DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

[CORRECTED and UPDATED] Hacking America: U.S. teen claims he had access to all state domains registered on .us TLD

Posted on September 19, 2016 by Dissent

UPDATE 9-21-2016 Over the past two days, DataBreaches.net provided the First Bank of Ohio with samples from two files that “Fear” claimed were from them. They have firmly denied that either file is theirs:

These have nothing to do with us. The second group are businesses that are applying for liquor licenses in Ohio.

The second file they are referring to is the file that had been mentioned in my first post on the claimed hack, below. The newer file is a file “Fear” has described elsewhere as “Ohio_transactions_2016.csv.”

So once again, “Fear’s” claims have been refuted.

CORRECTION and UPDATE (Sept. 20):

In reporting on the claims of a teenager known as “Fear,” this site noted what he had claimed and what he could back, but also noted where he had not provided any proof of claims. In fact, the headline had the word “claims” in it specifically because not all statements were proven.

Following publication of the article, this blogger continued trying to get @hackinyolife to provide more proof of his claims. Late last night, Fear began providing more documentation. A review of what he provided indicated that in some cases, he either did not understand what he was looking at, or had flat-out misrepresented some things. As one example, he had never specifically mentioned Neustar in talking to this site, yet when other journalists contacted him to follow up, he told them he had hacked them. He admitted to this site last night that he had not hacked Neustar.

After a lengthy chat with Fear last night, and after looking at the additional materials he provided last night, it also seems clear that he did not obtain any prescription monitoring database from Florida. While there was information pertaining to medical professionals, it was mostly information that would be publicly available such as in license verification, although the state’s public portal did not reveal all the fields that were in the underlying table (e.g., practitioners’ addresses, phone numbers, and email addresses would not be shown in the public results although they were in the state’s records).

DataBreaches.net informed Fear that it would be issuing a correction to its story and would be reporting that he didn’t have what he had claimed to have.  It now appears that he has issued a statement that he calls “The Truth:”

hello, media, hackers, pentesters.

Today I will be revealing the truth.

I did not hack Neustar, i lied to media to troll them.
I hacked into 38 government ftp servers, and had access to states data.
The bank breaches included has nothing to do with my breach on the ftps.
I gained access to the banks because i breached north dakota bank back in early 2016.
I had access to gov banks in each state. So i used it to troll the media.

Yes, the government did get hacked, along with social security numbers from the back, tax papers, voting data.

But Neustar was a mirage to troll the media.

What really happened (SUMMARY)

-United States banking server with known gov banks was breached. (100million SSNs, maybe more.)
-Government FTP servers hacked via exploit, not neustar.
-30+ .US and .gov domains were hacked via exploit.

@hackinyolife
-F

Fear’s newest claims were not backed with any proof of some of the claims above. He only provided this site with one screenshot with a few SSN that is unlikely to have come from any of the servers he claims to have breached.

At this point, then, DataBreaches.net believes that even though Fear did provide some evidence of hacking servers associated with states and did obtain some data, and although he had previously provided evidence of a hack involving the Bank of North Dakota, specific claims he made about the new hacking should be treated with extreme skepticism if not outright rejection.

DataBreaches.net apologizes to its readers for having provided inaccurate information.

Original post:

Sad to know .us domains are so unsecure

A private message to DataBreaches.net on Saturday evening was the prelude to a young hacker downloading tremendous amounts of data from states.

Over the next few hours, a teenage hacker known to DataBreaches.net from his past hacking activities would remind us once again just how insecure everything was, showing this blogger samples of files that he obtained in a hack that not only gave him access to every state with a domain on .us, but also to some .gov domains such as the U.S. Department of Education.

When asked how he obtained access, he replied:

I gained access to an ftp server, that listed access to all the ftp’s on .us domains, and those .us domains were hosted along with .gov , so I was able to access everything they hosted, such as, public data, private data, source codes etc…

He declined to reveal what .gov sites, other than USED, he was able to access, but did expand a bit on his previous answer, telling DataBreaches.net:

It was very simple to gain access to the 1st box that listed all the .us domains, and their ftp server logins. I went through each and every one, it was legit. I am pretty sure about every person who does security researching can do this, yes, it may have took me about 3 hours or 4 hours or looking around, but it is still possible.

Encryption was no obstacle for him, he said, because he saw no evidence that encryption was used at all: “I was able to read all of it in plain text form.”

As he acquired files, the teenager commented in a private chat on what he was obtaining:  Social Security numbers in one file, credit card numbers in another, postal and email addresses and phone number of Minnesota school board candidates in another, web-banking transactions from the First Bank of Ohio, and more, he claimed.

Web-banking transactions, First Bank of Ohio

Web-banking transactions, First Bank of Ohio [UPDATE: These are not the bank’s records, as per the bank on 9-21-2016]
According to the teen, he was able to get customer credit card records from the bank because the state had access to the bank and he then went through several SQL tables:

Names, addesses, phone numbers, email addresses, credit card numbers with CVV and expiration dates - everything in this file was in plain text.
Names, addesses, phone numbers, email addresses, credit card numbers with CVV and expiration dates – everything in this file was in plain text.

The hacker seems to have paid particular attention to Florida.  Just one file alone from Florida had 267 million records, another had 76 million, he told DataBreaches.net.

“i just got access to a total of Social Security’, 101087939 numbers,” he claimed at another point, without indicating which state it was from. 

i have been wget one state for like an hour lmao
has like
prob
400 mil
entries in total

When asked, the teenager, who prefers to be called “Fear,” claimed that he was also able to acquire voter registration databases. Although such databases are publicly available in many states, there has been growing concern about their too-easy accessibility and the risk that a hacker could tamper with the lists to corrupt the election process. Ironically, on Thursday, US-CERT issued an advisory on securing voter registration data in the wake of some highly publicized hacks.

Listing of WA county files with voter registration data. The hacker also had access to the actual registration data, he claims.
Listing of Alabama county files related to voter registration data. The hacker also had access to the actual registration data, he claims.

Fear (also known as @hackinyolife on Twitter) claims that he was also able to access Florida’s pharmacy prescription monitoring program that is used for law enforcement purposes, telling DataBreaches.net in chat:

they had monthly reports on every citizen in Florida, and it included phone, address, name, SSN.

On inquiry, he noted that those records also contained the medication names and corresponding prescription numbers, but declined to provide any screenshots as proof.

Although he hasn’t done any counts yet, Fear estimates that he has already acquired a couple of thousand credit card numbers and millions of Social Security numbers.

When asked whether he was also acquiring state employees’ personnel information such as salary information, bank account numbers for direct deposit, etc., he replied that he was able to get phone numbers, addresses, names, and positions, but “sadly, not bank information.”

As to his intentions, Fear tells DataBreaches.net that he is dumping small portions of private data: “I’m still analyzing each file to make sure to separate private from public.”

When asked if he had any message for the states and .gov entities he had been able to access, he replied:

5 char passwords won’t save your boxes lmao

Nor, apparently, were some steps taken on Sunday to secure the data. At one point, Fear informed DataBreaches.net he had just tried to login but “they took the entire .us ftp server down.” Florida’s site was available again shortly after that, he reported, but it was now password-protected.

Too little, too late, though, it seems, as Fear told this blogger:

  too bad they dont know its backdoored lOL…. they legit suck at security

According to Fear, he did not leave backdoors for other states – only Florida. That backdoor was removed last night.

A lot of damage can be done with 13 hours of access to a lot of states, though.

This story will be updated as more information becomes available.

CORRECTION: A previous version incorrectly captioned a screenshot as reflecting Washington data. The screenshot was from Alabama.

Category: Breach IncidentsGovernment SectorHackHealth DataU.S.

Post navigation

← Texas Doctor Resentenced to Prison Following Appeal
NYS A.G. Schneiderman Announces Arrests Of 4 Aides Who Allegedly Took Photos And Videos Of Nursing Home Residents →

8 thoughts on “[CORRECTED and UPDATED] Hacking America: U.S. teen claims he had access to all state domains registered on .us TLD”

  1. Regret says:
    September 19, 2016 at 11:26 am

    You may want to double check the image of affected counties, “Listing of WA county files related to voter registration data. ” This doesn’t appear to be WA state; a quick search found these counties in AL.

    1. Dissent says:
      September 19, 2016 at 11:31 am

      Thanks. I had been looking at different screenshots and captioned that one incorrectly. Fixed it now.

  2. Regret says:
    September 19, 2016 at 11:30 am

    I’d be interested in hearing what law enforcement people think about your “live” contact with a hacker during an ongoing breach. If you are contacted by authorities, such as FBI or some state attorney generals, do you have the legal resources to protect yourself?

    1. Dissent says:
      September 19, 2016 at 11:57 am

      Good question. I hope I don’t have to find out. I do have a lawyer who advises me/represents me on First Amendment issues, but I don’t think I’ve ever put your question to him.

      As Joseph Cox of Motherboard recently articulated, journalists generally do NOT have an obligation to report crimes to law enforcement or to share information with law enforcement. That’s not our job. I am not encouraging anyone to hack anything or anything more than they are already hacking. I am simply asking them to explain what they are doing and what they are obtaining – and to request that they show me evidence of same for reporting purposes.

      Could law enforcement try to raid me to get my notes or any files I obtain? Sure, they could try, but then we’d have a real First Amendment fight that would likely go on for years.

      So how does law enforcement feel about what I do? I have no idea. If you ask them and they answer you, let me know. I can’t imagine that they’d be deliriously happy, but then again, they’re probably getting information from my reporting that they can and will use if they ever pursue a case against someone.

  3. aj says:
    September 20, 2016 at 7:34 am

    “phone numbers, addresses, names, and positions”

    You can get this simply by doing an information request directly at the agency. It’s public information.

    1. Dissent says:
      September 20, 2016 at 8:10 am

      The file was a table from their server, though, and the information was not publicly viewable from the corresponding portal.

  4. Blue Sky says:
    September 20, 2016 at 5:01 pm

    Sigh…. Attention whore, much?

    1. Dissent says:
      September 20, 2016 at 5:06 pm

      More likely an attempt to generate interest/suggest authenticity to boost sales.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.