Everything You Need to Know About OPM Hack

  • By David Lukic
  • Published: Jan 04, 2021
  • Last Updated: Apr 20, 2022

The United States Office of Personnel Management (OPM), which oversees all civilian government workers, was hacked. What makes this OPM hack so scary is that many of the records obtained were SF-86 forms containing very sensitive and personal information from background checks performed on potential employees. Along with the information, hackers got away with millions of fingerprints. The OPM data breach led to a congressional hearing and, eventually, the resignation of the CEO due to shoddy security practices that allowed the data breach to happen. Even after an exhaustive investigation, exactly how the breach occurred is still not clear, which is concerning. How can the OPM protect against future attacks if they cannot discern how this one happened?

When Was the OPM Data Breach?

The OPM hack occurred during a few attacks beginning in November of 2013 and continuing until May 7, 2014. It wasn’t discovered until April 15, 2015.  OPM officials estimated roughly 4 million people’s records were stolen during this incident. U.S. federal officials claim this is one of the largest government data breaches in history. In August of 2017, the FBI caught and arrested a Chinese national (Yu Pingan) thought to be responsible for the malware which stole the content.

OPM Hack

How to Check if Your Data Was Breached

Although there is no public website where you can visit to check to see if your information was among that which was stolen, you can contact the OPM directly to inquire. The FTC and FBI have been heavily involved in the investigation, and they may have additional information for victims as well.

Victim of OPM Hack? Here's What to Do

If you worked for the government or applied for a job and were one of the unfortunate people to have their private information stolen during this OPM data breach, you should take a few steps immediately.

  • The first and most important one is to protect your credit by getting a copy of your credit report and signing up for ongoing credit monitoring services with a reputable company like IDStrong.com.
  • You should also continue to monitor all your credits and bank statements scouring for illegal activity each month.
  • Be sure to watch out for scam or phishing emails and never click any links or download attachments, especially if the email has strong language urging you to do something quickly. 
  • You may also contact the authorities and report any fraud or identity theft if it occurs.

Can OPM Breach Information be Used for Identity Theft?

The OPM hack included such vast and overreaching personal information from background checks there is no telling how many ways cybercriminal might use this data to gain access to credit card or bank accounts, steal identities or worse. Along with personal details, more specific lifestyle information would have been included making it easy for hackers to breach logins and affect other areas of life. You cannot be too careful when protecting yourself against identity theft.

OPM Data Breach

How to Protect Yourself from Cases Like OPM Hack

Unfortunately for OPM and the victims, the damage is done. Going forward, however, there are things to do to protect yourself and keep your identity safe. First and foremost, never give out any personal information to anyone unless absolutely necessary.

  • Ask about security protocols and how and where your data will be stored.
  • Limit your credit card usage online and never use a debit card to pay for things online.
  • Monitor your bank and credit card statements carefully each month and look for fraud. If you find any suspicious activity, alert your banking institution immediately.
  • Keep your computer updated with the latest antivirus software and run scans often.
  • Watch out for suspicious-sounding emails; they could be phishing attempts that might infect your computer with a virus, malware, or ransomware.
About the Author
IDStrong Logo

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that much a ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close