Porn-loving US official spreads malware to government network
- Published
The porn habit of an employee at the US Geological Survey (USGS) led to a government network becoming infected with malware, has revealed.
The employee, who has not been named, had "an extensive history of visiting adult pornography websites".
Investigators found malware on many of the 9,000 pages he or she accessed.
The US Office of the Inspector General has recommended that the USGS blacklist "rogue" websites.
"Our analysis confirmed that many of the pornographic images were subsequently saved to an unauthorised USB device and personal Android cell phone," the report explained
As well as government computers, the employee's personal mobile was also found to be infected.
USB risk
Reports of the case were , which confirmed that the Earth Resources Observation and Science Center (Eros) does not maintain any classified networks.
The site also reported that the malware in question was designed to steal data from infected computers and was "associated" with ransomware attacks.
USGS employees are advised not to connect USB devices or mobile phones to government computers - though USB connections are not disabled.
An IT policy that prevents USB use should be implemented, the US Department of the Interior suggested.
- Published15 January 2018
- Published12 October 2017