On Monday, the command “initiated an investigation into information we were provided about a potential issue with the command’s Cloud service,” Special Operations Command (SOCOM) spokesperson Ken McGraw said in an email to CNN on Tuesday.
“The only other information we can confirm at this point is no one has hacked US Special Operations Command’s information systems,” McGraw said.
Samples of the data Sen shared with CNN dated back years and included standard information about US military contracts and requests by Department of Defense employees to have their paperwork processed.
Anyone who knew the IP address of the server could access the data without a password until the server was secured on Monday, Sen said.
The data exposure is an example of how powerful organizations can unwittingly expose potentially sensitive internal data by not configuring their computer servers properly.
It is not uncommon for large organizations to inadvertently expose internal data to the internet, but the fact that this is a Department of Defense email server will give US officials cause for concern. It is unclear if any malicious outsider accessed the exposed SOCOM data. CNN has requested comment from the command.
Special Operations Command is an elite Pentagon command responsible for counterterrorism and hostage rescue missions around the globe.
The leaked Department of Defense email data spanned three terabytes (the equivalent of dozens of standard smartphones’ storage), most of it belonging to SOCOM, according to Sen, who said the leak began on February 8.