Hacker Infiltrates FBI Portal, Lists Details of 87,000 Users for Sale
KrebsOnSecurity, a security-focused news outlet, first identified the misdeed when it encountered a post on the cybercrime forum Breached. The post claims to offer the entirety of the FBI’s InfraGard for a “starting” price of $50,000 USD. “This will be sold one time only,” mysteriously writes the original poster, who goes by USDoD. “I like to conduct my business the same way that I conduct my life.”
InfraGard is a portal in which members of the FBI can communicate with “business executives, entrepreneurs, lawyers, security personnel, military and government officials, IT professionals, academia and state and local law enforcement.” According to the Infragard homepage, the portal is mainly used for information sharing and for education surrounding emerging threats. But in order to collaborate there, you have to have an Infragard profile—and the FBI’s own lack of robust security has made these profiles ripe for exploitation.
Apparently, InfraGard doesn’t have very stringent verification guidelines for new profile requests. “USDoD” is said to have simply used a real financial CEO’s details to apply for an account, then waited less than a month for approval. Once the hacker was in, they used a Python script to query InfraGard’s API, extracting 87,000 users’ contact information in the process. The CEO whose identity was stolen says the FBI never contacted him prior to the breach, meaning the allegedly “exclusive” InfraGard portal is so lax in its verification measures that it’s a wonder this didn’t happen sooner.
USDoD says their asking price may appear a bit high given some users’ email addresses, Social Security numbers, and dates of birth are missing from the list. The $50k asking price was supposedly a negotiation starter and not a final offer, according to a follow-up comment on the original post. USDoD says the sale, should they find an appropriate buyer, would be facilitated via the Breached administrator who goes by “Pompompurin.”
The FBI confirmed the breach earlier this week but has declined to publicly comment on the matter, saying only that the situation is “ongoing.”
Continue reading
Hackers Distributed a Trojanized Build of Windows 10 to Infiltrate Ukrainian Targets
While there are no clear fingerprints on the malicious ISO, Mandiant notes the targets overlap with previous operations from Russia's security services.