Hacker Passes Through FBI Cyber Security With Just One Call

It doesn’t matter how technically secure your data is if it’s protected by gullible humans.

The departments of Justice and Homeland Security are investigating a Justice hack allegedly made possible by the enemy of secure logins—IT support.

Many federal agencies, including Justice, recently switched on two-factor authentication intended to stop hackers from busting into government databases with merely a password. But that second factor for identification isn’t that safe, when it only takes a call to the help desk for a second form of authorization, say security experts.

Now, a hacktivist, who wishes to remain nameless, claims that technique is exactly what he used to break into a computer containing contact information on some 9,000 DHS personnel and 20,000 FBI employees.

The hacker already had a password for a Justice employee’s email account, according to Motherboard, which first reported the breach Feb. 7. From the account, he attempted to log into a restricted department website. When he couldn’t enter, he dialed the relevant help desk.

“So I called up, told them I was new and I didn’t understand how to get past [the portal],” the hacker told Motherboard. “They asked if I had a token code, I said no, they said that’s fine—just use our one.”

A former FBI official said there are existing policies that prohibit Justice IT support personnel from supplying a token without further verifying the individual requesting access is who he or she claims to be.
The individual typically must either visit a facility—in person—that can identity-proof the employee, or he must prove his identity over the phone by providing knowledge only he would know.

“I’m not sure it was in the protocol for the help desk to provide the token for access without significant further authentication,” Leo Taddeo, former FBI special agent in charge of the special operations and cyber division, told Nextgov. ”Probably, if you trace it back, it is a failure to follow proper protocol. It’s probably someone just wanted to be helpful.”
Technology and policy safeguards fail when confronted by human nature, he said.

“The weakest point is the user,” said Taddeo, now chief security officer for cyber firm Cryptzone. “It’s the human being, no matter what we design, no matter how much we emphasize the technological solutions—if we have users and especially help desks and system administrators that circumvent technology controls by just giving away information.”

Recently, Justice officials declined to comment on IT support procedures for users locked out of department accounts. But they acknowledged a probe into a breach is underway.

“The department is looking into the unauthorized access of a system operated by one of its components containing employee contact information,” Justice spokesman Peter Carr said in an emailed statement. “There is no indication at this time that there is any breach of sensitive personally identifiable information.”

He added that the department will continue “to deploy protection and defensive measures to safeguard information.”

DHS spokesman S.Y. Lee said Homeland Security takes such allegations very seriously. “We are looking into the reports of purported disclosure of DHS employee contact information,” he said, adding, “however, there is no indication at this time that there is any breach of sensitive or personally identifiable information.”

After revelations Office of Personnel Management hackers stole a gigantic number of national security employee records, the White House in June 2015 ordered all agencies to accelerate the activation of two-factor authentication.

As of last October, more than 80 percent of civilian employees government-wide needed a password plus a smartcard, digital token or other secondary ID format to enter agency systems.

The Obama administration’s budget proposal for 2017, released Tuesday, requests $26 million from Congress for the “Justice Security Operations Center; for the Identity, Credentialing, and Access Management program; to enhance information security and continuous monitoring; and for a stronger insider threat program.”

Whoever is behind the leak of FBI and DHS contacts tweeted links to the data accompanied by Pro-Palestine messages, using the handle @DotGovs.

The stash included DHS employee names, official titles, departments, phone and fax numbers, state and country address information, and official DHS.gov email address, according to Reuters and researchers at the SITE Intelligence Group.

‘This Is a Continuing Threat’

During a call with reporters about the budget, White House cyber czar Michael Daniel said, “With the breach today at DOJ” what that “shows is that this is a continuing threat of varying degrees. We’re still sort of understanding better exactly what happened there.”

The dump of Rolodex information does not seem to come close to the severity of the OPM data theft. “It doesn’t sound like he got into a sensitive database,” Taddeo said. “It sounds like he got into an address book that would accompany an email account.”

Similar recent social engineering hacks reportedly deceived Verizon and Amazon customer support representatives.

Last fall, a member of the hacktivist group “Crackas with Attitude” impersonated a Verizon technician over the phone to gain data necessary for accessing CIA Chief John Brennan’s AOL account. The hacker provided a real Verizon worker a fake employee code and then asked for the details about Brennan.

Software developer Eric Springer last month wrote on Medium about an ID thief who, he said, supplied an Amazon customer service rep an incorrect mailing address found online at whois.com, to similar effect.

“Wow. Just wow. The attacker gave Amazon my fake details from a who-is query, and got my real address and phone number in exchange. Now they had enough to bounce around a few services, even convincing my bank to issue them a new copy of my credit card,” Springer wrote.

DefenseOne: http://bit.ly/2413L9t

« We Need Social Media With A Heart
Cybersecurity Is A Great Career Choice »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NSFOCUS Information Technology

NSFOCUS Information Technology

NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider.

Teneo

Teneo

Teneo is a Solutions Provider focused on reducing complexity. We combine leading technology with deep expertise to create new ideas on how to simplify IT operations.

Gigasoft

Gigasoft

Gigasoft provide secure online data backup & cloud backup services for the education sector and businesses.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

Dell Technologies

Dell Technologies

Dell Technologies Consulting Services enables a highly resilient business amidst the proliferation of cloud-based IT services and constant threats to your most critical information.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

VAST Data

VAST Data

The VAST Data Platform delivers scalable performance, radically simple data management and enhanced productivity for the AI-powered world.

CIP Cyber

CIP Cyber

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure.

Blackmere Consulting

Blackmere Consulting

Blackmere Consulting is a Nationwide Technical and Executive Recruiting firm dedicated to Cyber Security and Information Technology.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.