US Office of Personnel Management — federal records breach
Chinese state-sponsored actors exfiltrated 21.5 million federal personnel records from the Office of Personnel Management, including security-clearance files with detailed background investigation data.
- Target
- US Office of Personnel Management — federal records breach
- Date public
- 4 June 2015
- Sector
- Government
- Attack type
- Nation State
- Threat actor
- China-linked actors (US government attribution)
- Severity
- Critical
- Region
- United States
The US Office of Personnel Management is essentially the HR department for the entire federal government. It holds detailed personal files on millions of current and former government workers, including the extensive background investigation records used to grant security clearances. Those security clearance forms -- called SF-86s -- are extraordinarily detailed. They ask applicants to list every foreign contact they have had, every financial difficulty, every mental health treatment, every arrest, every time they used illegal drugs. The purpose is to identify personal vulnerabilities that could make someone susceptible to blackmail or compromise. In 2015, all of that information -- for over 21 million people -- was stolen by attackers linked to the Chinese government. They also took 5.6 million sets of fingerprints. US intelligence officials called it one of the most damaging intelligence losses in American history. The stolen data does not expire. China now holds a database of the personal vulnerabilities of a large proportion of the people who hold or have held US security clearances -- who they are, what they can be pressured with, and who they know.
What happened
In June 2015, the US Office of Personnel Management disclosed two related but distinct breaches, both attributed to Chinese state-sponsored actors, that together constituted one of the most damaging intelligence losses in American history. The first breach affected personnel records of approximately 4.2 million current and former federal employees. The second, more serious breach affected the background investigation files of approximately 21.5 million individuals, including current and former federal employees and contractors and their families and references.
The background investigation database was the more consequential target. These were the SF-86 Standard Form for National Security Positions — the lengthy questionnaires completed by applicants for US security clearances. The forms are designed to elicit a comprehensive personal history: every foreign national the applicant has had close contact with, every financial difficulty, every mental health treatment, every criminal matter, every instance of illegal drug use, every foreign travel detail, and information about family members, cohabitants, and personal references. The purpose of this information is to identify personal vulnerabilities and foreign connections. That same information is also, in adversarial hands, a comprehensive targeting database for intelligence recruitment, blackmail, and counter-intelligence operations.
The 5.6 million fingerprint records stolen in the breach were assessed as particularly durable: while passwords can be changed and records amended, fingerprints are biometric facts that cannot be altered. US officials warned that the fingerprint data could enable adversaries to identify covert US intelligence operatives working under assumed identities if those identities interacted with foreign biometric screening systems.
The US government attributed the breaches to actors associated with the Chinese government, though no formal criminal charges were unsealed related to the OPM breach specifically. China denied involvement. The House Oversight Committee published a damning post-mortem in 2016 concluding that the breach resulted from years of inadequate investment in cybersecurity, failure to implement basic security controls, and a bureaucratic culture that deprioritised security.
How it worked
The attackers gained initial access using stolen credentials belonging to KeyPoint Government Solutions, an OPM contractor that conducted background investigations. The contractor credentials provided a trusted path into OPM’s network. Once inside, the attackers installed persistent malware — later identified as PlugX and other remote access tools associated with Chinese state-sponsored actors — and began a lengthy reconnaissance phase to map OPM’s network architecture and data holdings.
The dwell time was extensive. Forensic investigation indicated that the attackers had been present in OPM’s network since at least May 2014, more than a year before the breach was detected. During that period, they mapped the environment and located the most valuable data stores. The background investigation database was not held directly at OPM but by the Interior Department’s National Background Investigations Bureau data centre, which shared infrastructure with OPM. The attackers reached that infrastructure by pivoting from their OPM foothold.
OPM’s security posture at the time of the breach was described by congressional investigators and the agency’s own Inspector General as critically deficient. OPM’s Inspector General had been issuing reports warning of serious deficiencies in the agency’s information security programme — including the absence of a complete inventory of what IT systems the agency operated — since at least 2005. The agency lacked the capability to detect the sophisticated intrusion for over a year.
The exfiltrated data was compressed and encrypted before transfer, and moved out in staged batches using common tools that blended with normal network traffic. OPM discovered the breach not through its own detection capabilities but after installing a commercial security product that identified the anomalous encrypted traffic.
Timeline
- May 2014 — Attackers establish initial access to OPM systems using stolen KeyPoint contractor credentials; dwell period begins.
- Summer 2014 — A separate, earlier intrusion into OPM systems is discovered and remediated, but investigators later establish it was conducted by a different Chinese-linked actor; the 2014 entry by the breach actors goes undetected.
- Late 2014 — early 2015 — Attackers map OPM network, pivot to Interior Department NBIB data centre infrastructure hosting background investigation files, and exfiltrate data in staged batches.
- April 2015 — OPM installs a commercial security product (Einstein 3A) that identifies anomalous encrypted traffic; investigation begins.
- 4 June 2015 — OPM publicly discloses the first breach: 4.2 million personnel records of current and former federal employees.
- 9 July 2015 — OPM discloses the second, larger breach: 21.5 million background investigation records including 5.6 million fingerprint sets.
- July — October 2015 — OPM begins notifying affected individuals; Director Katherine Archuleta resigns; Congressional hearings begin.
- September 2016 — House Oversight Committee publishes its final report, “How the Government Jeopardized Our National Security for More than a Generation.”
- Post-2015 — OPM breach cited as the primary driver for creation of the Continuous Diagnostics and Mitigation (CDM) programme and subsequent steps toward the establishment of CISA in 2018.
What defenders should learn
The OPM breach is the case study for what failure to invest in basic security controls looks like at national scale. OPM’s Inspector General had warned of critical deficiencies for a decade before the breach. Systems were running without a complete inventory. Security authorisations were expired. Multi-factor authentication was not deployed across high-value systems. The agency had no capability to detect sophisticated adversarial activity in its network. These are not advanced failures; they are the foundations, and the absence of foundations is what allowed a sophisticated attacker to dwell undetected for over a year.
The contractor-credential entry point illustrates supply-chain risk in the government context. KeyPoint Government Solutions had access to OPM systems as a trusted contractor. That trust was not accompanied by sufficient verification of KeyPoint’s own security posture or monitoring of the access used by contractor credentials. Third-party access — whether by contractors, managed service providers, or technology vendors — represents an attack surface that is frequently less well-monitored than direct employee access, despite carrying equivalent or greater network access in many environments.
The intelligence value of the stolen data is qualitatively different from most breaches and deserves emphasis. Stolen credit card numbers have a use-by date; once they are cancelled, they are worthless. Stolen personnel records are not time-limited in the same way. The SF-86 data stolen from OPM tells an adversary who holds security clearances, what those people’s personal vulnerabilities are, and who their families, colleagues, and foreign contacts are. That information remains accurate and actionable for decades. The House Oversight Committee’s phrase “for more than a generation” in its report title is not rhetorical: the intelligence damage is measured in the careers and lifetimes of the people whose data was taken.
Finally, the OPM breach was one of the direct drivers of the post-2015 federal cybersecurity modernisation agenda. The Continuous Diagnostics and Mitigation programme, the development and eventual statutory establishment of CISA, the push toward zero-trust architectures in federal systems, and revised security clearance processes that attempt to better protect the most sensitive background investigation data all trace in some part to the policy response to OPM. The breach demonstrated that the federal government’s decentralised model of agency-level cybersecurity, without adequate central visibility or enforcement, was structurally inadequate against sophisticated nation-state adversaries — and the institutional changes that followed, while incomplete, represent the most significant rethinking of federal cybersecurity posture in the period between September 11 and the present.
Controls that would have helped
Defender controls catalogued in the Controls Desk that would have changed the outcome of this incident, or limited its blast radius. Sourced from regulator and framework guidance — never vendors.
- Just-in-time privilege elevation, not standing admin Standing admin rights on a privileged account give the attacker the same window the legitimate admin has. Just-in-time elevation collapses that window to minutes.
- Disable LLMNR, NetBIOS-NS and mDNS on Windows networks Three legacy name-resolution protocols on Windows let any attacker on the LAN poison hostname lookups and harvest hashes from any user that mistypes a server name. Disable them.
- Active Directory tier-0 hardening — protected accounts, no SPNs on privileged users, monitored sensitive groups AD remains the highest-blast-radius identity tier in most enterprises. A small set of hardening configurations turns the most reliable lateral-movement playbooks into observable, blockable failures.
- Centralised log collection with bulk-export anomaly alerting The most common dwell-time signal in the catalogue is a bulk-query or bulk-export pattern that nobody alerted on. Collect the logs, retain them, and alert when they tell you what's happening.
- Privileged Access Workstations for tier-0 administration Domain admins and cloud-tenant root holders should not be checking email and admining the directory from the same laptop. Separate the device, separate the trust tier.
Sources
- House Oversight Committee — The OPM Data Breach: How the Government Jeopardized Our National Security for More than a Generation // primary
- OPM — Cybersecurity incidents announcement // primary
- OPM data breach — Wikipedia // reporting
- US Senate Armed Services Committee — Inquiry into cyber intrusions affecting US Transportation Command // primary