Breach at US Transportation Department exposes 240,000 employee records
An investigation is underway into the breach, which affected former and current employee data


A data breach at the US Department of Transportation (USDOT) has exposed the data of 237,000 former and current federal employees.
The breach was found to have affected USDOT’s TRANServe system for employee commuting reimbursement, which contains personal data pertaining to government workers.
USDOT stressed that no wider transport systems are linked to TRANServe, and no criminal use of the data has been detected at present.
Congress was made aware of the incident via email on 12 May, and USDOT has frozen access to the system while an investigation is underway.
Reuters reported that within the email, USDOT wrote it had "isolated the breach to certain systems at the department used for administrative functions, such as employee transit benefits processing”.
Almost half of those affected still work at the USDOT, with 114,000 current employees affected by the breach in addition to 123,000 former employees.
Federal branches are often subject to cyber security incidents due to the sensitive nature of information stored in their databases.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
In January, the Cybersecurity and Infrastructure Security Agency (CISA) stated that federal civilian executive branch (FCEB) agencies had been targeted as part of a phishing campaign that went undetected for months.
RELATED RESOURCE
Nine steps to proactively manage data privacy and protection
Build trust with your employees, customers, and third parties
Threat actors had socially-engineered victims into opening malicious links over the phone, under the false claim that they had a financial claim to address.
CISA has engaged in an aggressive internal campaign to tighten cyber security across federal computer systems.
In October 2022 it issued new vulnerability detection orders requiring FCEB agencies to perform weekly checks on assets, and fortnightly vulnerability enumeration with results shared on the same regular basis.
CISA frequently updates its list of exploited vulnerabilities, through which it keeps federal agencies appraised of active cyber threats that require immediate mitigation to avoid.
Well-known vulnerabilities such as Log4Shell are often behind attacks on federal systems in the past year, with Iranian state-sponsored hackers discovered to have breached a federal agency in February 2022.
Despite having been discovered in December 2021, Log4Shell issues continue to plague businesses with research by cyber security firm Tenable having found that 72% of firms sre still vulnerable to the vulnerability.

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
UK cyber experts on red alert after Salt Typhoon attacks on US telcos
Analysis The UK could be next in a spate of state-sponsored attacks on telecoms infrastructure
By Solomon Klappholz Published
-
Healthcare data breaches are out of control – here's how the US plans to beef up security standards
News Changes to HIPAA security rules will require organizations to implement MFA, network segmentation, and more
By Solomon Klappholz Published
-
The US could be set to ban TP-Link routers
News US authorities could be lining up the largest equipment proscription since the 2019 ban on Huawei networking infrastructure
By Solomon Klappholz Published
-
US government IT contractor could face death penalty over espionage charges
News The IT pro faces two espionage charges, each of which could lead to a death sentence or life imprisonment, prosecutors said
By Ross Kelly Published
-
US identifies and places $10 million bounty on LockBit, Hive ransomware kingpin
News Mikhail Pavlovich Matveev was linked to specific ransomware attacks, including a 2021 raid on the DC police department
By Rory Bathgate Published
-
IRS mistakenly publishes 112,000 taxpayer records for the second time
News A contractor is thought to be responsible for the error, with the agency reportedly reviewing its relationship with Accenture
By Zach Marzouk Published
-
US begins seizure of 48 DDoS-for-hire services following global investigation
News Six people have been arrested who allegedly oversaw computer attacks launched using booters
By Zach Marzouk Published
-
US seizes millions in stolen COVID relief funds by China-backed hackers
News APT41 had stolen at least $20 million intended for small businesses, but this is a drop in the water compared to the total lost
By Rory Bathgate Published