Hacker Passes Through FBI Cyber Security With Just One Call

It doesn’t matter how technically secure your data is if it’s protected by gullible humans.

The departments of Justice and Homeland Security are investigating a Justice hack allegedly made possible by the enemy of secure logins—IT support.

Many federal agencies, including Justice, recently switched on two-factor authentication intended to stop hackers from busting into government databases with merely a password. But that second factor for identification isn’t that safe, when it only takes a call to the help desk for a second form of authorization, say security experts.

Now, a hacktivist, who wishes to remain nameless, claims that technique is exactly what he used to break into a computer containing contact information on some 9,000 DHS personnel and 20,000 FBI employees.

The hacker already had a password for a Justice employee’s email account, according to Motherboard, which first reported the breach Feb. 7. From the account, he attempted to log into a restricted department website. When he couldn’t enter, he dialed the relevant help desk.

“So I called up, told them I was new and I didn’t understand how to get past [the portal],” the hacker told Motherboard. “They asked if I had a token code, I said no, they said that’s fine—just use our one.”

A former FBI official said there are existing policies that prohibit Justice IT support personnel from supplying a token without further verifying the individual requesting access is who he or she claims to be.
The individual typically must either visit a facility—in person—that can identity-proof the employee, or he must prove his identity over the phone by providing knowledge only he would know.

“I’m not sure it was in the protocol for the help desk to provide the token for access without significant further authentication,” Leo Taddeo, former FBI special agent in charge of the special operations and cyber division, told Nextgov. ”Probably, if you trace it back, it is a failure to follow proper protocol. It’s probably someone just wanted to be helpful.”
Technology and policy safeguards fail when confronted by human nature, he said.

“The weakest point is the user,” said Taddeo, now chief security officer for cyber firm Cryptzone. “It’s the human being, no matter what we design, no matter how much we emphasize the technological solutions—if we have users and especially help desks and system administrators that circumvent technology controls by just giving away information.”

Recently, Justice officials declined to comment on IT support procedures for users locked out of department accounts. But they acknowledged a probe into a breach is underway.

“The department is looking into the unauthorized access of a system operated by one of its components containing employee contact information,” Justice spokesman Peter Carr said in an emailed statement. “There is no indication at this time that there is any breach of sensitive personally identifiable information.”

He added that the department will continue “to deploy protection and defensive measures to safeguard information.”

DHS spokesman S.Y. Lee said Homeland Security takes such allegations very seriously. “We are looking into the reports of purported disclosure of DHS employee contact information,” he said, adding, “however, there is no indication at this time that there is any breach of sensitive or personally identifiable information.”

After revelations Office of Personnel Management hackers stole a gigantic number of national security employee records, the White House in June 2015 ordered all agencies to accelerate the activation of two-factor authentication.

As of last October, more than 80 percent of civilian employees government-wide needed a password plus a smartcard, digital token or other secondary ID format to enter agency systems.

The Obama administration’s budget proposal for 2017, released Tuesday, requests $26 million from Congress for the “Justice Security Operations Center; for the Identity, Credentialing, and Access Management program; to enhance information security and continuous monitoring; and for a stronger insider threat program.”

Whoever is behind the leak of FBI and DHS contacts tweeted links to the data accompanied by Pro-Palestine messages, using the handle @DotGovs.

The stash included DHS employee names, official titles, departments, phone and fax numbers, state and country address information, and official DHS.gov email address, according to Reuters and researchers at the SITE Intelligence Group.

‘This Is a Continuing Threat’

During a call with reporters about the budget, White House cyber czar Michael Daniel said, “With the breach today at DOJ” what that “shows is that this is a continuing threat of varying degrees. We’re still sort of understanding better exactly what happened there.”

The dump of Rolodex information does not seem to come close to the severity of the OPM data theft. “It doesn’t sound like he got into a sensitive database,” Taddeo said. “It sounds like he got into an address book that would accompany an email account.”

Similar recent social engineering hacks reportedly deceived Verizon and Amazon customer support representatives.

Last fall, a member of the hacktivist group “Crackas with Attitude” impersonated a Verizon technician over the phone to gain data necessary for accessing CIA Chief John Brennan’s AOL account. The hacker provided a real Verizon worker a fake employee code and then asked for the details about Brennan.

Software developer Eric Springer last month wrote on Medium about an ID thief who, he said, supplied an Amazon customer service rep an incorrect mailing address found online at whois.com, to similar effect.

“Wow. Just wow. The attacker gave Amazon my fake details from a who-is query, and got my real address and phone number in exchange. Now they had enough to bounce around a few services, even convincing my bank to issue them a new copy of my credit card,” Springer wrote.

DefenseOne: http://bit.ly/2413L9t

« We Need Social Media With A Heart
Cybersecurity Is A Great Career Choice »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

UZCERT

UZCERT

UZCERT is the national Computer Emergency Response Team for Uzbekistan.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

Bio-Morphis

Bio-Morphis

Bio-Morphis Reflex solution is a paradigm shift in the approach to information systems security.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Wavenet

Wavenet

Wavenet has grown from simple beginnings to become one of the UK’s market leaders in unified communications, business telephony, and Cyber Security solutions.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.