冒充警察的黑客正在欺骗科技公司交出用户数据。
Doxers posing as cops are tricking big tech firms into sharing people's data

原始链接: https://www.wired.com/story/doxers-posing-as-cops-are-tricking-big-tech-firms-into-sharing-peoples-private-data/

一个黑客组织正在提供“人肉搜索即服务”,已成功从美国大型科技公司(如 Charter Communications、Apple 和 Amazon)获取个人数据。他们通过电子邮件冒充执法人员——通常在几分钟内——诱骗公司泄露敏感信息,如姓名、地址和电话号码。 WIRED 获得了该行动的详细信息,包括多达 500 次成功请求的证据,以及沟通记录显示一名现役执法人员可能参与其中。“Exempt”表示对被盗数据如何使用漠不关心,并引用了一起涉及纽约游戏玩家的案例。 利用虚假请求的策略早已为人所知,但公司仍然存在漏洞。杰克逊维尔警局确认知晓冒充问题,但他们和 Charter Communications 均拒绝进一步评论。这凸显了一个持续存在的安全缺陷,并引发了人们对个人被针对和骚扰的便利性的担忧。

## 黑客新闻摘要:通过社会工程学造成的数据泄露 最近一篇《连线》杂志的文章详细描述了“黑客寻踪者”如何通过冒充执法人员成功欺骗大型科技公司交出用户数据。他们利用验证流程中的漏洞,经常使用伪造的电话号码并令人信服地模仿官方请求。 几位评论者分享了个人经历,证明这些系统很容易被绕过。一位用户详细描述了仅仅通过反复拨打帮助台电话并利用公开信息(如LinkedIn个人资料)就成功重置了他们自己的帐户安全设置(双因素认证、IP限制),而*从未*被要求进行严格的验证。 讨论强调了系统性问题:依赖于容易获取的信息、不足的验证协议,以及公司快速满足执法请求(包括紧急数据请求)的压力。人们对这些请求缺乏司法监督以及潜在的滥用可能性的问题表示担忧。一些人提出了技术解决方案,例如更严格的域名注册规则(RFC 1480),作为潜在的缓解措施,但承认其固有局限性。最终,该讨论强调了安全系统的脆弱性和社会工程学策略的有效性。
相关文章

原文

When a privacy specialist at the legal response operations center of Charter Communications received an emergency data request via email on September 4 from Officer Jason Corse of the Jacksonville Sheriff’s Office, it took her just minutes to respond, with the name, home address, phone numbers, and email address of the “target.”

But the email had not in fact come from Corse or anyone else at the Jacksonville Sheriff’s Office. It was sent by a member of a hacking group that provides doxing-as-a-service to customers willing to pay for highly sensitive personal data held by tech companies in the United States.

“This took all of 20 minutes,” Exempt, a member of the group that carried out the ploy, told WIRED. He claims that his group has been successful in extracting similar information from virtually every major US tech company, including Apple and Amazon, as well as more fringe platforms like video-sharing site Rumble, which is popular with far-right influencers.

Exempt shared the information Charter Communications sent to the group with WIRED, and explained that the victim was a “gamer” from New York. When asked if he worried about how the information he obtained was used against the target, Exempt said: “I usually do not care.”

The victim did not respond to WIRED’s requests for comment.

“It is definitely concerning to hear criminals impersonating officers in such a manner, more so when they are claiming to be one of our employees,” says Christian Hancock, the media relations manager at the Jacksonville Sheriff’s Office. Officer Corse declined to comment.

Charter Communications declined to comment.

This method of tricking companies into handing over information that can be used to harass, threaten, and intimidate victims has been known about for years. But WIRED has gained unprecedented insight into how one of these doxing groups operates, and why, despite years of warnings, it is still happening so often.

The Charter Communications incident was one of up to 500 successful requests Exempt claims to have made in recent years. To back up his claims, the hacker shared multiple documents and recordings with WIRED, including what he claimed were screenshots of email requests, fake subpoenas, responses from tech companies, and even a video recording of a phone call with one company’s law enforcement response team, which was seeking to verify a request. Exempt also shared evidence suggesting that a current law enforcement officer (Exempt refused to provide the officer’s location or name) was in contact with the group about allegedly working with them to submit requests from his own account in return for a cut of the profits.

联系我们 contact @ memedata.com