[TheRecord] Official FBI email server hacked, used to send fake threat

A group of unidentified hackers have compromised one of the FBI’s email servers and have sent out a massive wave of spam emails containing a warning about a (fake) cyberattack that was allegedly taking place.

The attack, which took place in the early hours of the US East Coast morning, impacted an email server that the FBI was using for some sort of public ticketing and alerting system, Carel Bitter, Chief Data Officer at Spamhaus, told The Record in an interview today.

Bitter, who was the first to spot the attacks, said he notified the FBI as soon as his organization detected the attack, but, by that point, FBI employees were also aware of the incident.

The Spamhaus exec said FBI offices had been swamped with phone calls and emails from worried organizations that were seeking additional information about the supposed attack.

While the emails were obviously warning about a fake threat, they caused panic among some recipients because the messages passed SPF and DKIM security checks, meaning they were sent from the actual FBI servers and passed everyone’s spam filters.

The Vinny Troia saga

However, while the emails passed cryptographic checks, the message they carried was obvious non-sense.

On top of numerous spelling mistakes that an organization like the FBI would never make in the text of a security alert, the messages were pretty blatantly trying to frame Vinny Troia, the founder of NightLion Security, as the perpetrator of a “sophisticated chain attack.”

In a copy of the email embedded below, the hackers tried to trick organizations into believing that the FBI had detected Troia trying to steal data from their networks.

Image: Spamhaus

Urgent: Threat actor in systems

Our intelligence monitoring indicates exfiltration of several of your virtualized clusters in a sophisticated chain attack. We tried to blackhole the transit nodes used by this advanced persistent threat actor, however there is a huge chance he will modify his attack with fastflux technologies, which he proxies trough multiple global accelerators. We identified the threat actor to be [REDACTED], whom is believed to be affiliated with the extortion gang TheDarkOverlord, We highly recommend you to check your systems and IDS monitoring. Beware this threat actor is currently working under inspection of the NCCIC, as we are dependent on some of his intelligence research we can not interfere physically within 4 hours, which could be enough time to cause severe damage to your infrastructure.

But all of this was a ruse, as Marcus Hutchins, a malware analyst from Kryptos Logic, pointed out on Twitter today.

“Vinny Troia wrote a book revealing information about hacking group TheDarkOverlord,” Hutchins said.

“Shortly after, someone began erasing ElasticSearch clusters leaving behind his name. Later his Twitter was hacked, then his website,” he added.

“Now a hacked FBI email server is sending this.”

FBI confirms hack; takes down server

An FBI spokesperson confirmed the hack earlier today.

The agency said it was aware of the incident and investigating and that it had taken down the compromised server in the meantime to stop the spam.

Because the email server appears to have been used for some sort of automated emailing system, Bitter told The Record that he believed the hackers exploited some sort of vulnerability in software running on the server to send these messages; however, this was just a theory based on the currently available information.

As for the size of the attack, Bitter said the attackers appear to have used databases of public email addresses to send out the spam emails.

Possible sources appear to the American Registry for Internet Numbers (ARIN) database, which holds emails that were used to register web domains across North America, which can be easily scraped and compiled by any threat actor, although there are signs that other sources were also used.

From what other people are reporting, this was not limited to the ARIN database. Other, non-ARIN related harvested emails were included in the spam run.

— Spamhaus (@spamhaus) November 13, 2021

The post Official FBI email server hacked, used to send fake threat appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

[SecurityWeek] Wray: FBI Frowns on Ransomware Payments Despite Recent Trend

All posts, Security Week

The FBI’s director told lawmakers Thursday that the bureau discourages ransomware payments to hacking groups even as major companies in the past month have participated in multimillion-dollar transactions aimed at getting their systems back online. read more Source: Read More (SecurityWeek RSS Feed)

Read More

Daily NCSC-FI news followup 2019-11-30

How is NordVPN unblocking Disney+? It might be through YOUR own computer. Even if youve never used Disney+ or NordVPN. medium.com/@derek./how-is-nordvpn-unblocking-disney-6c51045dbc30 New Chrome Password Stealer Sends Stolen Data to a MongoDB Database www.bleepingcomputer.com/news/security/new-chrome-password-stealer-sends-stolen-data-to-a-mongodb-database/ A new trojan has been discovered that attempts to steal passwords stored in the Google Chrome browser. While this is nothing unique, […]

Read More

[TheRecord] Hackers steal $29 million from crypto-platform Cream Finance

Hackers are estimated to have stolen more than $29 million in cryptocurrency assets from Cream Finance, a decentralized finance (DeFi) platform that allows users to loan and speculate on cryptocurrency price variations. The company confirmed the hack earlier today, half an hour after blockchain security firm PeckShield noticed signs of an ongoing attack. C.R.E.A.M. v1 market on […]

Read More