversight of contractor-operated systems.
Attack Chain
Stage 1: Unauthorized Access to OPM Data Environments
OPM’s public resource center states that malicious cyber activity affected OPM systems and resulted in the theft of personnel records and background-investigation records. Public records do not establish how access was first obtained.
Stage 2: Collection of Personnel and Background-Investigation Records
The stolen background-investigation data included information from SF-86, SF-85, and SF-85P-style investigation processes. OPM described the affected data as including Social Security numbers, residency and education history, employment history, immediate family and acquaintance information, and health, criminal, or financial history provided during background investigations.
Stage 3: Exposure of High-Sensitivity Identity Data
OPM reported that the personnel-records incident affected information such as full name, birth date, home address, and Social Security number. For the background-investigation incident, OPM reported that approximately 5.6 million affected records included fingerprints.
Stage 4: Federal Response and Victim Support
OPM said it partnered with US-CERT and the FBI to investigate and determine the potential impact. OPM also provided identity monitoring, credit monitoring, identity restoration, and identity-theft insurance services for impacted individuals and eligible dependent minor children.
Impact Assessment
The impact was concentrated in federal personnel and background-investigation data. OPM reported approximately 21.5 million individuals affected by the background-investigation-records incident, including 19.7 million applicants and 1.8 million non-applicants. OPM separately reported approximately 4.2 million individuals affected by the personnel-records incident.
The sensitivity of the data created identity and counterintelligence risk. The background-investigation data could include Social Security numbers, residency and education history, employment history, information about family members and contacts, health history, criminal history, financial history, interview findings, fingerprints, and account credentials used for background-investigation forms.
The public record also shows remediation obligations. GAO found that OPM had taken post-breach actions but had not completed all work needed to prevent, mitigate, and respond to breaches involving sensitive personal and background-investigation information.
Attribution
Official sources do not name a confirmed threat actor responsible for the OPM breach. OPM’s public resource center discusses malicious cyber activity and its impact, while GAO focuses on OPM’s controls and post-breach remediation status.
Because available documentation does not establish a named actor, the attribution remains Unknown.
Timeline
2015-06-01 — OPM Identifies Related Personnel and Background-Investigation Incidents
OPM said it announced two separate but related cybersecurity incidents in 2015 involving personnel records and background-investigation records. The public resource center describes the background-investigation discovery as occurring in June 2015.
2015-06-25 — OPM Testifies Before Senate HSGAC
OPM Director Katherine Archuleta testified before the Senate Committee on Homeland Security and Governmental Affairs in a hearing titled “Under Attack: Federal Cybersecurity and the OPM Data Breach.”
2015-07-09 — Impacted Population and Data Categories Clarified
OPM’s public resource center records the impact as approximately 21.5 million individuals in the background-investigation-records incident and approximately 4.2 million individuals in the personnel-records incident.
2017-08-03 — GAO Publishes Post-Breach Security Review
GAO published GAO-17-614, finding that OPM had improved controls after the breaches but still needed further efforts.
2022-07-06 — Settlement Notice Process Ordered
OPM’s resource center states that, in related multidistrict litigation, the court ordered the claims administrator to issue notice of settlement by July 6, 2022.
Remediation & Mitigation
OPM’s immediate public response included coordination with US-CERT and the FBI, notification support, a verification center, and identity-protection services. OPM described identity monitoring, credit monitoring, identity restoration, and identity-theft insurance for impacted individuals.
GAO’s post-breach review identified specific control areas that remained important after the incident. Those areas included implementation of US-CERT recommendations, validation of corrective actions, encryption of stored and transmitted data on selected systems, and oversight of contractor-operated systems.
For organizations that manage high-sensitivity identity data, the incident supports controls around inventorying high-value assets, encrypting sensitive data, monitoring privileged access to information repositories, validating remediation work, and testing contractor-operated system controls.
Sources & References
- U.S. Office of Personnel Management: Cybersecurity Resource Center — U.S. Office of Personnel Management, 2015-07-09
- U.S. Government Accountability Office: Information Security: OPM Has Improved Controls, but Further Efforts Are Needed — U.S. Government Accountability Office, 2017-08-03
- U.S. Office of Personnel Management: Under Attack: Federal Cybersecurity and the OPM Data Breach — U.S. Office of Personnel Management, 2015-06-25