{"id":11699,"date":"2016-02-08T11:28:41","date_gmt":"2016-02-08T17:28:41","guid":{"rendered":"http:\/\/hcstx.org\/?p=11699"},"modified":"2016-02-08T11:28:41","modified_gmt":"2016-02-08T17:28:41","slug":"hacker-plans-to-dump-alleged-details-of-20k-fbi-and-9k-dhs-employees","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/02\/08\/hacker-plans-to-dump-alleged-details-of-20k-fbi-and-9k-dhs-employees\/","title":{"rendered":"Hacker Plans to Dump Alleged Details of 20K FBI and 9K DHS Employees"},"content":{"rendered":"<p><em><strong>If the account given below is accurate, it will not matter HOW MUCH \u00a0money the US Govt spends on Cyber Defense. We have bonafide IDIOTS giving away information on &#8220;how-to&#8221; access secure Govt. data. You cannot FIX STUPID folks. And oh yeah, Iran is now a viable threat. -SF<\/strong><\/em><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-11700\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/02\/hack.jpg\" alt=\"hack\" width=\"299\" height=\"168\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>A hacker, who wishes to remain anonymous, plans to dump the apparent names, job titles, email addresses and phone numbers of over 20,000 supposed Federal Bureau of Investigation (FBI) employees, as well as over 9,000 alleged Department of Homeland Security (DHS) employees, Motherboard has learned.<\/p>\n<p>The hacker also claims to have downloaded hundreds of gigabytes of data from a Department of Justice (DOJ) computer, although that data has not been published.<\/p>\n<p>On Sunday, Motherboard obtained the supposedly soon-to-be-leaked data and called a large selection of random numbers in both the DHS and FBI databases. Many of the calls went through to their respective voicemail boxes, and the names for their supposed owners matched with those in the database. At one point, Motherboard reached the operations center of the FBI, according to the person on the other end.<\/p>\n<p>One alleged FBI intelligence analyst did pick up the phone, and identified herself as the same name as listed in the database. A DHS employee did the same, but did not feel comfortable confirming his job title, he said.<\/p>\n<p>A small number of the phones listed for specific agents or employees, however, went through to generic operator desks in various departments. One FBI number that Motherboard dialled did go through to a voicemail box, but the recorded message seemed to indicate it was owned by somebody else. This also applied to two of the DHS numbers.<\/p>\n<p>After several calls, Motherboard was passed through to the State and Local desk at the National Operations Centre, part of the DHS. That department told Motherboard that this was the first they had heard about the supposed data breach.<\/p>\n<p>The job titles included in the data cover all sorts of different departments: contractors, biologists, special agents, task force officers, technicians, intelligence analysts, language specialists, and much more.<\/p>\n<p>The data was obtained, the hacker told Motherboard, by first compromising the email account of a DoJ employee, although he would not elaborate on how that account was accessed in the first place. (On Monday, the hacker used the DoJ email account to contact this reporter).<\/p>\n<blockquote class=\"quote\">\n<h3>\u201cI clicked on it and I had full access to the computer.\u201d<\/h3>\n<\/blockquote>\n<p>From there, he tried logging into a DOJ web portal, but when that didn&#8217;t work, <em><strong>he phoned up the relevant department.<\/strong><\/em><\/p>\n<p><em><strong>\u201cSo I called up, told them I was new and I didn&#8217;t understand how to get past [the portal],\u201d the hacker told Motherboard. \u201cThey asked if I had a token code, I said no, they said that&#8217;s fine\u2014just use our one.\u201d<\/strong><\/em><\/p>\n<p>The hacker says he then logged in, clicked on a link to a personal computer which took him to an online virtual machine, and entered in the credentials of the already hacked email account. After this, the hacker was presented with the option of three different computers to access, he claimed, and one was the work machine of the person behind the originally hacked email account.<\/p>\n<p>\u201cI clicked on it and I had full access to the computer,\u201d the hacker said. Here the hacker could access the user&#8217;s documents, as well as other documents on the local network.<\/p>\n<p>The databases of supposed government workers were on a DoJ intranet, the hacker claimed. It is not fully clear when the hacker intends to dump the databases.<\/p>\n<p>The hacker also said that he downloaded around 200GB of files, out of 1TB that he had access to.<\/p>\n<p>\u201cI HAD access to it, I couldn&#8217;t take all of the 1TB,\u201d he said. He claimed that some of the files&#8217; contents included military emails, and credit card numbers. This supposed data was not provided to Motherboard.<\/p>\n<p>This is just the latest in a series of hacks targeting US government employees. Back in October, hackers claiming a pro-Palestine political stance <a href=\"https:\/\/motherboard.vice.com\/read\/teen-hackers-a-5-year-old-could-have-hacked-into-cia-directors-emails\">broke into the email account<\/a> of CIA Director John Brennan. This was followed by a prank, in which calls to the Director of National Intelligence James Clapper <a href=\"https:\/\/motherboard.vice.com\/read\/teen-who-hacked-cia-email-is-back-to-prank-us-spy-chief\">would be forwarded<\/a> to the Free Palestine Movement.<\/p>\n<p>The Department of Justice did not respond to Motherboard&#8217;s request for comment, and the FBI was not reachable. Motherboard provided a copy of the apparent DHS data to the <a href=\"http:\/\/www.dhs.gov\/national-infrastructure-coordinating-center\">National Infrastructure Coordinating Center (NICC)<\/a> which is part of the DHS, but it declined to comment. A DHS public affairs officer did not immediately respond to Motherboard&#8217;s request for comment.<\/p>\n<p><strong><em>Update 8 February 2016: After the publication of this article, a Twitter account with a pro-Palestinian message published the apparent details of the 9,000 DHS employees. The account also tweeted a screenshot supposedly from the <\/em><em>Department of Justice computers that the hacker claimed to have accessed.<\/em><\/strong><\/p>\n<p>Read the Original Article at <strong><a href=\"http:\/\/motherboard.vice.com\/read\/hacker-plans-to-dump-alleged-details-of-20000-fbi-9000-dhs-employees\">Motherboard<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If the account given below is accurate, it will not matter HOW MUCH \u00a0money the US Govt spends on Cyber Defense. We have bonafide IDIOTS giving away information on &#8220;how-to&#8221; access secure Govt. data. You cannot FIX STUPID folks. And oh yeah, Iran is now a viable threat. -SF &nbsp; A hacker, who wishes to&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2805,2122,13,74,4445,1317,4126,883,2908,4479,1814,2450,3176,65],"tags":[4477,4478,3317,1284,4480,4481,3416,1815,3125,1699],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/11699"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=11699"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/11699\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=11699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=11699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=11699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}