A Leaked FBI Warning about Doxing Somewhat Misses the Bigger Picture.
An FBI intelligence bulletin released over the weekend by Anonymous, says that law enforcement personnel and other victims are at risk for identity theft due to the nature of doxing, or exposing personal information on a victim to the public.
Doxing has become a common practice recently in the aftermath of various AntiSec or Anonymous related attacks.
The standard dox on a person can include all relevant personal details, such as name, address, phone numbers, date of birth, Social Security Number, social networking information, usernames, passwords, images, and anything else that is related to them in an identifying capacity.
“In response to law enforcement activities that have occurred against Anonymous and LulzSec since January 2011, members of these groups have increased their interest in targeting law enforcement in retaliation for the arrests and searches conducted… As more arrests are made against suspected members of Anonymous and LulzSec, the FBI expects hacking activities and ‘doxing’ that targets law enforcement and government interests will continue. This could compromise investigations and result in harassment and identity theft of the individuals named in the ‘dox’,” the memo explains.
Just days before the memo was released to the law enforcement community, Anonymous (in support of the AntiSec movement) released the personal information of nearly 7,000 people, including names, email addresses, home addresses, phone numbers, usernames, passwords, and Social Security Numbers.
So while the FBI’s warning on doxing came too late to make any type of difference, the message is important. Yet, the memo itself misses one of the larger issues that led to the exposure of personal information to begin with. They touch on it in passing, but fail to outline it in any sort of context.
All 7,000 victims doxed by AntiSec had their personal information stored in the clear, with no real protection whatsoever.
In fact, in order to expose the 7,000 people the way they did, AntiSec supporters simply used recycled passwords to access the Missouri Online Training Academy database, located on mosheriffs.com.
So while the FBI is correct, as doxing can impact investigations and the personal security for those exposed, the mention of “safeguarding material containing personal information pertaining to officers and named victims” as a mitigation without any context, isn’t all too helpful. The lesson here is to know what data is important, where it is located, and how best to protect it. If the data housed on the hijacked domain was encrypted and segregated from the start, then it would have been useless when compromised.
A copy of the leaked memo can be seen here.
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
