www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7663
Public Scan
URL:
https://www.darkreading.com/attacks-breaches/stolen-data-on-80k-members-of-fbi-run-infragard-reportedly-for-sale-on-dark-web...
Submission: On December 16 via manual from US — Scanned from DE
Submission: On December 16 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 5-10 - Learn More * Black Hat Asia - May 9-12 - Learn More Webinars * Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense Jan 11, 2023 * Zero Trust Security 101: What You Need to Know Before Getting Started Jan 12, 2023 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft Partner Perspectives: Zscaler Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 5-10 - Learn More * Black Hat Asia - May 9-12 - Learn More Webinars * Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense Jan 11, 2023 * Zero Trust Security 101: What You Need to Know Before Getting Started Jan 12, 2023 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft Partner Perspectives: Zscaler The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 5-10 - Learn More * Black Hat Asia - May 9-12 - Learn More Webinars * Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense Jan 11, 2023 * Zero Trust Security 101: What You Need to Know Before Getting Started Jan 12, 2023 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft Partner Perspectives: Zscaler -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. Event Cybersecurity Outlook 2023 - A Dark Reading, Black Hat, Omdia December 13 Virtual Event | <GET YOUR PASS> Report Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW> PreviousNext Attacks/Breaches 3 MIN READ News STOLEN DATA ON 80K+ MEMBERS OF FBI-RUN INFRAGARD REPORTEDLY FOR SALE ON DARK WEB FORUM InfraGard's members include key security decision-makers and stakeholders from all 16 US civilian critical-infrastructure sectors. Jai Vijayan Contributing Writer, Dark Reading December 15, 2022 Source: danielo via Shutterstock PDF A hacker using the handle "USDoD" has reportedly stolen contact information on more than 80,000 members of an FBI-run program called InfraGard and put the information up for sale on an English-speaking Dark Web forum. The information the hacker accessed from InfraGard's database appears to be fairly basic and in some cases does not even include an email address, according to KrebsOnSecurity, which first reported on the incident this week. But the information belongs to CISOs, security directors, IT and C-suite executives, healthcare professionals, emergency managers, and law enforcement and military personnel directly responsible for protecting US critical infrastructure. A POTENTIALLY VALUABLE ASSET As such, the stolen data represents a valuable asset for adversaries, says former InfraGard member Chris Pierson, currently CEO of BlackCloak, an online privacy-protection service for top executives and corporate leaders. "The InfraGard database of contacts is a big win for any intelligence agency or nation-state to possess," Pierson says. The compromised data is nowhere close in sensitivity compared to major breaches such as the one that the US Office of Personnel Management (OPM) disclosed in 2015. Still, it is very practical and easy to use from an attacker's perspective, he says. "While much of the information may be public or publicly available, the condensing of this information into the key people who run our nation's critical infrastructure is immensely valuable," Pierson notes. Personal addresses, personal cell phones, and easy access to which members possess a security clearance are all key pieces of data for an adversary to have, he says. The FBI describes InfraGard as an initiative to bolster the nation's collective ability to defend against physical and cyber threats to critical infrastructure targets. It basically connects the FBI directly with critical infrastructure owners, operators, and security stakeholders. Its members include key security personnel and decision-makers from all 16 US civilian critical infrastructure sectors. According to KrebsOnSecurity, the hacker "USDoD" gained access to the InfraGard database by first applying for a new account using the name, date of birth, and Social Security number of a chief executive officer at a large financial services company. The hacker apparently applied for InfraGard membership in November and provided an attacker-controlled email address and the actual phone number of the CEO, as contact information. AN OPSEC LAPSE? Though InfraGard was supposed to have vetted that information, they never did and instead approved the application based on the information that the hacker had provided, KrebsOnSecurity reported. Similarly, though accessing InfraGard's portal requires two-factor authentication, the hacker found he could use the email address as a second factor instead — thereby obviating the need for access to the real CEO's phone. Once on the portal, the attacker discovered that InfraGard user information could be relatively easily accessed via an API built into several components on the website, KrebsOnSecurity said, citing a direct conversation with the attacker. The hacker then apparently got a friend to code a Python query for retrieving all available InfaGard member information via the API. KrebsOnSecurity quoted the attacker as setting an asking price of $50,000 for the stolen dataset, but not really expecting any buyers at that price because of the basic nature of the information. InfraGard member Will Carson, director of IT and cybersecurity at Cybrary, expressed frustration over the incident. “As an InfraGard member, it certainly isn't great to hear your information may have been disclosed from a news outlet before you hear from the impacted organization," he said in a statement responding to the news. He expressed disappointment over being unable to log into his InfraGard account after the apparent breach. "Although I have full faith InfraGard leadership has a stronger grasp of the facts than I do from the outside, the radio silence to date makes me uneasy as a potentially impacted professional," he says. The FBI did not immediately respond to a Dark Reading request for comment submitted via email to its press office. Threat Intelligence Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe More Insights White Papers * State of Email Security * Ransomware Resilience and Response: The Next-Generation More White Papers Webinars * Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense * Zero Trust Security 101: What You Need to Know Before Getting Started More Webinars Reports * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Implementing Zero Trust In Your Enterprise: How to Get Started More Reports Editors' Choice The Cybersecurity Industry Doesn't Have a Stress Problem — It Has a Leadership Problem Tyler Farrar, CISO, Exabeam Microsoft Squashes Zero-Day, Actively Exploited Bugs in Dec. Update Jai Vijayan, Contributing Writer, Dark Reading Uber Breached, Again, After Attackers Compromise Third-Party Cloud Elizabeth Montalbano, Contributor, Dark Reading For Cyberattackers, Popular EDR Tools Can Turn into Destructive Data Wipers Jai Vijayan, Contributing Writer, Dark Reading Webinars * Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense * Zero Trust Security 101: What You Need to Know Before Getting Started * A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype More Webinars Reports * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Implementing Zero Trust In Your Enterprise: How to Get Started * 2021 Digital Transformation Report * Enterprise Cybersecurity Plans in a Post-Pandemic World * Proven Success Factors for Endpoint Security More Reports White Papers * State of Email Security * Ransomware Resilience and Response: The Next-Generation * Ransomware Is On The Rise * State of Ransomware Readiness: Facing the Reality Gap * Implementing Zero Trust In Your Enterprise: How to Get Started More White Papers Events * Black Hat USA - August 5-10 - Learn More * Black Hat Asia - May 9-12 - Learn More * [FREE Virtual Event] The Identity Crisis More Events More Insights White Papers * State of Email Security * Ransomware Resilience and Response: The Next-Generation More White Papers Webinars * Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense * Zero Trust Security 101: What You Need to Know Before Getting Started More Webinars Reports * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Implementing Zero Trust In Your Enterprise: How to Get Started More Reports DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept