Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Anonymous responds to FBI claims of victory with record leaks

Steve Ragan | Aug. 27, 2013
Anonymous leaks thousands of records days after FBI claims it dismantled the hacktivist group.

Still, the fact that the Federal Grill's website was selected to host the documents wasn't an accident. There was lulz, or amusement, to be gained by hosting the stolen data on server with that specific domain name.

"...where better to grill the fedz than at the federal grill (sic)," commented one Anonymous Twitter account, OpLastResort, when asked about the choice to use a compromised domain to host the documents.

While lulzy, Coleman said, hosting the data on a compromised domain also makes the point that there are "many places [Anonymous] can enter and take a seat at the counter, if need be."

When it comes to the files, the source of the records appears to be the FBIs Regional Forensics Computer Laboratory (RFCL). One document contains a list of first and last names, email addresses, location (state), InfraGard status, Operating system type, browser type, and IP address. The document appears to be a registration list taken from a website's database for a law enforcement webinar. A majority of those listed are active law enforcement.

Moreover, there's a sorted list of 19,329 law enforcement email addresses. This list spans several states and agencies, and many of the email addresses are formatted with the person's name, but others use what seems to be a badge number. An extracted SQL file, taken from the RFCL database, contains additional addresses. After that, a list of names, agency assignment, and cell phone numbers (claimed to be BlackBerry), were also published.

In addition to personal and sensitive information, Anonymous also published a copy of a field guide on forensics, focused on live capture (Live Capture Field Guide: What every law enforcement officer must know), and a computer system seizure worksheet.

Outside of law enforcement, the leaked data also included what was claimed to be the full details of every single employee at Federal Reserve Bank of America.

The file, a spreadsheet titled SWAG, contains email addresses, phone numbers, and full names for Federal Reserve employees, as well as other information such as employment assignments. In a statement the Fed said that the leaked data was likely stolen during a breach earlier this year, details of which were made public in February.

Before the Fed issued a statement noting that the data wasn't from a recent breach, others who viewed the leaked law enforcement information questioned its age, speculating that it was taken some time ago and only recently released.

Even if the data is old, it was still compromised. The lesson for business leaders and administrators is clear, it is entirely possible for an organization to be breached and not know about it until long after the fact, if at all.


Previous Page  1  2  3  Next Page 

Sign up for Computerworld eNewsletters.