- Sputnik International
World
Get the latest news from around the world, live coverage, off-beat stories, features and analysis.

Was the FBI Penetrated With a Simple Phone Call?

© Flickr / lavagirl66Old telephone
Old telephone - Sputnik International
Subscribe
A hacker who has managed to break into an FBI database and release thousands of US government employees' personal data could have penetrated the bureau's cyber-security measures with a simple phone call.

Last Monday, a self-styled hacktivist who calls himself "Penis" published the personal details of 20,000 FBI employees and 9,000 DHS personnel. "Penis" claimed that — after getting hold of a Department of Justice email account — all he had to do to snatch the data was call the Justice help desk and ask for the password.

"I called up, told them I was new and I didn't understand how to get [into the online database where the details were stored]," the hacker told Vice.

"They asked if I had a token code, I said no, they said that's fine-just use our one."

The incident lays bare the shortcomings of the two-factor authentication system recently adopted by many American federal agencies. 

The procedure requires that an individual use two distinct passwords in order to access government information — a sound policy, except that it looks like it can be easily bypassed by just ringing the IT guys.

Theoretically, federal agency personnel are forbidden from revealing a password to somebody without prior identity verification. That could be done by asking the individual who requested the password to come to the facility in person, or to provide specific details that can unequivocally prove their identity over the phone.

Still, as usual, procedures can be overridden with so-called "social engineering"- that is, chatting people into doing something they should not.

"I'm not sure it was in the protocol for the help desk to provide the token for access without significant further authentication," Leo Taddeo, an ex-FBI operative expert in cybersecurity told Nextgov.

"If you trace it back, it is a failure to follow proper protocol. It's probably someone just wanted to be helpful."

"It's the human being, no matter what we design, no matter how much we emphasize the technological solutions," he added.

"If we have users and especially help desks and system administrators that circumvent technology controls by just giving away information."

The US Justice department and Homeland Security have launched an investigation into the breach, although they have denied that the leaked information was "sensitive."

The hacker, whose identity is still unknown, tweeted links to the data — which includes names, phone numbers and email addresses — together with pro-Palestinian messages from the account @DotGovs.

What is clear so far is that US federal agencies' cybersecurity is in sore need of improvement.

Perhaps not casually, a 2017 budget proposal released on Tuesday by the White House suggests allocating US$26 million for "the Justice Security Operations Center; for the Identity, Credentialing, and Access Management program; to enhance information security and continuous monitoring; and for a stronger insider threat program."

Newsfeed
0
To participate in the discussion
log in or register
loader
Chats
Заголовок открываемого материала