Hacker Passes Through FBI Cyber Security With Just One Call

It doesn’t matter how technically secure your data is if it’s protected by gullible humans.

The departments of Justice and Homeland Security are investigating a Justice hack allegedly made possible by the enemy of secure logins—IT support.

Many federal agencies, including Justice, recently switched on two-factor authentication intended to stop hackers from busting into government databases with merely a password. But that second factor for identification isn’t that safe, when it only takes a call to the help desk for a second form of authorization, say security experts.

Now, a hacktivist, who wishes to remain nameless, claims that technique is exactly what he used to break into a computer containing contact information on some 9,000 DHS personnel and 20,000 FBI employees.

The hacker already had a password for a Justice employee’s email account, according to Motherboard, which first reported the breach Feb. 7. From the account, he attempted to log into a restricted department website. When he couldn’t enter, he dialed the relevant help desk.

“So I called up, told them I was new and I didn’t understand how to get past [the portal],” the hacker told Motherboard. “They asked if I had a token code, I said no, they said that’s fine—just use our one.”

A former FBI official said there are existing policies that prohibit Justice IT support personnel from supplying a token without further verifying the individual requesting access is who he or she claims to be.
The individual typically must either visit a facility—in person—that can identity-proof the employee, or he must prove his identity over the phone by providing knowledge only he would know.

“I’m not sure it was in the protocol for the help desk to provide the token for access without significant further authentication,” Leo Taddeo, former FBI special agent in charge of the special operations and cyber division, told Nextgov. ”Probably, if you trace it back, it is a failure to follow proper protocol. It’s probably someone just wanted to be helpful.”
Technology and policy safeguards fail when confronted by human nature, he said.

“The weakest point is the user,” said Taddeo, now chief security officer for cyber firm Cryptzone. “It’s the human being, no matter what we design, no matter how much we emphasize the technological solutions—if we have users and especially help desks and system administrators that circumvent technology controls by just giving away information.”

Recently, Justice officials declined to comment on IT support procedures for users locked out of department accounts. But they acknowledged a probe into a breach is underway.

“The department is looking into the unauthorized access of a system operated by one of its components containing employee contact information,” Justice spokesman Peter Carr said in an emailed statement. “There is no indication at this time that there is any breach of sensitive personally identifiable information.”

He added that the department will continue “to deploy protection and defensive measures to safeguard information.”

DHS spokesman S.Y. Lee said Homeland Security takes such allegations very seriously. “We are looking into the reports of purported disclosure of DHS employee contact information,” he said, adding, “however, there is no indication at this time that there is any breach of sensitive or personally identifiable information.”

After revelations Office of Personnel Management hackers stole a gigantic number of national security employee records, the White House in June 2015 ordered all agencies to accelerate the activation of two-factor authentication.

As of last October, more than 80 percent of civilian employees government-wide needed a password plus a smartcard, digital token or other secondary ID format to enter agency systems.

The Obama administration’s budget proposal for 2017, released Tuesday, requests $26 million from Congress for the “Justice Security Operations Center; for the Identity, Credentialing, and Access Management program; to enhance information security and continuous monitoring; and for a stronger insider threat program.”

Whoever is behind the leak of FBI and DHS contacts tweeted links to the data accompanied by Pro-Palestine messages, using the handle @DotGovs.

The stash included DHS employee names, official titles, departments, phone and fax numbers, state and country address information, and official DHS.gov email address, according to Reuters and researchers at the SITE Intelligence Group.

‘This Is a Continuing Threat’

During a call with reporters about the budget, White House cyber czar Michael Daniel said, “With the breach today at DOJ” what that “shows is that this is a continuing threat of varying degrees. We’re still sort of understanding better exactly what happened there.”

The dump of Rolodex information does not seem to come close to the severity of the OPM data theft. “It doesn’t sound like he got into a sensitive database,” Taddeo said. “It sounds like he got into an address book that would accompany an email account.”

Similar recent social engineering hacks reportedly deceived Verizon and Amazon customer support representatives.

Last fall, a member of the hacktivist group “Crackas with Attitude” impersonated a Verizon technician over the phone to gain data necessary for accessing CIA Chief John Brennan’s AOL account. The hacker provided a real Verizon worker a fake employee code and then asked for the details about Brennan.

Software developer Eric Springer last month wrote on Medium about an ID thief who, he said, supplied an Amazon customer service rep an incorrect mailing address found online at whois.com, to similar effect.

“Wow. Just wow. The attacker gave Amazon my fake details from a who-is query, and got my real address and phone number in exchange. Now they had enough to bounce around a few services, even convincing my bank to issue them a new copy of my credit card,” Springer wrote.

DefenseOne: http://bit.ly/2413L9t

« We Need Social Media With A Heart
Cybersecurity Is A Great Career Choice »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Micro Focus

Micro Focus

Micro Focus is one of the world’s largest enterprise software providers. We deliver trusted and proven mission-critical software that keeps the digital world running.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

Niagara Networks

Niagara Networks

Niagara Networks is a Network Visibility industry leader, with emphasis in 1/10/40/100 Gigabit systems and mission-critical IT and security appliances.

Quick Heal Technologies

Quick Heal Technologies

Quick Heal Technologies is a leading IT security solutions provider focused on endpoint and network security solutions.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

ENLIGHTENi

ENLIGHTENi

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. Our mission is to develop next-gen talent through challenge-based learning and team collaboration.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

National Cybersecurity Competence Centre (NC3) - Czech Republic

National Cybersecurity Competence Centre (NC3) - Czech Republic

NC3 has been established in response to growing demands for practically applicable products and solutions for ensuring cybersecurity of critical and non-critical information infrastructures.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

Fivecast

Fivecast

Fivecast is enabling a safer world. We help organizations around the world explore masses of data to uncover actionable insights.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.

Deep Algorithms Solutions

Deep Algorithms Solutions

Deep Algorithms Solutions is a pioneering behavioral cybersecurity and AI startup combating sophisticated cyber fraud.