Hacker Publishes Personal Details Of 20,000 FBI And 9000 DHS Staff

Hacker Publishes Personal Details Of 20,000 FBI And 9000 DHS Staff

A hacker has published the personal details of 20,000 Federal Bureau of Investigation agents and 9000 Department of Homeland Security officers online. The first wave of Department of Homeland Security data was published on Sunday, while the the FBI data appeared online just last night. In both cases the data is published to Cryptobin with the password “lol”. The files include names, job titles, phone numbers, state locations and email addresses for the US government employees.

Many of the email addresses are not public, according to Motherboard, while job titles include “task force deputy director” and “special agent”. Meanwhile, the Guardian claims that some of the records appear to be out of date.

The data dumps were announced on the Twitter account @DotGovs, accompanied by the hashtags #FreePalestine and #ProPalestine. The Twitter bio includes the line “Fuck your government.”

Speaking to Motherboard, a Department of Justice spokesperson explained that the organisation is:

…looking into the unauthorised access of a system operated by one of its components containing employee contact information… This unauthorised access is still under investigation; however, there is no indication at this time that there is any breach of sensitive personally identifiable information.

The hacker claims to have tricked an employee into providing a token that could be used to access a DOJ online portal, which in turn provided access to three computers and the staff databases.

Its unclear who was behind the hack. Last year a group going by the name of “Crackas With Attitude” (CWA) acquired the contents of CIA Director John Brennan’s personal emails then later acquired “34,000 lines of emails, names, position and phone numbers of gov associates, including military”.

The hacker behind the new dump claimed to Motherboard that he wasn’t associated with CWA and that the data was obtained from a different source.

[Cryptobin(1) and Cryptobin(2) via Motherboard]

Image by Oleksiy & Tetyana