Thursday, July 7, 2022
HomeCyber SecurityDEA Investigating Breach of Regulation Enforcement Information Portal – Krebs on Safety

DEA Investigating Breach of Regulation Enforcement Information Portal – Krebs on Safety

The U.S. Drug Enforcement Administration (DEA) says it’s investigating stories that hackers gained unauthorized entry to an company portal that faucets into 16 totally different federal regulation enforcement databases. KrebsOnSecurity has realized the alleged compromise is tied to a cybercrime and on-line harassment neighborhood that routinely impersonates police and authorities officers to reap private info on their targets.

Unidentified hackers shared this screenshot of alleged entry to the Drug Enforcement Administration’s intelligence sharing portal.

On Could 8, KrebsOnSecurity acquired a tip that hackers obtained a username and password for a licensed consumer of, which is the Regulation Enforcement Inquiry and Alerts (LEIA) system managed by the DEA.

KrebsOnSecurity shared details about the allegedly hijacked account with the DEA, the Federal Bureau of Investigation (FBI), and the Division of Justice, which homes each companies. The DEA declined to touch upon the validity of the claims, issuing solely a quick assertion in response.

“DEA takes cyber safety and data of intrusions severely and investigates all such stories to the fullest extent,” the company mentioned in an announcement shared by way of e mail.

In accordance with this web page on the Justice Division web site, LEIA “offers federated search capabilities for each EPIC and exterior database repositories,” together with information categorised as “regulation enforcement delicate” and “mission delicate” to the DEA.

A doc revealed by the Obama administration in Could 2016 (PDF) says the DEA’s El Paso Intelligence Heart (EPIC) techniques in Texas can be found to be used by federal, state, native and tribal regulation enforcement, in addition to the Division of Protection and intelligence neighborhood.

EPIC and LEIA even have entry to the DEA’s Nationwide Seizure System (NSS), which the DEA makes use of to determine property thought to have been bought with the proceeds of prison exercise (suppose fancy vehicles, boats and houses seized from drug kingpins).

“The EPIC System Portal (ESP) allows vetted customers to remotely and securely share intelligence, entry the Nationwide Seizure System, conduct information analytics, and procure info in help of prison investigations or regulation enforcement operations,” the 2016 White Home doc reads. “Regulation Enforcement Inquiry and Alerts (LEIA) permits for a federated search of 16 Federal regulation enforcement databases.”

The screenshots shared with this writer point out the hackers might use EPIC to search for a wide range of information, together with these for motor autos, boats, firearms, plane, and even drones.

Claims in regards to the purloined DEA entry had been shared with this writer by “KT,” the present administrator of the Doxbin — a extremely poisonous on-line neighborhood that gives a discussion board for digging up private info on individuals and posting it publicly.

As KrebsOnSecurity reported earlier this yr, the earlier proprietor of the Doxbin has been recognized because the chief of LAPSUS$, an information extortion group that hacked into a few of the world’s largest tech firms this yr — together with Microsoft, NVIDIA, Okta, Samsung and T-Cellular.

That reporting additionally confirmed how the core members of LAPSUS$ had been concerned in promoting a service providing fraudulent Emergency Information Requests (EDRs), whereby the hackers use compromised police and authorities e mail accounts to file warrantless information requests with social media corporations, cell telephony suppliers and different know-how corporations, testifying that the knowledge being requested can’t await a warrant as a result of it pertains to an pressing matter of life and dying.

From the standpoint of people concerned in submitting these phony EDRs, entry to databases and consumer accounts inside the Division of Justice can be a serious coup. However the information in EPIC would most likely be much more invaluable to organized crime rings or drug cartels, mentioned Nicholas Weaver, a researcher for the Worldwide Pc Science Institute at College of California, Berkeley.

Weaver mentioned it’s clear from the screenshots shared by the hackers that they might use their entry not solely to view delicate info, but additionally submit false information to regulation enforcement and intelligence company databases.

“I don’t suppose these [people] notice what they bought, how a lot cash the cartels would pay for entry to this,” Weaver mentioned. “Particularly as a result of as a cartel you don’t seek for your self you seek for your enemies, in order that even when it’s found there isn’t a loss to you of placing issues ONTO the DEA’s radar.”

The DEA’s EPIC portal login web page.


The login web page for (above) means that approved customers can entry the positioning utilizing a “Private Identification Verification” or PIV card, which is a reasonably robust type of authentication used government-wide to manage entry to federal amenities and data techniques at every consumer’s applicable safety stage.

Nevertheless, the EPIC portal additionally seems to just accept only a username and password, which would appear to radically diminish the safety worth of requiring customers to current (or show possession of) a licensed PIV card. Certainly, KT mentioned the hacker who obtained this illicit entry was in a position to log in utilizing the stolen credentials alone, and that at no time did the portal immediate for a second authentication issue.

It’s not clear why there are nonetheless delicate authorities databases being protected by nothing greater than a username and password, however I’m keen to wager large cash that this DEA portal will not be solely offender right here. The DEA portal is listed on Web page 87 of a Justice Division “information stock,” which catalogs all the information repositories that correspond to DOJ companies.

There are 3,330 outcomes. Granted, solely a few of these outcomes are login portals, however that’s simply inside the Division of Justice.

If we assume for the second that state-sponsored international hacking teams can achieve entry to delicate authorities intelligence in the identical manner as teenage hacker teams like LAPSUS$, then it’s long gone time for the U.S. federal authorities to carry out a top-to-bottom overview of authentication necessities tied to any authorities portals that visitors in delicate or privileged info.

I’ll say it as a result of it must be mentioned: America authorities is in pressing want of management on cybersecurity on the government department stage — ideally somebody who has the authority and political will to ultimately disconnect any federal authorities company information portals that fail to implement robust, multi-factor authentication.

I notice this can be much more advanced than it sounds, notably in relation to authenticating regulation enforcement personnel who entry these techniques with out the advantage of a PIV card or government-issued system (state and native authorities, for instance). It’s not going to be so simple as simply turning on multi-factor authentication for each consumer, thanks partially to a broad range of applied sciences getting used throughout the regulation enforcement panorama.

However when hackers can plunder 16 regulation enforcement databases, arbitrarily ship out regulation enforcement alerts for particular individuals or autos, or probably disrupt ongoing regulation enforcement operations — all as a result of somebody stole, discovered or purchased a username and password — it’s time for drastic measures.



Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments