Hackers posing as law enforcement officers are tricking major tech companies into sharing people's private data, according to a group of hackers known as doxers. These individuals use spoofed email addresses and fake documents to make it appear as though they are authorized to obtain sensitive information from tech companies.
In one notable case, a hacker sent an email to Charter Communications claiming to be Officer Jason Corse of the Jacksonville Sheriff’s Office, requesting personal data for a victim who was allegedly involved in online activities. The company responded promptly with the requested information within 20 minutes.
The hackers claim that they have successfully extracted similar information from virtually every major US tech company, including Apple and Amazon, as well as smaller platforms like video-sharing site Rumble. They also reportedly shared information about how to craft these requests, which can bypass traditional verification processes.
The problem lies in the fact that there are over 18,000 individual law enforcement agencies in the US, each with its own email naming conventions and domain registrations. This creates a loophole that hackers like Exempt, who claims to be a Gen Z male located in Europe, can exploit.
To trick companies into handing over information, the hackers use two main tactics: (1) using authentic law enforcement email accounts that have been compromised through social engineering or hacking, or (2) creating convincing fake domains that closely mimic legitimate police departments. They also craft highly convincing fake official documents to support their requests.
While some tech companies are taking steps to improve their security, such as using secure online portals like Kodex, hackers continue to find ways to circumvent these measures.
As one former FBI agent noted, "Public/private-sector coordination is an incredibly complex and nuanced space that could very well be the difference between a kid being found in a trunk, or not." However, many of these requests are still responded to quickly, often within minutes, without proper verification.
In one notable case, a hacker sent an email to Charter Communications claiming to be Officer Jason Corse of the Jacksonville Sheriff’s Office, requesting personal data for a victim who was allegedly involved in online activities. The company responded promptly with the requested information within 20 minutes.
The hackers claim that they have successfully extracted similar information from virtually every major US tech company, including Apple and Amazon, as well as smaller platforms like video-sharing site Rumble. They also reportedly shared information about how to craft these requests, which can bypass traditional verification processes.
The problem lies in the fact that there are over 18,000 individual law enforcement agencies in the US, each with its own email naming conventions and domain registrations. This creates a loophole that hackers like Exempt, who claims to be a Gen Z male located in Europe, can exploit.
To trick companies into handing over information, the hackers use two main tactics: (1) using authentic law enforcement email accounts that have been compromised through social engineering or hacking, or (2) creating convincing fake domains that closely mimic legitimate police departments. They also craft highly convincing fake official documents to support their requests.
While some tech companies are taking steps to improve their security, such as using secure online portals like Kodex, hackers continue to find ways to circumvent these measures.
As one former FBI agent noted, "Public/private-sector coordination is an incredibly complex and nuanced space that could very well be the difference between a kid being found in a trunk, or not." However, many of these requests are still responded to quickly, often within minutes, without proper verification.