Skip to main content

Hacker selling access to U.S. government websites

If you want access to a government website, you don’t need to be a computer savvy spy. You just need enough cash to pay a hacker to do the technical heavy lifting for you. According to the data security firm Imperva, one such hacker is now selling access to government, military, and education websites around the world — and for relatively little money.

Access to European and U.S. websites is being sold for prices ranging from $55 to $499. Screenshots posted on Imperva’s blog show that access to the website of the U.S. Army costs $499 for control of ” full site admin” and “high level informations.” The National Guard’s site is also $499 and includes “MySQL root access.” The U.S. Department of Defense’s website access is listed at $399 for control of “full site admin, control/root access, high value informations.”

“The victims’ vulnerabilities were probably obtained by SQL injection vulnerability automatic scanner and exploited in automatic manner, as the hacker published his methods in a post in some hacker forum,” Imperva said in a blog post.

In addition to website access, the unnamed hacker is also dealing in entire website databases that include names, e-mail addresses, phone numbers and street addresses. The database information can be had for $20 per 1,000 names. A screenshot posted by Imperva reveals that the information from the University of Connecticut is among the databases that are up for sale.

While some are suspecting a scam, at least one security expert thinks that the hacks are genuine. “I’ve seen some of the back-end evidence of his hacks, so it doesn’t seem like he’s making this up,” says former Washington Post reporter Brain Krebs in a blog post.

Image used with permission by copyright holder

In addition to site access, the hacker will also ply his trade on “normal” and “high profile” websites, charging $9.99 for the service and $2 for a report on vulnerabilities.

Editors' Recommendations

Aemon Malone
Former Digital Trends Contributor
Russian hackers behind ‘world’s most murderous malware’ probing U.S. power grid
hydrostor grid of the future power mem4

A hacking group linked to the Russian government has been attempting to breach the U.S. power grid, Wired reports.

Security experts from the non-profit group the Electric Information Sharing and Analysis Center (E-ISAC) and security firm Dragos tracked the hackers -- and warn that the group has been probing the grid for weaknesses, searching for ways that they could access U.S. systems.

Read more
Monzo will launch its banking app in the U.S., but it may be a hard sell
Monzo card press photo

Monzo, a widely popular mobile banking service in the United Kingdom, is launching a “light version” of its original app in the United States this year. But while it garnered rave reviews in the U.K., Monzo’s popularity may not reach the same heights in the U.S. because the app will be launched this summer with a few limitations: such as a “light version” of the app with fewer features and the fact that Monzo isn’t an officially licensed bank in the U.S. yet.

According to a blog post published by Monzo on Thursday, June 13, the U.S. version of the Monzo banking app is expected to include the following features: International spending without fees, 24/7 access to customer service, person-to-person payments, immediate spending notifications, and a savings account feature known as Savings Pots. Monzo contends that starting out simply with a banking app with limited features will allow its U.S. customers the opportunity to collaborate with the company to make Monzo “the ideal bank account for the U.S.” However, Monzo’s form of collaboration will apparently require “face-to-face events in major U.S. cities” in which the company will meet with early users of the app to get their feedback and then further build the app.

Read more
Radiohead releases 18 hours of material to torpedo hacker’s ransom demand
radiohead releases 18 hours of material after hacker demands ransom thom yorke

Radiohead has been hacked. And its response to the incident is very ... well ... Radiohead.

The perpetrator managed to steal 18 hours’ worth of unreleased material recorded during the band’s 1997 OK Computer sessions, and was reportedly asking for $150,000 to return the haul.

Read more