Hacker Passes Through FBI Cyber Security With Just One Call

It doesn’t matter how technically secure your data is if it’s protected by gullible humans.

The departments of Justice and Homeland Security are investigating a Justice hack allegedly made possible by the enemy of secure logins—IT support.

Many federal agencies, including Justice, recently switched on two-factor authentication intended to stop hackers from busting into government databases with merely a password. But that second factor for identification isn’t that safe, when it only takes a call to the help desk for a second form of authorization, say security experts.

Now, a hacktivist, who wishes to remain nameless, claims that technique is exactly what he used to break into a computer containing contact information on some 9,000 DHS personnel and 20,000 FBI employees.

The hacker already had a password for a Justice employee’s email account, according to Motherboard, which first reported the breach Feb. 7. From the account, he attempted to log into a restricted department website. When he couldn’t enter, he dialed the relevant help desk.

“So I called up, told them I was new and I didn’t understand how to get past [the portal],” the hacker told Motherboard. “They asked if I had a token code, I said no, they said that’s fine—just use our one.”

A former FBI official said there are existing policies that prohibit Justice IT support personnel from supplying a token without further verifying the individual requesting access is who he or she claims to be.
The individual typically must either visit a facility—in person—that can identity-proof the employee, or he must prove his identity over the phone by providing knowledge only he would know.

“I’m not sure it was in the protocol for the help desk to provide the token for access without significant further authentication,” Leo Taddeo, former FBI special agent in charge of the special operations and cyber division, told Nextgov. ”Probably, if you trace it back, it is a failure to follow proper protocol. It’s probably someone just wanted to be helpful.”
Technology and policy safeguards fail when confronted by human nature, he said.

“The weakest point is the user,” said Taddeo, now chief security officer for cyber firm Cryptzone. “It’s the human being, no matter what we design, no matter how much we emphasize the technological solutions—if we have users and especially help desks and system administrators that circumvent technology controls by just giving away information.”

Recently, Justice officials declined to comment on IT support procedures for users locked out of department accounts. But they acknowledged a probe into a breach is underway.

“The department is looking into the unauthorized access of a system operated by one of its components containing employee contact information,” Justice spokesman Peter Carr said in an emailed statement. “There is no indication at this time that there is any breach of sensitive personally identifiable information.”

He added that the department will continue “to deploy protection and defensive measures to safeguard information.”

DHS spokesman S.Y. Lee said Homeland Security takes such allegations very seriously. “We are looking into the reports of purported disclosure of DHS employee contact information,” he said, adding, “however, there is no indication at this time that there is any breach of sensitive or personally identifiable information.”

After revelations Office of Personnel Management hackers stole a gigantic number of national security employee records, the White House in June 2015 ordered all agencies to accelerate the activation of two-factor authentication.

As of last October, more than 80 percent of civilian employees government-wide needed a password plus a smartcard, digital token or other secondary ID format to enter agency systems.

The Obama administration’s budget proposal for 2017, released Tuesday, requests $26 million from Congress for the “Justice Security Operations Center; for the Identity, Credentialing, and Access Management program; to enhance information security and continuous monitoring; and for a stronger insider threat program.”

Whoever is behind the leak of FBI and DHS contacts tweeted links to the data accompanied by Pro-Palestine messages, using the handle @DotGovs.

The stash included DHS employee names, official titles, departments, phone and fax numbers, state and country address information, and official DHS.gov email address, according to Reuters and researchers at the SITE Intelligence Group.

‘This Is a Continuing Threat’

During a call with reporters about the budget, White House cyber czar Michael Daniel said, “With the breach today at DOJ” what that “shows is that this is a continuing threat of varying degrees. We’re still sort of understanding better exactly what happened there.”

The dump of Rolodex information does not seem to come close to the severity of the OPM data theft. “It doesn’t sound like he got into a sensitive database,” Taddeo said. “It sounds like he got into an address book that would accompany an email account.”

Similar recent social engineering hacks reportedly deceived Verizon and Amazon customer support representatives.

Last fall, a member of the hacktivist group “Crackas with Attitude” impersonated a Verizon technician over the phone to gain data necessary for accessing CIA Chief John Brennan’s AOL account. The hacker provided a real Verizon worker a fake employee code and then asked for the details about Brennan.

Software developer Eric Springer last month wrote on Medium about an ID thief who, he said, supplied an Amazon customer service rep an incorrect mailing address found online at whois.com, to similar effect.

“Wow. Just wow. The attacker gave Amazon my fake details from a who-is query, and got my real address and phone number in exchange. Now they had enough to bounce around a few services, even convincing my bank to issue them a new copy of my credit card,” Springer wrote.

DefenseOne: http://bit.ly/2413L9t

« We Need Social Media With A Heart
Cybersecurity Is A Great Career Choice »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Government Communications Headquarters (GCHQ)

Government Communications Headquarters (GCHQ)

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

National Cyber Security Centre (NCSC) - Ireland

National Cyber Security Centre (NCSC) - Ireland

The National Cyber Security Centre (NCSC) is the operational side of the Department of Communications in regard to network and information security in the Republic of Ireland.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

ReconaSense

ReconaSense

ReconaSense helps protect people, assets, buildings and cities with its next-gen access control and converged physical security intelligence platform.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

e-Careers

e-Careers

e-Careers is an edtech institution that provides industry recognised courses and up-skilling solutions to individuals and organisations.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

RightSec

RightSec

RightSec is an emerging market leader and solution provider for cybersecurity and digital resiliency. We provide end to end solutions to suit your specific business lifecycle.

3DOT Solutions

3DOT Solutions

3DOT Solutions is an established UK cybersecurity consultancy focused on delivering end-to-end cyber security solutions for private and public sector customers.

The Aerospace Corporation

The Aerospace Corporation

The Aerospace Corporation is playing a key role in advancing space cybersecurity through innovative prototypes that can quickly detect and mitigate cyber threats.

enQase

enQase

enQase offers security beyond PQC; the only comprehensive, scalable solution that utilizes enhanced quantum technologies to protect data against current and future quantum threats.