FBI Records, Emails, Social Security Numbers Exposed In A Million Files Data Leak; Anonymous Separately Leaks All FBI Agents


A massive data leak has been reported at the Oklahoma Securities Commission, millions of records — including files related to sensitive FBI investigations over the last seven years, emails dating back 17 years and thousands of Social Security numbers — have all been exposed.

The breach was revealed last month by Greg Pollock, a cybersecurity researcher at UpGuard, who stated he found that millions of files were publicly available on an online server and didn’t require any password to access them. Exposing the complete lack of security for sensitive information by U.S. government officials.

“It represents a compromise of the entire integrity of the Oklahoma Department of Securities’ network,” UpGuard’s Chris Vickery told Forbes, the first outlet that reported the breach. “It affects an entire state level agency. … It’s massively noteworthy.”

Vickery told Forbes that the exposed FBI documents included “all sorts of archive enforcement actions” from the last seven years. He added that the records also contained various files with agent-filled timelines of interviews related to investigations, bank transaction histories, and emails from individuals related to the cases.

The FBI files also named notable companies and banks such as — AT&T, Goldman Sachs, and Lehman Brothers. Although, Forbes didn’t comment on whether the organizations were under investigation.

The leak further contained emails that date back 17 years, Social Security numbers and other data stretching back to the 1980s, according to Forbes.

The breach was due to leaving an open rsync server. Such servers are traditionally used to back up large batches of data. But that information is supposed to be secure and should be protected by a username and password. Which this server lacked making it accessible to anyone with an internet connection.

If that’s not enough, passwords for computers on the Oklahoma government’s network were also revealed by the breach.

While this isn’t reported to be a hack and only a slight exposure a mysterious file appeared on the private Pastebin like website, privatebin.net. The file posted by Anonymous claiming to be from CgAN (https://cyberguerrilla.info) contains purported leaked information of all current FBI agents, their professions, phone numbers, and email addresses. As well as IP addresses for several intelligence services including the CIA, GCHQ, and many others.

The encrypted message opens up, stating “its time to unite against the system and fight the intelligence agencies.”

“UNITE AGAINST SYSTEM! Eye is watching you every single second of time!
Become Anonymous! Strike against intelligence services!
Targeted and leaked intelligence services: DGSE (France), MI6 (UK), CIA and FBI (USA)

defense.gouv.fr ||| DGSE ||| Direction générale de la sécurité extérieure |||
sis.gov.uk ||| MI6 – The Secret Intelligence Service (SIS) |||
cia.gov ||| Central Intelligence Agency |||
fbi.gov ||| Federal Bureau of Investigation ||| , , , ,

Citizens of the world, you have just few time to ACT for your future and freedom!
Governments are submitting new laws that human rights of all citizens will be suspended forever!
Intelligence services are preparing to arrest all activists, whistleblowers, freedom organizations, hackers and hacktivists all around the world in a year!

All activists who are acting for freedom and peace,
All hackers who are on the side of internet freedom,
All citizens who do not want to be as a slave in future,

Act against them save Anonymous and Wikileaks,
They are preparing to destroy all freedom activists and peace defenders,
We have to unite!
Take action to free all Anons, to free all activists, to save Anonymous
to free Julian Assange, to save Wikileaks,
to free Timothy Justen French, free James E. Robinson, free Jeremy Hammond, free Martin Gottesfeld, free Matt Dehart.

Save freedom activists for peace and our future!
We are Anonymous
We do not forgive,
We do not forget,
Expect us!,” Anonymous writes.

There is no information available on how Anonymous obtained the list of FBI officials or what FBI server was reached to obtain the data. However, this continues to expose that security is a joke even when taken seriously, if a hacker wants to find a vulnerable entry point they will.


The Tor browser could leak IP addresses for a while – Fixed now

Due to a bug in the Firefox browser, Tor was leaking the ip addresses of its users if they made a mistake.
The bug was discovered by the Italian security researcher Filippo Cavallarin. The vulnerability resides in FireFox and eventually also affects Tor Browser, since the famous privacy-aware service that allows users to surf the web anonymously uses FireFox at its core.

Dubbed by the researcher as TorMoil, the vulnerability affects Tor browser for macOS and Linux and not for Windows, but the details of the flaw have not been publicly released, out of respect for the security and privacy of Tor users.

TorMoil is triggered when users click on links that begin with file:// addresses, instead of the more common used https:// and http:// addresses.

Tor released a fix for this shortly after:

“The fix we deployed is just a workaround stopping the leak. As a result of that navigating file:// URLs in the browser might not work as expected anymore. In particular entering file:// URLs in the URL bar and clicking on resulting links is broken,” the Tor Project said in a blog post.

“Opening those in a new tab or new window does not work either. A workaround for those issues is dragging the link into the URL bar or on a tab instead. We track this follow-up regression in bug 24136.”

Tor’s statement said there is no evidence that the flaw has been actively exploited on the Internet or darkweb to obtain the IP addresses or Tor users. Of course, the lack of evidence doesn’t mean the flaw wasn’t exploited by law enforcement officers, private investigators, or stalkers. And now that a fix is available, it will be easy for adversaries who didn’t know about the vulnerability before to create working exploits.

The company finally released an updated version for the browser here. The new version is called Tor Brfrowser 7.0.9. Since Windows users were not affected, they stay on the older version 7.0.8. But if you do not know wich version you have, since the bug was discovered on Thursday, October 26, by Filippo Cavallarin, everyone who installed the Tor browser before this date should update to the latest version.



The Hacker News

Equifax Has Sold Private Data Including Salary Details of Millions of Employees To Other Companies

Equifax-owned company called Workforce Solutions, also known as The Work Number (TALX), sold salary data of its employees to debt specialists, financial service companies, and other organizations. Facebook Inc. is one of those companies buying such data despite the fact that the U.S. Federal Trade Commission put Facebook on privacy probation.

It is well known that social media such as Facebook now encourage their users to share their private data online. These sites’ entire policies are based on encouraging their customers to share their private lives as much as possible. The data shared (most of the time voluntary) is sent to several organizations and companies regardless of users’ consent. Despite the fact that social media users share their private lives online, salary is one of the sacred areas to most people, people who would not want to post publicly how much they earn. Facebook has been buying data from Equifax and also selling all the private data it collects from its users back to several companies including Equifax which had a breach to expose 143 million Americans’ private information.

Equifax Work Number database now contains over 296 million employment records and contains employees at all wage levels, from CEOs to interns. Considering how loose their security level is, apparent from breaches, it is not even a surprise there was unauthorized access to their employee tax records, lasting over a year, from April 2016 to May 2017. Cybersecurity expert Brian Krebs states that ‘crooks were able to reset the 4-digit PIN given to customer employees as a password and then steal W-2 tax data after successfully answering personal questions about those employees,’ to breach TALX’s databases, the Tax Form Management platform. He said due to this method of breaching, Equifax has no idea how many employees were affected from it. Krebs also reported that last September, a research team was able to access 14,000 consumer records after slipping into an online portal where Equifax employees in Argentina manage credit report disputes from consumers, as the password combination was set to an easy guess such as admin/admin.

Equifax-owned The Work Number has such a detailed database about salary data they put on sale that it shows week-by-week data for years, health care providers, types of health care coverage, files of unemployment claims and more. The data The Work Number owns and sells includes 12 million records.

Equifax can easily get and store such private and hidden information through thousands of U.S. businesses, including Fortune 500 companies, government agencies (who hold 85 percent of the entire country’s population), the Department of Defense and even schools. These sectors and people let Equifax tap directly into their data so that the credit bureau can have the latest job information and they even pay for Equifax to own their workers’ private information as they see it as a privilege. Once Equifax collects the private data, it sells the data to third parties such as debt agents, social media giants like Facebook Inc., and various companies giving financial services.

A good example could be given when we look at Facebook employees. A typical employee at Facebook may require verification of his employment through TALX when he applies for a loan, public aid, or a new job. If his new prospective employer is among the 70,000 approved entities in Equifax’s verifier network with a “permissible purpose”, that company can purchase his employment and income information for about $20. Prospective landlords can verify an applicant’s income through The Work Number, or human resources departments can examine an applicant’s background information much cheaper.

How the Work Number process works, according to a 2007 slide about Equifax’s $1.4 billion acquisition of TALX that year. Image: SEC

Of course, gathering data which was more than a fifth of the firm’s $3.1 billion revenue last year makes TALX one of the most profitable businesses of Equifax. Rick Smith, Equifax’s former CEO, said at an event at the University of Georgia in August. “That acquisition, by the way—I don’t know if I’m proud of this or not—but it’s worth about $9 billion today.”

Equifax already confirmed in an emailed statement to News as it shares ‘job data’ with debt collectors and others in agreement with Fair Credit Reporting Act guidelines.

Despite the fact that the Work Number database presents a continuous threat for both employees and consumers with their large database to private data and with little to no protection to it, the Work Number stated they will continue to supply such data for their customers, the sale of the data is included.

Such private data being shared by financial companies means your health status, credit history, financial status, debts, salary, your bank accounts and several other private details about your life are exposed to many organisations and companies. When, for instance, you fail to pay for your credit card debt or hospital bill, the companies can withdraw this amount from your bank account and you won’t even realize it unless you see a detailed account report.

At this point, there does not seem to be a real solution to this big scandal concerning the violation of private data since the Federal Trade Commission (FTC), which is supposed to take care of such issues, also sends its employees’ data to Equifax and it is an Equifax client as well. FTC regularly sends wage and work information about its attorneys and staff members to the Work Number database.

Trade specialists comment about one of the biggest scams of our century concerning the violation of company’s customer related data as a ‘secret CIA’ since it is being done legally and nobody does anything about to prevent it.