FBI (Federal Bureau of Investigation)

FBI (Federal Bureau of Investigation)

Compromised **FBI.gov email accounts** are being sold on dark web channels (e.g., Telegram, Signal) for as low as **$40**, granting buyers full **SMTP/POP3/IMAP access**. These credentials enable attackers to impersonate law enforcement, submit **fraudulent emergency data requests** to tech companies (bypassing legal processes like subpoenas), and extract sensitive user data (IPs, emails, phone numbers). Criminals also exploit these accounts to distribute **malware campaigns**, access **government-restricted intelligence tools** (e.g., Shodan, Intelligence X), and infiltrate **law enforcement portals**. The breach stems from **credential stuffing, infostealer malware, and targeted phishing**, exploiting human/technical vulnerabilities rather than direct system hacking. The commoditization of **institutional trust** amplifies risks of large-scale fraud, unauthorized data disclosure, and erosion of public confidence in government communications. Accounts from domains like **.gov** bypass security filters, increasing phishing success rates and potential for **supply-chain attacks** on private sector entities relying on government verification.

Source: https://www.techradar.com/pro/security/fbi-gov-email-accounts-are-being-sold-online-that-could-be-used-to-spread-malware-on-an-industrial-scale-heres-what-you-need-to-know

TPRM report: https://www.rankiteo.com/company/fbi

"id": "fbi833081625",
"linkid": "fbi",
"type": "Breach",
"date": "8/2025",
"severity": "100",
"impact": "",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'industry': 'Law Enforcement',
                        'location': 'United States',
                        'name': 'Federal Bureau of Investigation (FBI)',
                        'type': 'Government Agency'},
                       {'industry': 'Public Sector',
                        'location': 'United States',
                        'name': 'Unspecified U.S. Government Agencies',
                        'type': 'Government'},
                       {'industry': 'Technology/Telecommunications',
                        'location': 'Global',
                        'name': 'Tech Companies/Telecom Providers (Targeted by '
                                'Forged EDRs)',
                        'type': 'Private Sector'}],
 'attack_vector': ['Credential Stuffing (Password Reuse Exploitation)',
                   'Infostealer Malware (Browser/Email Client Credential '
                   'Theft)',
                   'Targeted Phishing/Social Engineering',
                   'Dark Web/Encrypted Messaging Platforms (Telegram, Signal)',
                   'Mainstream Platforms (TikTok, X)'],
 'data_breach': {'data_exfiltration': 'Likely (Credentials Sold; Data Accessed '
                                      'via Forged EDRs)',
                 'personally_identifiable_information': 'Potential (If '
                                                        'Disclosed via Forged '
                                                        'EDRs)',
                 'sensitivity_of_data': 'High (Government Email Access, '
                                        'Potential PII via EDRs)',
                 'type_of_data_compromised': ['Email Credentials '
                                              '(SMTP/POP3/IMAP)',
                                              'Potentially Sensitive Data via '
                                              'Forged EDRs (e.g., Subscriber '
                                              'Information)']},
 'description': 'Cybersecurity researchers from Abnormal AI have reported that '
                'compromised FBI.gov and other U.S. government email accounts '
                '(e.g., .gov, .police domains) are being sold on encrypted '
                'dark web channels (e.g., Telegram, Signal) and even '
                'mainstream platforms like TikTok and X for as low as $40. '
                'Sellers offer full SMTP, POP3, or IMAP credentials, enabling '
                'buyers to impersonate trusted authorities, send malicious '
                'emails, or submit forged emergency data requests (EDRs) to '
                'tech companies and telecom providers. The accounts are '
                'obtained via credential stuffing, infostealer malware, '
                'phishing, and social engineering. The commoditization of '
                'these accounts poses risks of large-scale malware campaigns, '
                'unauthorized data disclosure (e.g., IP addresses, phone '
                'numbers), and abuse of premium OSINT tools (e.g., Shodan, '
                'Intelligence X) reserved for verified government users.',
 'impact': {'brand_reputation_impact': ['FBI/Government Agencies (Loss of '
                                        'Credibility)',
                                        'Tech Companies (If Tricked by Forged '
                                        'EDRs)'],
            'data_compromised': ['Email Account Credentials (SMTP/POP3/IMAP)',
                                 'Potential Disclosure of Sensitive Data via '
                                 'Forged EDRs (e.g., IP Addresses, Phone '
                                 'Numbers, Emails)',
                                 'Access to Law Enforcement Portals/OSINT '
                                 'Tools'],
            'identity_theft_risk': 'High (Impersonation of Law Enforcement)',
            'legal_liabilities': ['Potential Violations of Data Protection '
                                  'Laws (If Sensitive Data Disclosed via '
                                  'Forged EDRs)',
                                  'Liability for Tech Companies Complying with '
                                  'Fraudulent Requests'],
            'operational_impact': ['Risk of Large-Scale Malware Campaigns',
                                   'Erosion of Trust in Government '
                                   'Communications',
                                   'Potential Legal Liabilities for Tech '
                                   'Companies Complying with Forged EDRs'],
            'systems_affected': ['FBI.gov Email Accounts',
                                 'Other U.S. Government Email Accounts (.gov, '
                                 '.police Domains)',
                                 'Tech Company/Telecom Provider Systems (via '
                                 'Forged EDRs)',
                                 'OSINT Platforms (Shodan, Intelligence X)']},
 'initial_access_broker': {'data_sold_on_dark_web': ['Full Email Credentials '
                                                     '(SMTP/POP3/IMAP)',
                                                     'Bundles of Government '
                                                     'Accounts',
                                                     'Access to Premium OSINT '
                                                     'Features'],
                           'entry_point': ['Credential Stuffing',
                                           'Infostealer Malware',
                                           'Phishing/Social Engineering'],
                           'high_value_targets': ['FBI.gov Email Accounts',
                                                  'Law Enforcement Portals',
                                                  'OSINT Tools (Shodan, '
                                                  'Intelligence X)']},
 'investigation_status': 'Ongoing (Reported by Abnormal AI; No Official FBI '
                         'Statement)',
 'lessons_learned': ['Government agencies must enforce stronger authentication '
                     '(e.g., MFA, hardware tokens) for email accounts.',
                     'Credential stuffing and infostealer malware remain '
                     'effective due to password reuse and saved credentials.',
                     'Trust in .gov/.police domains can be weaponized to '
                     'bypass technical filters (e.g., phishing/malware '
                     'delivery).',
                     'Commoditization of compromised accounts on dark '
                     'web/mainstream platforms enables scalable fraud.',
                     'Tech companies must verify emergency data requests more '
                     'rigorously to prevent abuse.'],
 'motivation': ['Financial Gain (Selling Access for $40–$X per Account)',
                'Fraud (Impersonation, Forged EDRs, Malware Distribution)',
                'Exploitation of Institutional Trust',
                'Access to Premium OSINT Tools',
                'Data Theft (IP Addresses, Emails, Phone Numbers)'],
 'post_incident_analysis': {'root_causes': ['Weak Authentication Practices (No '
                                            'MFA, Password Reuse)',
                                            'Lack of Monitoring for Credential '
                                            'Theft (Dark Web/Infostealer '
                                            'Activity)',
                                            'Over-Reliance on Domain Trust '
                                            '(.gov/.police Bypassing Filters)',
                                            'Insufficient Verification for '
                                            'Emergency Data Requests']},
 'recommendations': ['Implement mandatory MFA (preferably phishing-resistant) '
                     'for all government email accounts.',
                     'Conduct regular credential hygiene audits to detect '
                     'reused/weak passwords.',
                     'Deploy endpoint detection and response (EDR) tools to '
                     'detect infostealer malware.',
                     'Enhance employee training on phishing/social engineering '
                     'tailored to government targets.',
                     'Monitor dark web/mainstream platforms for leaked '
                     'government credentials.',
                     'Establish stricter verification protocols for emergency '
                     'data requests (e.g., secondary confirmation channels).',
                     'Limit premium OSINT tool access to verified devices/IPs '
                     'beyond just email verification.',
                     'Collaborate with platforms (Telegram, TikTok, X) to '
                     'takedown listings selling government credentials.'],
 'references': [{'source': 'Abnormal AI Report'},
                {'source': 'TechRadar Pro Article',
                 'url': 'https://www.techradar.com/pro/compromised-fbigov-emails-are-being-sold-for-dollar40-on-encrypted-dark-web-channels'}],
 'response': {'third_party_assistance': ['Abnormal AI (Research/Reporting)']},
 'threat_actor': [{'sophistication': 'Moderate (Leveraging Commodity '
                                     'Tools/Techniques)',
                   'type': 'Cybercriminals'}],
 'title': 'Compromised FBI.gov and Other Government Email Accounts Sold on '
          'Dark Web for Fraudulent Use',
 'type': ['Account Compromise',
          'Credential Theft',
          'Dark Web Marketplace Activity',
          'Phishing/Social Engineering',
          'Malware (Infostealer)',
          'Fraud (Forged Emergency Data Requests)'],
 'vulnerability_exploited': ['Weak/Reused Passwords',
                             'Lack of Multi-Factor Authentication (MFA)',
                             'Human Vulnerability (Phishing/Social Engineering '
                             'Susceptibility)',
                             'Saved Credentials in Browsers/Email Clients',
                             'Trust in .gov/.police Domain Emails (Bypassing '
                             'Technical Filters)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.