An Ektron-based website for an obscure branch of the US Government has apparently been hacked this week, but so far, details on what exactly happened have yet to filter out.
US Office of Government Ethics Site Downed
Ektron, a .NET Enterprise Web CMS vendor, has dozens of government contracts worth millions of dollars, but a company spokesperson indicated the hacking incident wasn't any kind of systemic event, the Washington Examiner reported.
The US Office of Government Ethics website was taken offline by unidentified hackers this week, and the agency initially responded by saying it thought that other Ektron sites had been hacked as well, Vincent Salamone, an agency spokesman told the Examiner.
An Ektron spokesman denied there was any kind of system wide attack targeting Ektron's software, and that leaves open the possibility that the virtually unheard of agency was specifically targeted.
The US Office of Government Ethics was founded to help ensure ethical standards for executive branch employees, according the agency's website. Why anyone would want to intentionally hack the site is unclear, as is why anyone would want to target Ektron based websites more generally.
An Unpleasant Reminder
Much as we all tend to rely on a constant flow of information online, the OGE website take down is simply the latest in a virtually neverending stream of website security breaches.
Over the last two years, a string of increasingly high profile security breaches has stretched across the Web. From Sony, Amazon and Dropbox to Drupal, Pinterest and Twitter, many company websites have been repeatedly targeted.
Of course, government websites have also been frequently targeted, as the most recent incident points out. The OGE said no content had been affected, and that all the information there was publicly available anyway.
As noted above, Ektron is built on the Microsoft .NET platform, and while there are .NET security vulnerabilities discovered and patched on a regular basis, this particular incident has thus far not been connected to a specific exploit. Additionally, no one has come forward claiming responsibility for the hack.
Image credit: Sergey Nivens / Shutterstock