banner



FBI website compromised to send out fake emails — this is bad

FBI website compromised to send out fake emails — this is bad

FBI seal on building
(Paradigm credit: Shutterstock)

This past weekend, someone managed to send thousands of fake emails from a real FBI mail server warning of a cyberattack — and they appear to have washed it without needing to hack annihilation.

Instead, the miscreant claimed in an chat with independent security researcher Brian Krebs, all it took was legitimately changing a couple of items in the source code of the web folio  where you could apply to sign up for the FBI'S Law Enforcement Enterprise Portal (LEEP) advisory service. The FBI is blaming this incident on a "software misconfiguration."

There's nothing you demand to do to avert this phony message, every bit the FBI has taken the LEEP sign-upward page offline while it fixes the problem. But the incident shows how a poorly set-upwardly website can allow anyone with a basic knowledge of web functions to create a convincing online scare.

The scary threat is coming from inside the server

"Our intelligence monitoring indicates exfiltration of several of your virtualized clusters in a sophisticated chain assail," read the phony warning sent from an FBI post server, which sounds scary but is really just a bunch of cybersecurity buzzwords strung together nonsensically.

"Nosotros tried to blackhole the transit nodes used by this advanced persistent threat thespian, nonetheless in that location is a huge chance he volition modify his attack with fastflux technologies, which he proxies trough [sic] multiple global accelerators."

The message, legitimately sent from the email address eims@ic.fbi.gov and begetting the subject line "Urgent: Threat actor in systems", went out in two waves in the evening of Nov. 12 and early morning of Nov. 13, the spam-tracking agency Spamhaus told Bleeping Figurer, adding that at to the lowest degree 100,000 mailboxes received the email.

"The FBI is aware of a software misconfiguration that temporarily immune an thespian to leverage the Law Enforcement Enterprise Portal (LEEP) to send false emails," the bureau posted Sun (Nov. xiv) on its regular website.

"While the illegitimate e-mail originated from an FBI operated server, that server was defended to pushing notifications for LEEP and was non function of the FBI'due south corporate email service. No actor was able to access or compromise any data or PII [personally identifiable information] on the FBI'south network."

The message also tried to defame well-known security researcher Vinny Troia, claiming that he was backside the phony attacks. Troia has gotten in online tussles with cybercriminals, who in turn claim that he'south no more ethical than they are. We don't know enough about the details to form an opinion nearly these accusations.

Equally the messages were being sent out, someone calling themselves "Pompompurin" contacted Krebs and claimed credit for the scary spam emails. They told Krebs it was all fabricated possible by an incredibly dumb registration process built into the LEEP sign-upward page.

"This is a horrible affair to be seeing on any website," Krebs quotes Pompompurin as telling him. "I've seen it a few times before, but never on a government website, let alone one managed by the FBI."

How the e-mail 'hack' seems to take worked

As many online services do during the signup procedure, LEEP sends a test email message to the e-mail accost you registered with, including a clandestine code.

That'due south to confirm that you really are signing up for the service and aren't just some naughty kid signing you upward for unwanted emails. The hush-hush code is something you lot give to the operator at an FBI telephone number you call to cease the signup process.

And then far, and so expert. Here's what seems to be the dumb part: Accoriding to Pompompurin, the LEEP signup page generates that confirmation email message and secret code ON YOUR MACHINE, using your browser.

Your browser and then uses the Post command to send the bulletin information, forth with all the personal details you've just filled in, dorsum to the FBI website. The web server passes along the details of the confirmation email bulletin to the FBI's post server, which in turn sends the message to your email address.

But, said Pompompurin, you tin can view the LEEP signup folio's source code (Command+U in Chrome), including the email bulletin your browser has generated and the Post commands your browser uses to send the bulletin to the FBI'due south server.

You lot can then use the browser's own tools (Command-Shift-I in Chrome) to change the contents of the electronic mail bulletin, or even modify who receives the message, before it's sent to the FBI'south mail server.

This is because when y'all're looking at a spider web page, y'all're not viewing a file on a furthermost server. Instead, you lot're looking at a file the far-off server sent to your machine, which put the file in your browser cache. The browser opens the file in the browser enshroud and presents its contents to you.

Because the file is already on your automobile, you tin alter the file and view the results of your changes in your browser. But the changes you make aren't usually supposed to be sent back to the furthermost server that sent you the original file in the offset identify. Unfortunately, the style the LEEP sign-up folio was structured allow you do exactly that.

"Basically, when you requested the confirmation code [it] was generated client-side, and so sent to y'all [your e-mail address] via a POST asking," Pompompurin told Krebs. "This Post request includes the parameters for the electronic mail subject and body content."

This sounds complicated, just it's not, and it'south not a hack. In that location was no countersign keen or software alteration involved. Pompompurin did exactly what the FBI's LEEP signup folio was plain designed to do.

It'southward just that whoever designed the system never stopped to think that someone might accept a look at the page's source lawmaking and employ built-in browser tools to edit the contents and recipients of the bulletin.

"Hackers didn'thack into the server — theytricked the server," wrote security good Rob Graham in a web log post about this incident November. 14. "They [i.eastward., Pompompurin] didn't intermission into the server. Any data on the server is still rubber. Hackers only caused account creation requests with customized data."

Pompompurin used a client-side script to automate sending emails to those thousands of recipients, although information technology'due south not clear whether they harvested the email addresses or somehow tapped into a database of anybody who had signed upwards for LEEP emails.

"I could've 1000% used this to send more than legit-looking emails, trick companies into handing over data etc.," Pompompurin told Krebs.

Now, when you lot click through on the LEEP website to apply for an account, you but go a alarm message that "there was a problem processing your request" and are given a telephone number to call.

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-booty driver, code monkey and video editor. He's been rooting effectually in the data-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom'southward Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown upward in random TV news spots and fifty-fifty moderated a panel discussion at the CEDIA home-engineering conference. You tin follow his rants on Twitter at @snd_wagenseil.

Source: https://www.tomsguide.com/news/fbi-email-hijack

Posted by: datessucculy.blogspot.com

0 Response to "FBI website compromised to send out fake emails — this is bad"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel