Skip to main content

Hacker compromises data of nearly 30,000 FBI and DHS employees with a simple phone call

hacker compromises data of nearly 30000 fbi and dhs employees with a simple phone call j edgar hoover building headquarters
The J. Edgar Hoover Building, home of the Federal Bureau of Investigation, in Washington, D.C.. Image used with permission by copyright holder
In most cases, hacking is a much more laborious task than the one-button system we all experienced in Watch Dogs two years ago, but that’s not the case for a real-life hacker who actually stole confidential information from the FBI and Department of Homeland Security.

The hacker, who in his conversation with Motherboard says he wishes to remain anonymous, began by acquiring credentials for a single Department of Justice email account. Logging in with the credentials actually failed to work, but the hacker was undeterred. He gave the department a phone call, swindling a support representative for the instructions he so desperately needed.

Recommended Videos

“I called up, told them I was new and I didn’t understand how to get past [the portal],” the hacker explains. “They asked if I had a token code. I said ‘No’, they said ‘That’s fine, just use our one’.”

Please enable Javascript to view this content

And, just like that, he was able to log in, access a DoJ virtual machine, enter the login credentials, and secure complete access over three department computers. Of these systems was one owned by the employee whose email account he had earlier hacked. All he had to do was click on it, and he would have complete, unadulterated access to the entire PC, along with all its file systems.

So he did what any malicious, power-hungry hacker would do — he accessed over 1TB of DoJ documents, sporting personal details of tens of thousands of employees, and of that terabyte, about 200GB was stolen.

Though the hacker notably mentioned the system included its fair share of military emails and credit card numbers, whether he actually seized any of that data is largely nebulous. Nonetheless, while those details weren’t given to Motherboard for verification, the aforementioned DoJ personal documents were.

Included in these documents were allegedly the phone numbers of the government employees at risk. By randomly selecting a handful of the numbers provided and calling them, Motherboard was able to confirm their veracity.

“We are looking into the reports of purported disclosure of DHS employee contact information,” Department of Home Security spokesperson S.Y. Lee responded to the initial report. “We take these reports very seriously, however, there is no indication at this time that there is any breach of sensitive information.”

In an update provided by Motherboard earlier today, it’s now evident that the personal accounts of 9,000 DHS employees have been leaked on Twitter, coupled with a “pro-Palestinian message.”

Gabe Carey
Former Digital Trends Contributor
A freelancer for Digital Trends, Gabe Carey has been covering the intersection of video games and technology since he was 16…
Turns out, it’s not that hard to do what OpenAI does for less
OpenAI's new typeface OpenAI Sans

Even as OpenAI continues clinging to its assertion that the only path to AGI lies through massive financial and energy expenditures, independent researchers are leveraging open-source technologies to match the performance of its most powerful models -- and do so at a fraction of the price.

Last Friday, a unified team from Stanford University and the University of Washington announced that they had trained a math and coding-focused large language model that performs as well as OpenAI's o1 and DeepSeek's R1 reasoning models. It cost just $50 in cloud compute credits to build. The team reportedly used an off-the-shelf base model, then distilled Google's Gemini 2.0 Flash Thinking Experimental model into it. The process of distilling AIs involves pulling the relevant information to complete a specific task from a larger AI model and transferring it to a smaller one.

Read more
New MediaTek Chromebook benchmark surfaces with impressive speed
Asus Chromebook CX14

Many SoCs are being prepared for upcoming 2025 devices, and a recent benchmark suggests that a MediaTek chipset could make Chromebooks as fast as they have ever been this year.

Referencing the GeekBench benchmark, ChromeUnboxed discovered the latest scores of the MediaTek MT8196 chip, which has been reported on for some time now. With the chip being housed on the motherboard codenamed ‘Navi,’ the benchmark shows the chip excelling in single-core and multi-core benchmarks, as well as in GPU, NPU, and some other tests run.

Read more
Chrome incognito just got even more private with this change
The Chrome browser on the Nothing Phone 2a.

Google Chrome's Incognito mode and InPrivate just became even more private, as they no longer save copied text and media to the clipboard, according to Windows Latest. The changes apply to Windows 11 and 10 users and were rolled out in 2024. However, neither Microsoft nor Google documented it.

Even though this change is not a recent feature, it's odd that neither tech giant thought it was worth mentioning. Previously, the default setting was that when a user saved text or images to the clipboard history, it was synced with Cloud Clipboard on Windows. Moreover, accessing this synced content was as simple as pressing the Windows and V keys, which poses a security risk, especially when using incognito mode.

Read more