{"id":35461,"date":"2022-04-05T14:59:31","date_gmt":"2022-04-05T18:59:31","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=35461"},"modified":"2024-11-08T15:33:30","modified_gmt":"2024-11-08T20:33:30","slug":"forged-emergency-data-requests","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2022\/04\/05\/forged-emergency-data-requests\/","title":{"rendered":"Forged Emergency Data Requests"},"content":{"rendered":"<p><a href=\"https:\/\/ca.finance.yahoo.com\/news\/apple-meta-gave-user-data-175918825.html\">William Turton<\/a>:<\/p>\n<blockquote cite=\"https:\/\/ca.finance.yahoo.com\/news\/apple-meta-gave-user-data-175918825.html\">\n<p>Apple and Meta provided basic subscriber details, such as a customer&rsquo;s address, phone number and IP address, in mid-2021 in response to the forged &ldquo;emergency data requests.&rdquo;<\/p>\n<p>[&#8230;]<\/p>\n<p>Cybersecurity researchers suspect that some of the hackers sending the forged requests are minors located in the U.K. and the U.S. One of the minors is also believed to be the mastermind behind the cybercrime group Lapsus$, which hacked Microsoft Corp., Samsung Electronics Co. and Nvidia Corp., among others, the people said.<\/p>\n<p>[&#8230;]<\/p>\n<p>The guidelines referenced by Apple say that a supervisor for the government or law enforcement agent who submitted the request &ldquo;may be contacted and asked to confirm to Apple that the emergency request was legitimate,&rdquo; the Apple guideline states.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/www.macrumors.com\/2022\/03\/30\/apple-user-data-forged-legal-requests\/\">Juli Clover<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.macrumors.com\/2022\/03\/30\/apple-user-data-forged-legal-requests\/\">\n<p>Typically, Apple provides this information with a search warrant or subpoena from a judge, but that does not apply with emergency requests because they are used in cases of imminent danger.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/krebsonsecurity.com\/2022\/03\/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests\/\">Brian Krebs<\/a>:<\/p>\n<blockquote cite=\"https:\/\/krebsonsecurity.com\/2022\/03\/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests\/\">\n<p>There is a terrifying and highly effective &ldquo;method&rdquo; that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms. It involves compromising email accounts and websites tied to police departments and government agencies, and then sending unauthorized demands for subscriber data while claiming the information being requested can&rsquo;t wait for a court order because it relates to an urgent matter of life and death.<\/p>\n<p>[&#8230;]<\/p>\n<p>It is now clear that some hackers have figured out there is no quick and easy way for a company that receives one of these EDRs to know whether it is legitimate. Using their illicit access to police email systems, the hackers will send a fake EDR along with an attestation that innocent people will likely suffer greatly or die unless the requested data is provided immediately.<\/p>\n<p>In this scenario, the receiving company finds itself caught between two unsavory outcomes: Failing to immediately comply with an EDR &mdash; and potentially having someone&rsquo;s blood on their hands &mdash; or possibly leaking a customer record to the wrong person.<\/p>\n<p>[&#8230;]<\/p>\n<p>&ldquo;The only way to clean it up would be to have the FBI act as the sole identity provider for all state and local law enforcement,&rdquo; Weaver said. &ldquo;But even that won&rsquo;t necessarily work because how does the FBI vet in real time that some request is really from some podunk police department?&rdquo;<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/www.schneier.com\/blog\/archives\/2022\/04\/hackers-using-fake-police-data-requests-against-tech-companies.html\">Bruce Schneier<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.schneier.com\/blog\/archives\/2022\/04\/hackers-using-fake-police-data-requests-against-tech-companies.html\">\n<p>The &ldquo;credentials&rdquo; are even more insecure than we could have imagined: access to an email address. And the data, of course, isn&rsquo;t very secure. But imagine how this kind of thing could be abused with a law enforcement encryption backdoor.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/pxlnv.com\/linklog\/fake-edr\/\">Nick Heer<\/a>:<\/p>\n<blockquote cite=\"https:\/\/pxlnv.com\/linklog\/fake-edr\/\">\n<p>Yet <a href=\"https:\/\/pxlnv.com\/linklog\/lapsuss-mastermind\/\">again<\/a>, the most effective techniques for illicitly obtaining information are confidence tricks, not technical expertise.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/krebsonsecurity.com\/2022\/03\/fake-emergency-search-warrants-draw-scrutiny-from-capitol-hill\/\">Brian Krebs<\/a>:<\/p>\n<blockquote cite=\"https:\/\/krebsonsecurity.com\/2022\/03\/fake-emergency-search-warrants-draw-scrutiny-from-capitol-hill\/\">\n<p>The current scourge of fraudulent EDRs illustrates the dangers of relying solely on email to process legal requests for privileged subscriber data. In July 2021, Sen. Wyden and others introduced new legislation to combat the growing use of counterfeit court orders by scammers and criminals. The bill calls for funding for state and tribal courts to adopt widely available digital signature technology that meets standards developed by the National Institute of Standards and Technology.<\/p>\n<p>&ldquo;Forged court orders, usually involving copy-and-pasted signatures of judges, have been used to authorize illegal wiretaps and fraudulently take down legitimate reviews and websites by those seeking to conceal negative information and past crimes,&rdquo; the lawmakers said in a statement introducing their bill.<\/p>\n<\/blockquote>\n\n<p>However, hackers could still get unauthorized access to the digital signing key instead of the e-mail account.<\/p>\n\n<p><a href=\"https:\/\/twitter.com\/tclementdev\/status\/1509903687812096005\">Thomas Clement<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/tclementdev\/status\/1509903687812096005\">\n<p>This is exactly why end-to-end encryption exists, which iCloud is still not doing.<\/p>\n<\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/10\/04\/safari-bookmarks-now-end-to-end-encrypted\/\">Safari Bookmarks [Not Actually] End-To-End Encrypted<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/01\/14\/reminder-imessage-not-meaningfully-e2e\/\">Reminder: iMessage Not Meaningfully E2E<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/01\/21\/apple-dropped-plans-for-end-to-end-encrypted-icloud-backups-after-fbi-objected\/\">Apple Dropped Plans for End-to-End Encrypted iCloud Backups After FBI Objected<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2016\/02\/17\/fbi-asks-apple-for-secure-golden-key\/\">FBI Asks Apple for Secure Golden Key<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>William Turton: Apple and Meta provided basic subscriber details, such as a customer&rsquo;s address, phone number and IP address, in mid-2021 in response to the forged &ldquo;emergency data requests.&rdquo; [&#8230;] Cybersecurity researchers suspect that some of the hackers sending the forged requests are minors located in the U.K. and the U.S. One of the minors [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2022-04-05T18:59:34Z","apple_news_api_id":"efa0aefb-f2de-4974-8663-744fe3119e3e","apple_news_api_modified_at":"2024-11-08T20:33:32Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAg==","apple_news_api_share_url":"https:\/\/apple.news\/A76Cu-_LeSXSGY3RP4xGePg","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[38,1755,2052,150,2686,2137,355,1382],"class_list":["post-35461","post","type-post","status-publish","format-standard","hentry","category-technology","tag-apple","tag-breach","tag-discord","tag-email","tag-law-enforcement","tag-meta","tag-privacy","tag-snapchat"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/35461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=35461"}],"version-history":[{"count":3,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/35461\/revisions"}],"predecessor-version":[{"id":35466,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/35461\/revisions\/35466"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=35461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=35461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=35461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}