A group of hackers, known as "doxing-as-a-service" providers, have been tricking major tech companies into sharing private data by impersonating law enforcement officers. These hackers, who call themselves "Exempt," use spoofed email addresses and fake documents to convince companies that the requests are coming from a legitimate source. They claim that they have successfully extracted sensitive information from virtually every major US tech company, including Apple and Amazon.
The hackers' method involves using authentic or convincing fake law enforcement email accounts, as well as creating fake domains that mimic legitimate police departments. They also craft highly convincing fake official documents to back up their requests. Exempt claims that he has made up to 500 successful requests in recent years, with the highest-paying request being $1,200 for a single dox of someone who was allegedly "grooming minors on an online gaming platform."
The hackers exploit loopholes in the system by using emergency data requests (EDRs) that bypass additional verification steps. These EDRs are typically used in cases involving threats of imminent harm or death, and companies under pressure to fulfill the request quickly often comply without verifying the authenticity of the request.
Tech companies have laid out step-by-step guides on how to craft these requests, but even with these guidelines, hackers can still find ways to exploit the system. Apple, for example, provides a form that allows government or law enforcement agents to request information from the company, but Exempt claims that he was able to make requests through this form using compromised law enforcement email accounts.
The problem is partly due to the fact that there are over 18,000 individual law enforcement agencies in the US, all of which use their own email naming conventions and domain registrations. This creates a complex landscape for companies to navigate when it comes to verifying the authenticity of requests.
To address this issue, some companies like Kodex have developed secure online portals that law enforcement can use to make data requests. However, even with these systems in place, hackers can still find ways to exploit weaknesses.
The FBI's former agent turned security expert, Matt Donahue, notes that traditional communication channels like email are not designed for the level of identity verification and real-time decision-making required in modern investigations. He argues that public/private-sector coordination is crucial in preventing such exploits, but says that anyone suggesting these requests are carelessly responded to has little understanding of the subject matter.
The incident highlights the need for greater security measures and better communication channels between law enforcement agencies and tech companies to prevent such exploits. It also underscores the importance of awareness about the risks of doxing and the importance of protecting sensitive information.
The hackers' method involves using authentic or convincing fake law enforcement email accounts, as well as creating fake domains that mimic legitimate police departments. They also craft highly convincing fake official documents to back up their requests. Exempt claims that he has made up to 500 successful requests in recent years, with the highest-paying request being $1,200 for a single dox of someone who was allegedly "grooming minors on an online gaming platform."
The hackers exploit loopholes in the system by using emergency data requests (EDRs) that bypass additional verification steps. These EDRs are typically used in cases involving threats of imminent harm or death, and companies under pressure to fulfill the request quickly often comply without verifying the authenticity of the request.
Tech companies have laid out step-by-step guides on how to craft these requests, but even with these guidelines, hackers can still find ways to exploit the system. Apple, for example, provides a form that allows government or law enforcement agents to request information from the company, but Exempt claims that he was able to make requests through this form using compromised law enforcement email accounts.
The problem is partly due to the fact that there are over 18,000 individual law enforcement agencies in the US, all of which use their own email naming conventions and domain registrations. This creates a complex landscape for companies to navigate when it comes to verifying the authenticity of requests.
To address this issue, some companies like Kodex have developed secure online portals that law enforcement can use to make data requests. However, even with these systems in place, hackers can still find ways to exploit weaknesses.
The FBI's former agent turned security expert, Matt Donahue, notes that traditional communication channels like email are not designed for the level of identity verification and real-time decision-making required in modern investigations. He argues that public/private-sector coordination is crucial in preventing such exploits, but says that anyone suggesting these requests are carelessly responded to has little understanding of the subject matter.
The incident highlights the need for greater security measures and better communication channels between law enforcement agencies and tech companies to prevent such exploits. It also underscores the importance of awareness about the risks of doxing and the importance of protecting sensitive information.