\r\n \r\nThose at risk include employees, retirees, employees of the Postal Regulatory Commission, the U.S. Postal Inspection Service and the Postal Service Office of Inspector General. Employee data could include: names, social security numbers, dates of birth, addresses, employment dates and emergency contact information. \r\n \r\n\"Fortunately, we have seen no evidence of malicious use of the compromised data and we are taking steps to help our employees protect against any potential misuse of their data,\" Postmaster General Patrick Donahoe said in a statement. In the meantime, systems have been significantly strengthened to prevent future attacks. \r\n \r\n\"The intrusion is limited in scope and all operations of the Postal Service are functioning normally,\" said USPS spokesman David Partenheimer in a statement. \r\n \r\nAdditional data may have been compromised on customers that contacted the Postal Service Customer Care Center by telephone or email during the same period. According to the Postal Service, its revenue systems including post offices and online, were not compromised and the information of credit and debit card customers is therefore safe. Additionally, the breach did not affect credit card data from retail or online services, including Click-N-Ship, the Postal Store, PostalOne! or change of address services. \r\n \r\nWhile the source of the attack is still under investigation, it is evident that the attack was carried out by a \"sophisticated person or group,\" said Partenheimer. \"It looks similar to patterns that other government agencies and large corporations had experienced.\" \r\n \r\nThe FBI is leading the investigation. \r\n \r\nThe Postal Service held two briefings (October 22 and November 7) to update the staff of the House Committee on Oversight and Government Reform on potential attackers and the scope of the breach, according to a letter released by ranking member Rep. Elijah E. Cummings. The letter, addressed to the postmaster general, requested more information on the attack. \r\n \r\n\"The increasing number of cyber attacks in both the public and private sectors is unprecedented and poses a clear and present danger to our nation's security,\" said Rep. Cummings, adding that officials have warned that more than 500 million financial records have been stolen by hackers over the past 12 months."}]}};
const country = "US";
const language = "en-US,en;q=0.5";
const SITE_LANGUAGE = "en";
const siteName = "RIS News";
const userRoles = ["anonymous"];
const userUid = 0;
const indexName = "risnews";
window.dataLayer = window.dataLayer || [];
const data = {};
data.entityTaxonomy = {};
const contentTypes = [
"article",
"blog",
"bulletin",
"embed_page",
"landing_page",
"event",
"image",
"page",
"product",
"whitepaper",
"video",
"tags",
];
if (
routeInfo &&
"bundle" in routeInfo &&
contentTypes.includes(routeInfo["bundle"])
) {
data.entityBundle = routeInfo.bundle;
data.entityTitle = `${routeInfo.title} | ${siteName}`;
data.entityId = routeInfo.id;
data.entityName = routeInfo.author?.uname;
data.entityCreated = routeInfo.created;
data.sponsored = routeInfo.sponsored;
data.sponsor = routeInfo.sponsoringCompany;
data.entityType = "node";
data.entityLangcode = SITE_LANGUAGE;
data.siteName = siteName;
data.drupalLanguage = language;
data.drupalCountry = country;
data.userRoles = userRoles;
data.userUid = userUid;
data.entityTaxonomyKeys = {};
data.entityTaxonomyHierarchies = {};
data.parentNaicsCode = {};
data.isPro = false;
data.algoliaIndexName = indexName;
// Add toxonomy data
const taxonomies = {
businessTopic: "business_topic",
contentType: "content_type",
company: "company",
marketSegment: "market_segment",
};
const getHierarchy = (term, terms = []) => {
terms.push({ id: term.id, name: term.name });
if (term.parentTerm != null) {
getHierarchy(term.parentTerm, terms);
}
return terms;
};
const getTerms = (term, useApiId = false) => {
return { id: useApiId ? term.apiId : term.id, name: term.name };
};
const getKeys = (term) => {
return { id: term.id, name: term.apiId };
};
Object.entries(taxonomies).forEach(([key, item]) => {
terms = routeInfo[key];
if (terms && terms.length > 0) {
data["entityTaxonomy"][item] = terms.map((term) =>
getTerms(term, key === "company")
);
if (key !== "company") {
data["entityTaxonomyKeys"][item] = terms.map(getKeys);
termGroups = [];
terms.forEach((term, termInd) => {
termGroups[termInd] = getHierarchy(term);
});
data["entityTaxonomyHierarchies"][item] = termGroups;
}
}
});
data["entityTaxonomy"]["tags"] = routeInfo["topics"] || [];
// Primary Topic is either the business topic or the top tag.
if (routeInfo["businessTopic"]?.length > 0) {
data["entityPrimaryTopic"] = routeInfo["businessTopic"][0]["name"];
} else {
if (routeInfo["topics"]?.length > 0) {
data["entityPrimaryTopic"] = routeInfo["topics"][0]["name"];
}
}
// Primary and secondary entityNaicsCodes come from the MarketSegment
if (routeInfo.marketSegment?.length > 0) {
data.entityNaicsCode = {};
data["entityNaicsCode"]["id"] = routeInfo["marketSegment"][0]["id"];
data["entityNaicsCode"]["name"] =
routeInfo["marketSegment"][0]["naicsCode"];
if (routeInfo["marketSegment"][0]["parentTerm"] != null) {
data["parentNaicsCode"]["id"] =
routeInfo["marketSegment"][0]["parentTerm"]["id"];
data["parentNaicsCode"]["name"] =
routeInfo["marketSegment"][0]["parentTerm"]["naicsCode"];
}
} else {
data.entityNaicsCode = [];
}
if (routeInfo.taggedPro) {
data.isPro = routeInfo.taggedPro;
}
window.dataLayer.push(data);
} else if (routeInfo && "vid" in routeInfo) {
data.entityBundle = "tags";
data.entityTitle = routeInfo.name;
data.entityId = routeInfo.id;
data.entityName = routeInfo.author?.uname;
data.entityCreated = routeInfo.created;
data.entityType = "taxonomy_term";
data.entityLangcode = SITE_LANGUAGE;
data.siteName = siteName;
data.sponsored = routeInfo.sponsored;
data.sponsor = routeInfo.sponsoringCompany;
data.drupalLanguage = language;
data.drupalCountry = country;
data.userRoles = userRoles;
data.userUid = userUid;
data.algoliaIndexName = indexName;
data["entityTaxonomy"]["tags"] = {
id: routeInfo["id"],
name: routeInfo["name"],
};
window.dataLayer.push(data);
}
})();
Adding to the flood of breaches in 2014, the United States Postal Service revealed that it was the victim of a cyber attack that compromised the information of more than 800,000 employees, directors and regulators, as well as the data of customers who contacted its call center between January and August of this year.
Those at risk include employees, retirees, employees of the Postal Regulatory Commission, the U.S. Postal Inspection Service and the Postal Service Office of Inspector General. Employee data could include: names, social security numbers, dates of birth, addresses, employment dates and emergency contact information.
"Fortunately, we have seen no evidence of malicious use of the compromised data and we are taking steps to help our employees protect against any potential misuse of their data," Postmaster General Patrick Donahoe said in a statement. In the meantime, systems have been significantly strengthened to prevent future attacks.
"The intrusion is limited in scope and all operations of the Postal Service are functioning normally," said USPS spokesman David Partenheimer in a statement.
Additional data may have been compromised on customers that contacted the Postal Service Customer Care Center by telephone or email during the same period. According to the Postal Service, its revenue systems including post offices and online, were not compromised and the information of credit and debit card customers is therefore safe. Additionally, the breach did not affect credit card data from retail or online services, including Click-N-Ship, the Postal Store, PostalOne! or change of address services.
While the source of the attack is still under investigation, it is evident that the attack was carried out by a "sophisticated person or group," said Partenheimer. "It looks similar to patterns that other government agencies and large corporations had experienced."
The FBI is leading the investigation.
The Postal Service held two briefings (October 22 and November 7) to update the staff of the House Committee on Oversight and Government Reform on potential attackers and the scope of the breach, according to a letter released by ranking member Rep. Elijah E. Cummings. The letter, addressed to the postmaster general, requested more information on the attack.
"The increasing number of cyber attacks in both the public and private sectors is unprecedented and poses a clear and present danger to our nation's security," said Rep. Cummings, adding that officials have warned that more than 500 million financial records have been stolen by hackers over the past 12 months.