top of page

US Coast Guard Data Breach Exposes Sensitive Personnel Information, Forces System Shutdown

A significant data breach has compromised the personnel and payroll systems of the U.S. Coast Guard, exposing sensitive financial information of service members and disrupting payroll operations. The attack has forced the agency to take critical systems offline until at least February 19, 2025, in an effort to prevent further intrusion.


Compromised Accounts and Impact on Service Members

The breach was first detected by a junior petty officer who noticed unusual activity in their account. Investigators have yet to determine the full scope of the attack or identify the source of the intrusion. According to a Coast Guard spokesperson, the agency is actively “investigating the breach of data within its personnel and payroll system, which has impacted the timeliness of bi-weekly pay to 1,135 members.”


With the Pay and Personnel Center pulling the Direct Access military pay and benefits system offline, affected service members are left in limbo regarding their earnings. However, the Coast Guard has assured its workforce that it is prioritizing remediation efforts: “Concurrently, the Coast Guard Personnel Service Center and Pay and Personnel Center are expediting pay to any impacted Coast Guard members,” the agency said. “The men and women of the USCG workforce are our most valuable resource.”


Potential Risks: Identity Theft and Financial Fraud

The breach raises immediate concerns over financial fraud and identity theft, as personally identifiable information (PII) may have been compromised. Bad actors could leverage the stolen data for fraudulent credit card applications, identity fraud, or targeted social engineering attacks.


Cybersecurity experts warn that exposed personnel should take proactive steps to secure their accounts. Strong password management, multi-factor authentication (MFA), and credit monitoring are essential. Additionally, service members should be wary of phishing attempts that exploit personal information gleaned from the breach.


A Pattern of Attacks on Critical Infrastructure

This incident marks the second major cybersecurity event affecting the Coast Guard in under a year. In April 2024, a separate data breach exposed private information, including home addresses, employee identification numbers, and names of thousands of individuals.

Attacks on U.S. military entities and defense contractors have been escalating, with Infostealer malware targeting high-profile organizations such as the U.S. Army, Navy, Lockheed Martin, and Boeing. Cybercriminals, often backed by rogue nation-states, exploit vulnerabilities in legacy systems, underscoring the urgent need for modernization and security improvements.


Expert Insights: The Danger of Dormant Identities

Cybersecurity experts emphasize that outdated systems with unmonitored digital identities pose a significant risk to national security. Baber Amin, Chief Product Officer at Anetac, stresses the importance of modernizing infrastructure to prevent unauthorized access:

"The U.S. Coast Guard’s recent breach underscores the urgent need to modernize and secure legacy systems. As hackers increasingly target critical infrastructure, government agencies must ensure full visibility and security across their operations to prevent unauthorized access and data compromise.


Oftentimes, critical infrastructure organizations, due to their age, are plagued with unmonitored and dormant human and non-human identities (NHIs) that serve as prime entry points for cyberattackers. In this case, abnormal activity on a Petty Officer’s account suggests hackers may have exploited an identity-related vulnerability to scope, move laterally through the organization and access sensitive data. The affected U.S. Coast Guard members may now face financial fraud, and worse, the full scope of the breach remains unknown—raising the risk that attackers still have access.


To prevent future breaches, critical infrastructure organizations must run assessments into their systems to discover all active and inactive identities (both human and non-human), map access chains, and evaluate security controls (credential strength, age, activity, and standing access privileges). A real-time streaming solution identifying and tracking all identity vulnerabilities should be implemented to establish a behavioral baseline, enabling early detection of suspicious activity.”

Mitigating the Fallout

In response to the breach, the Coast Guard has pledged to keep its workforce informed as it works to restore its systems. “Our members deserve transparency into the causes and resolution of this incident,” the spokesperson stated, adding that the agency will “continue to provide timely updates to the workforce.”


For affected personnel, vigilance is key. Monitoring financial statements, securing online accounts, and enabling fraud alerts can help mitigate risks. Additionally, enrolling in identity theft protection services may provide an extra layer of security against potential exploitation of stolen data.


As government agencies continue to be prime targets for cyberattacks, this breach serves as a stark reminder of the vulnerabilities inherent in aging infrastructure. Without immediate action to modernize identity and access management, incidents like these are likely to become more frequent, putting national security and service members at risk.

bottom of page