Sensitive Data Leaked from FEMA and CBP, Employees Fired
A significant cybersecurity breach at the Federal Emergency Management Agency (FEMA) exposed sensitive employee data from both FEMA and U.S. Customs and Border Protection (CBP), according to internal documents. The incident, labeled a “widespread cybersecurity incident,” began on June 22 when hackers exploited compromised login credentials to access FEMA's Citrix virtual desktop infrastructure. The attackers exfiltrated data from servers in FEMA Region 6, which covers Arkansas, Louisiana, New Mexico, Oklahoma, Texas, and numerous tribal nations - some of which are situated along the U.S. southern border.
The Department of Homeland Security (DHS) was first notified of the breach on July 7. A week later, on July 14, the attackers escalated their intrusion by attempting to install virtual networking tools that would allow further data extraction. Initial containment steps were taken on July 16, followed by broader security policy updates on Sept. 5. The breach appears to have led directly to the termination of two dozen FEMA IT personnel on Aug. 29, including senior cybersecurity and technology officials. DHS Secretary Kristi Noem cited systemic failures including the failure to address vulnerabilities.
The root cause of the incident was linked to a vulnerability known as "CitrixBleed 2.0," which allowed attackers to bypass multi-factor authentication by extracting fragments of memory content.
This breach underscores the critical importance of end-to-end cybersecurity management across all layers of infrastructure with a platform like NIKSUN. The attack leveraged weaknesses in user authentication, software patching, and internal oversight - issues that could have been mitigated with deep, continuous visibility into the network environment. For government agencies managing sensitive public data and national security responsibilities, maintaining robust visibility into all systems is no longer optional - it is essential for resilience, accountability, and trust. Read more about this story on our LinkedIn page
We use cookies to offer you a better browsing experience and to analyze site traffic. By using our site, you consent to our use of cookies.
Essential Cookies
Site Analytics
Essential Cookies
These cookies are necessary for certain areas of the site to function. They are used for access to secure areas of the website and to help us comply with legal requirements like GDPR.
Site Analytics
These cookies are used to collect information about how users use our site. We use these to improve how our website works.