DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

[CORRECTED and UPDATED] Hacking America: U.S. teen claims he had access to all state domains registered on .us TLD

Posted on September 19, 2016 by Dissent

UPDATE 9-21-2016 Over the past two days, DataBreaches.net provided the First Bank of Ohio with samples from two files that “Fear” claimed were from them. They have firmly denied that either file is theirs:

These have nothing to do with us. The second group are businesses that are applying for liquor licenses in Ohio.

The second file they are referring to is the file that had been mentioned in my first post on the claimed hack, below. The newer file is a file “Fear” has described elsewhere as “Ohio_transactions_2016.csv.”

So once again, “Fear’s” claims have been refuted.

CORRECTION and UPDATE (Sept. 20):

In reporting on the claims of a teenager known as “Fear,” this site noted what he had claimed and what he could back, but also noted where he had not provided any proof of claims. In fact, the headline had the word “claims” in it specifically because not all statements were proven.

Following publication of the article, this blogger continued trying to get @hackinyolife to provide more proof of his claims. Late last night, Fear began providing more documentation. A review of what he provided indicated that in some cases, he either did not understand what he was looking at, or had flat-out misrepresented some things. As one example, he had never specifically mentioned Neustar in talking to this site, yet when other journalists contacted him to follow up, he told them he had hacked them. He admitted to this site last night that he had not hacked Neustar.

After a lengthy chat with Fear last night, and after looking at the additional materials he provided last night, it also seems clear that he did not obtain any prescription monitoring database from Florida. While there was information pertaining to medical professionals, it was mostly information that would be publicly available such as in license verification, although the state’s public portal did not reveal all the fields that were in the underlying table (e.g., practitioners’ addresses, phone numbers, and email addresses would not be shown in the public results although they were in the state’s records).

DataBreaches.net informed Fear that it would be issuing a correction to its story and would be reporting that he didn’t have what he had claimed to have.  It now appears that he has issued a statement that he calls “The Truth:”

hello, media, hackers, pentesters.

Today I will be revealing the truth.

I did not hack Neustar, i lied to media to troll them.
I hacked into 38 government ftp servers, and had access to states data.
The bank breaches included has nothing to do with my breach on the ftps.
I gained access to the banks because i breached north dakota bank back in early 2016.
I had access to gov banks in each state. So i used it to troll the media.

Yes, the government did get hacked, along with social security numbers from the back, tax papers, voting data.

But Neustar was a mirage to troll the media.

What really happened (SUMMARY)

-United States banking server with known gov banks was breached. (100million SSNs, maybe more.)
-Government FTP servers hacked via exploit, not neustar.
-30+ .US and .gov domains were hacked via exploit.

@hackinyolife
-F

Fear’s newest claims were not backed with any proof of some of the claims above. He only provided this site with one screenshot with a few SSN that is unlikely to have come from any of the servers he claims to have breached.

At this point, then, DataBreaches.net believes that even though Fear did provide some evidence of hacking servers associated with states and did obtain some data, and although he had previously provided evidence of a hack involving the Bank of North Dakota, specific claims he made about the new hacking should be treated with extreme skepticism if not outright rejection.

DataBreaches.net apologizes to its readers for having provided inaccurate information.

Original post:

Sad to know .us domains are so unsecure

A private message to DataBreaches.net on Saturday evening was the prelude to a young hacker downloading tremendous amounts of data from states.

Over the next few hours, a teenage hacker known to DataBreaches.net from his past hacking activities would remind us once again just how insecure everything was, showing this blogger samples of files that he obtained in a hack that not only gave him access to every state with a domain on .us, but also to some .gov domains such as the U.S. Department of Education.

When asked how he obtained access, he replied:

I gained access to an ftp server, that listed access to all the ftp’s on .us domains, and those .us domains were hosted along with .gov , so I was able to access everything they hosted, such as, public data, private data, source codes etc…

He declined to reveal what .gov sites, other than USED, he was able to access, but did expand a bit on his previous answer, telling DataBreaches.net:

It was very simple to gain access to the 1st box that listed all the .us domains, and their ftp server logins. I went through each and every one, it was legit. I am pretty sure about every person who does security researching can do this, yes, it may have took me about 3 hours or 4 hours or looking around, but it is still possible.

Encryption was no obstacle for him, he said, because he saw no evidence that encryption was used at all: “I was able to read all of it in plain text form.”

As he acquired files, the teenager commented in a private chat on what he was obtaining:  Social Security numbers in one file, credit card numbers in another, postal and email addresses and phone number of Minnesota school board candidates in another, web-banking transactions from the First Bank of Ohio, and more, he claimed.

Web-banking transactions, First Bank of Ohio

Web-banking transactions, First Bank of Ohio [UPDATE: These are not the bank’s records, as per the bank on 9-21-2016]
According to the teen, he was able to get customer credit card records from the bank because the state had access to the bank and he then went through several SQL tables:

Names, addesses, phone numbers, email addresses, credit card numbers with CVV and expiration dates - everything in this file was in plain text.
Names, addesses, phone numbers, email addresses, credit card numbers with CVV and expiration dates – everything in this file was in plain text.

The hacker seems to have paid particular attention to Florida.  Just one file alone from Florida had 267 million records, another had 76 million, he told DataBreaches.net.

“i just got access to a total of Social Security’, 101087939 numbers,” he claimed at another point, without indicating which state it was from. 

i have been wget one state for like an hour lmao
has like
prob
400 mil
entries in total

When asked, the teenager, who prefers to be called “Fear,” claimed that he was also able to acquire voter registration databases. Although such databases are publicly available in many states, there has been growing concern about their too-easy accessibility and the risk that a hacker could tamper with the lists to corrupt the election process. Ironically, on Thursday, US-CERT issued an advisory on securing voter registration data in the wake of some highly publicized hacks.

Listing of WA county files with voter registration data. The hacker also had access to the actual registration data, he claims.
Listing of Alabama county files related to voter registration data. The hacker also had access to the actual registration data, he claims.

Fear (also known as @hackinyolife on Twitter) claims that he was also able to access Florida’s pharmacy prescription monitoring program that is used for law enforcement purposes, telling DataBreaches.net in chat:

they had monthly reports on every citizen in Florida, and it included phone, address, name, SSN.

On inquiry, he noted that those records also contained the medication names and corresponding prescription numbers, but declined to provide any screenshots as proof.

Although he hasn’t done any counts yet, Fear estimates that he has already acquired a couple of thousand credit card numbers and millions of Social Security numbers.

When asked whether he was also acquiring state employees’ personnel information such as salary information, bank account numbers for direct deposit, etc., he replied that he was able to get phone numbers, addresses, names, and positions, but “sadly, not bank information.”

As to his intentions, Fear tells DataBreaches.net that he is dumping small portions of private data: “I’m still analyzing each file to make sure to separate private from public.”

When asked if he had any message for the states and .gov entities he had been able to access, he replied:

5 char passwords won’t save your boxes lmao

Nor, apparently, were some steps taken on Sunday to secure the data. At one point, Fear informed DataBreaches.net he had just tried to login but “they took the entire .us ftp server down.” Florida’s site was available again shortly after that, he reported, but it was now password-protected.

Too little, too late, though, it seems, as Fear told this blogger:

  too bad they dont know its backdoored lOL…. they legit suck at security

According to Fear, he did not leave backdoors for other states – only Florida. That backdoor was removed last night.

A lot of damage can be done with 13 hours of access to a lot of states, though.

This story will be updated as more information becomes available.

CORRECTION: A previous version incorrectly captioned a screenshot as reflecting Washington data. The screenshot was from Alabama.

Category: Breach IncidentsGovernment SectorHackHealth DataU.S.

Post navigation

← Texas Doctor Resentenced to Prison Following Appeal
NYS A.G. Schneiderman Announces Arrests Of 4 Aides Who Allegedly Took Photos And Videos Of Nursing Home Residents →

8 thoughts on “[CORRECTED and UPDATED] Hacking America: U.S. teen claims he had access to all state domains registered on .us TLD”

  1. Regret says:
    September 19, 2016 at 11:26 am

    You may want to double check the image of affected counties, “Listing of WA county files related to voter registration data. ” This doesn’t appear to be WA state; a quick search found these counties in AL.

    1. Dissent says:
      September 19, 2016 at 11:31 am

      Thanks. I had been looking at different screenshots and captioned that one incorrectly. Fixed it now.

  2. Regret says:
    September 19, 2016 at 11:30 am

    I’d be interested in hearing what law enforcement people think about your “live” contact with a hacker during an ongoing breach. If you are contacted by authorities, such as FBI or some state attorney generals, do you have the legal resources to protect yourself?

    1. Dissent says:
      September 19, 2016 at 11:57 am

      Good question. I hope I don’t have to find out. I do have a lawyer who advises me/represents me on First Amendment issues, but I don’t think I’ve ever put your question to him.

      As Joseph Cox of Motherboard recently articulated, journalists generally do NOT have an obligation to report crimes to law enforcement or to share information with law enforcement. That’s not our job. I am not encouraging anyone to hack anything or anything more than they are already hacking. I am simply asking them to explain what they are doing and what they are obtaining – and to request that they show me evidence of same for reporting purposes.

      Could law enforcement try to raid me to get my notes or any files I obtain? Sure, they could try, but then we’d have a real First Amendment fight that would likely go on for years.

      So how does law enforcement feel about what I do? I have no idea. If you ask them and they answer you, let me know. I can’t imagine that they’d be deliriously happy, but then again, they’re probably getting information from my reporting that they can and will use if they ever pursue a case against someone.

  3. aj says:
    September 20, 2016 at 7:34 am

    “phone numbers, addresses, names, and positions”

    You can get this simply by doing an information request directly at the agency. It’s public information.

    1. Dissent says:
      September 20, 2016 at 8:10 am

      The file was a table from their server, though, and the information was not publicly viewable from the corresponding portal.

  4. Blue Sky says:
    September 20, 2016 at 5:01 pm

    Sigh…. Attention whore, much?

    1. Dissent says:
      September 20, 2016 at 5:06 pm

      More likely an attempt to generate interest/suggest authenticity to boost sales.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.