therecord.media Open in urlscan Pro
2606:4700::6812:1c78  Public Scan

URL: https://therecord.media/virustotal-user-email-addresses-leaked-google-military-intelligence
Submission: On July 19 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept

 * Leadership
 * Cybercrime
 * Nation-state
 * People
 * Technology

 * Mobile App
 * About
 * Podcast
 * Contact

Go


SUBSCRIBE TO THE RECORD

Subscribe
Alexander MartinJuly 18th, 2023
 * News
 * Technology
 * Industry
 * Government

 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


GOOGLE EXPOSES INTELLIGENCE AND DEFENSE EMPLOYEE NAMES IN VIRUSTOTAL LEAK

Hundreds of individuals working for defense and intelligence agencies globally
have had their names and email addresses accidentally exposed by an employee at
Google’s malware scanning platform VirusTotal.

The online service lets organizations upload suspected malware to be checked
against a range of anti-virus tools. VirusTotal then shares these files with the
security community, creating a library of malware signatures to help
cybersecurity professionals detect attempted attacks and develop threat
intelligence.

But a list of 5,600 of the repository’s customers also was uploaded,
accidentally, to the platform itself, as first reported on Monday by Der
Spiegel. The list, which has been seen by Recorded Future News, identifies
individuals affiliated with U.S. Cyber Command and the National Security Agency,
as well as with the Pentagon, the FBI, and a number of U.S. military service
branches.

From the United Kingdom, it contains the names of a dozen Ministry of Defence
personnel as well as emails belonging to staff at the CERT-UK function of the
National Cyber Security Centre, a part of GCHQ. Keeping with GCHQ’s email
format, the NCSC emails include only an initial for each users’ surname.

Full names are recognisable in the email addresses belonging to specialists
working at the MoD, as well as at the Cabinet Office, the Nuclear
Decommissioning Authority, and the Pensions Regulator.

The primary concern among the affected organizations, which also include
numerous private sector users of the Virus Total platform, is the potential for
the leaked emails to be targeted in phishing attempts.

The leak includes emails for ministries in Germany, Japan, the United Arab
Emirates, Qatar, Lithuania, Israel, Turkey, France, Estonia, Poland, Saudi
Arabia, Colombia, the Czech Republic, Egypt, Slovakia and Ukraine.

A spokesperson for Google told Recorded Future News: “We are aware of the
unintentional distribution of a small segment of customer group administrator
emails and organization names by one of our employees on the VirusTotal
platform.

“We removed the list from the platform within an hour of its posting and are
looking at our internal processes and technical controls to improve our
operations in the future,” they added.

The list groups emails by the enterprise customer accounts they are connected
to. It reveals some military personnel are using email providers other than
those connected to official domains as part of their threat intelligence work,
with personal accounts registered to Gmail, Hotmail, and Yahoo.

Spokespeople for organizations impacted by the leak told Recorded Future News
they considered it a low-risk incident.

The Ministry of Defence, which accounts for almost half of the emails associated
with the gov.uk domain, said: “We are aware of a data breach from a third party
involving the details of MoD employees. None of the data was sensitive and all
details have now been removed.”

The National Cyber Security Centre is understood to be aware of the leak and
unconcerned about its potential impact.

A spokesperson for the Nuclear Decommissioning Authority (NDA) said: “Employee
email addresses may be available in the public domain for a variety of reasons,
which is why we provide ongoing training and awareness for staff of the risks
associated with phishing emails.”

The Pensions Regulator told Recorded Future News: “We take cyber security
extremely seriously and have controls in place to prevent malicious emails from
infiltrating our systems.”

 * 
 * 
 * 
 * 
 * 

Tags
 * VirusTotal
 * Google
 * data leak
 * military
 * Law enforcement
 * intelligence agency


ALEXANDER MARTIN



Alexander Martin is the UK Editor for Recorded Future News. He was previously a
technology reporter for Sky News and is also a fellow at the European Cyber
Conflict Research Initiative.

Previous articleNext article
Cybersecurity labeling program for internet-connected devices to be launched
next year, White House says
Germany’s new cyber chief to ‘intensify and focus’ work shaping European rules


BRIEFS

 * Russian medical lab suspends some services after ransomware attackJuly 18th,
   2023
 * Legislators: HHS is failing to adequately protect health records from law
   enforcementJuly 18th, 2023
 * Ukraine police bust another bot farm accused of pro-Russia propaganda,
   internet fraudJuly 18th, 2023
 * Google fixes ‘Bad.Build’ vulnerability affecting Cloud Build serviceJuly
   18th, 2023
 * Alleged Ukrainian scareware developer arrested after a decade on the runJuly
   17th, 2023
 * By criminals, for criminals: AI tool easily generates ‘remarkably persuasive’
   fraud emails July 17th, 2023
 * Honeywell, CISA warn of ‘Crit.IX’ vulnerabilities affecting manufacturing
   toolsJuly 14th, 2023
 * Hackers target Pakistani government, bank and telecom provider with
   China-made malwareJuly 14th, 2023
 * Belarus-linked hacks on Ukraine, Poland began at least a year ago, report
   saysJuly 13th, 2023


PUTIN’S POTENTIAL SUCCESSORS PART 2: ALEKSEY DYUMIN


Putin’s Potential Successors Part 2: Aleksey Dyumin


CHINA'S TARGETING OF INTERNATIONAL COMPANIES IN GEOPOLITICAL COMPETITION


China's Targeting of International Companies in Geopolitical Competition


THE ESCALATING GLOBAL RISK ENVIRONMENT FOR SUBMARINE CABLES


The Escalating Global Risk Environment for Submarine Cables


NORTH KOREA’S CYBER STRATEGY


North Korea’s Cyber Strategy


BLUEDELTA EXPLOITS UKRAINIAN GOVERNMENT ROUNDCUBE MAIL SERVERS TO SUPPORT
ESPIONAGE ACTIVITIES


BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support
Espionage Activities
 * 
 * 
 * 
 * 

 * Privacy Policy

© Copyright 2023 | The Record from Recorded Future News