Hacker breaches Federal Bureau of Investigation website

Hacker breaches Federal Bureau of Investigation website

The FBI hack saga continues, this time with statements released by CyberZeist, the one behind the breach who claims to have accessed FBI's content management system to steal some logins.

Plone security's team explained through Nathan Van Gheem that hacks like these aren't hard to fake because one only needs very basic skills with a graphics program like Photoshop or to be able to use the Chrome JavaScript developer console. The FBI was running FreeBSD version 6.2_RELEASE launched in 2007 with custom configurations, he explained.

After his most recent hack, CyberZeist asked his Twitter followers who would they most like to be his next hacking target, with 37.3% of respondents opting for banking corporations.

"While exploiting FBI.GOV, it was clearly evident that their webmaster had a very lazy attitude as he/she had kept the backup files (.bck extension) on that same folder where the site root was placed (Thank you Webmaster!), but still I didn't leak out the whole contents of the backup files, instead I tweeted out my findings and thought to wait for FBI's response", CyberZeist said. "The zero-day flaw was allegedly available for sale on an unnamed dark web site, sold by a hacker that goes by the moniker 'lo4fer". Causing source code to be leaked to the end user is a common form of attack against PHP applications, but as Python applications don't use the cgi-bin model of execution it has never been a marker of an attack against a Python site.

Another screen shot posted by the hacker shows information from an email that was supposedly extracted from the Federal Bureau of Investigation server's mail logs.

On top of all that, CyberZeist has been suspected of faking hacks and data leaks before. It's likely he's more interested in selling this fake exploit and is using the FBI's site as a means of advertising, even if it is false advertising. According to Wilkes the so-called Plone zero-day exploit is up for sale on the Tor network for 8 bitcoins - around $9,000.

Before rumors of this vulnerability appeared, Plone had already announced an upcoming security patch scheduled to be released on January 17. The intrusion reportedly occurred on December 22, 2016 and was made possible by a zero-day vulnerability in the Plone Content Management System.

"There is no evidence that there was a targeted attack or compromise against FBI.gov", an FBI spokesperson told SC Media.

Related:

Comments

Latest news

Shopify Inc. (SHOP) Surged On Report Of Potential Amazon Deal
The company reported ($0.02) earnings per share for the quarter, beating the consensus estimate of ($0.03) by $0.01. The firm owned 954,041 shares of the company's stock after buying an additional 492,619 shares during the period.

Savyon Zabar's death in Upper West Side apartment ruled homicide, police say
The building's super told PIX11 in April that Zabary is known to have young men in and out of his apartment doing drugs with him. The NYPD said Friday that a man was found dead in an Upper West Side apartment, and his death is believed to be a homicide.

Decision on Jio's free internet service soon
However, there is a bit of concern here as well: Most of the customers (67%) will use Jio as the secondary operator. The survey found that Airtel has the most satisfied customers, as 97.7% are fully satisfied with their services.

EverQuest Spinoff Landmark's Servers are Shutting Down
Meanwhile, the potential for the game to endure in someone else's hands - a fan's, for example - appears to have been ruled out. Those who have purchased Daybreak Cash for the game needn't worry, as it will still be available in their general wallet.

Other news