Hacker CyberZeist Breaches FBI Website And Leaks Data

The website of the Federal Bureau of Investigation (FBI) has been hacked again by an attacker known as CyberZeist, who then leaked personal account information to Pastebin.

The attack took place just before Christmas on 22 December, and CyberZeist is said to have exploited a zero-day vulnerability in the Plone Content Management System (CMS) of the FBI.gov website, according to his Twitter feed.

It should be noted that this is not the first time that the FBI website has been hacked. Early last year FBI agents travelled to Scotland to observe the arrest of a 15-year-old schoolboy in Glasgow over a hack of an FBI system.

CMS Flaw?

Based on the data placed on Pastebin, the data CyberZeist found during his hack included accounts information, including names, SHA1 Encrypted Passwords, SHA1 salts, and emails, as well as 155 logins.

According to the Security Affairs website, CyberZeist apparently was “tasked” by a vendor to test the CMS system against both the FBI and Amnesty. The flaw with the Plone CMS system apparently resides in some python modules of the CMS.

Other websites are potentially exposed to the same zero-day attack, including Intellectual Property Rights Coordination Center and EU Agency for Network Information and Security.

CyberZeist tweeted an image of the hacked FBI website, before it was taken down.

CyberZeist was part of the the Anonymous collective which hacked into the website of the FBI back in 2011.

Expert Take

Some security experts have lamented that the hacker was able to penetrate the systems of one of the world’s foremost law enforcement agencies.

“It’s very regrettable to see such a negligent approach to web application security from such an agency as the FBI,” said Ilia Kolochenko, CEO of web security firm High-Tech Bridge.

“They put at risk not only their main website and the interconnected infrastructure, but provide cybercriminals from all over the world with a universal bridgehead to attack global companies and governments by placing malware on the FBI’s website,” he said.

“Many exploitation vectors of common web application vulnerabilities, including unpatched 0days, can be efficiently mitigated by proper web server hardening and a WAF, but it looks like the FBI ignores these common best practices,” said Kolochenko.

“If claims, supported by screenshots, of publicly accessible backups, missing chroot, absence of access and privilege segregation, are true – the FBI should entirely revise their approach to web application security.”

Quiz: What do you know about Internet security?

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

OpenAI’s Lightcap To Take On Expanded Role

OpenAI chief operating officer Brad Lightcap to oversee international expansion as company consolidates lead in…

8 hours ago

China Unveils Deep-Sea Cable-Cutting Device

Chinese researchers publish details on device that could wreak havoc on undersea communications cables in…

8 hours ago

Pat Gelsinger Joins Faith-Based Tech Company Gloo

Former Intel chief Gelsinger expands role at Gloo, becoming executive chairman and head of technology…

9 hours ago

MEPs Ramp Pressure For Second EU Chips Act

MEPs add to Commission pressure for second EU Chips Act amidst industry calls for renewed…

9 hours ago

Xiaomi Raises $5.5bn In Expanded Share Sale

Smartphone maker Xiaomi reportedly raises about $5.5bn in Hong Kong share sale as it invests…

10 hours ago

BYD Launches Rival To Tesla’s Model 3 At Half Price

BYD's Qin L EV sedan starts at about half the price of Tesla's Model 3,…

10 hours ago