Follow us! >

After-Action Review of Unauthorized Access to USPS Employee Self-Service Portal (LiteBlue)

Background

The U.S. Postal Service is the second largest employer in the United States with over 640,000 employees and $2.15 billion in bi-weekly salaries. To provide employees with convenient access to their payroll, benefits, and personnel data, the Postal Service uses the LiteBlue portal. This web-based portal contains several human resources (HR) applications, including PostalEASE, which allows employees to establish direct deposits, create or modify payroll allotments, and update retirement and health benefits information. In October 2022, some employees entered their login credentials into several fake LiteBlue websites, allowing bad actors to obtain their login credentials and fraudulently reroute employees’ payroll direct deposits and create payroll allotments to bank accounts they controlled.

What We Did

Our objective was to determine if the Chief Information Security Office (CISO) appropriately responded to and mitigated fraudulent access to the PostalEASE application. We also assessed the extent to which CISO could have prevented or mitigated this fraudulent access. For this audit, we reviewed CISO’s response to the attack, evaluated cyber incident and event policies and procedures, and analyzed employee and payroll data.

What We Found

CISO did not take all critical steps necessary to prevent fraudulent access to the PostalEASE application, such as implementing multifactor authentication (MFA) or providing security awareness training to all employees. These issues occurred because CISO prioritized securing the broader Postal Service network and did not make security awareness training mandatory. Additionally, CISO did not escalate the 2022 phishing attack from an “event” to an “incident,” despite unauthorized system access, unlawful activity, and indication the attackers used employees’ credentials to access multiple HR applications.

Recommendations and Managements Comments

We made six recommendations to address issues related to fraudulent account access, incident escalation, residual risk to MFA, and more. Postal Service management agreed with four recommendations and disagreed with two. Management’s comments and our evaluation are at the end of each finding and recommendation. The U.S. Postal Service Office of Inspector (OIG) considers management’s comments responsive to recommendations 1,3,4, and 6 and corrective actions should resolve the issues identified in the report.

Sign up to receive our Daily Postal News blast

Related Articles

Tell us what you think below!

Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Hot this week

Here’s what you should know before updating your benefits

The Postal Service wants employees to know some important things concerning the open season benefits enrollment period that began this week.

USPS gives behind-the-scenes look at holiday shipping

USPS at 1410 NW Gage Blvd in Topeka is using a new sorting machine and new vehicles, which they believe will improve efficiency for the holidays.

Former MSU professor creates portraits for Postal Service Revolutionary War stamp collection

STARKVILLE, Miss.—An upcoming collection of U.S. Postal Service stamps honoring the nation’s 250th anniversary features a retired Mississippi State professor’s artwork.

Sens. Cruz, Hyde-Smith, Capito Introduce Bill to Restore Trust in the USPS

 U.S. Sen. Ted Cruz (R-Texas), Cindy Hyde-Smith (R-Miss.), and Shelley Moore Capito (R-W. Va.) introduced the Upholding a Secure Postal System (USPS) Act to direct the U.S. Comptroller General to submit a report to Congress on nationwide mail theft trends and the security of postal property.

Want to compare health plans? This tool can help

To help Postal Service employees compare health plans during this year’s open season, the organization offers access to Checkbook’s Guide to PSHB Plans.
spot_img

Related Articles

Popular Categories

spot_imgspot_img
Secret Link
0
Would love your thoughts, please comment.x
()
x