- Former developer at software company deletes his code to protest its ties to ICE Saturday 4:21 PM
- A mysterious website is doxing Hong Kong protesters and journalists Saturday 1:44 PM
- The best ‘Skyrim’ followers and how to get them Saturday 1:26 PM
- Why Joel Osteen gets cyberbullied every time Houston floods Saturday 12:40 PM
- How to stream Jets vs. Patriots in Week 3 Saturday 12:39 PM
- 10 indie dating simulator games you should be playing Saturday 12:31 PM
- How to stream Packers vs. Broncos in Week 3 Saturday 12:14 PM
- Saudi crown prince’s former adviser suspended from Twitter Saturday 11:57 AM
- How to stream Cowboys vs. Dolphins in Week 3 Saturday 11:57 AM
- YouTuber to pay restitution after a teen fan died copying her video Saturday 10:36 AM
- Antonio Brown sent ‘intimidating’ texts to an accuser, including a pic of her children Saturday 9:38 AM
- Facebook suspended tens of thousands of apps after Cambridge Analytica scandal Saturday 8:24 AM
- How to stream Browns vs. Rams on Sunday Night Football Saturday 6:00 AM
- How to watch ‘NFL Primetime’ on ESPN+ Saturday 5:00 AM
- How to stream Liverpool vs. Chelsea Friday 6:45 PM
Mystery hacker releases names of more than 20,000 FBI staffers
It’s the work of a pro-genetalia, pro-Buzz Lightyear, pro-Palestinian account.
A Twitter account named “Penis,” sporting a Buzz Lightyear avatar and pro-Palestinian message, has just released the names, job titles, and phone numbers of apparently more than 22,000 FBI employees and contractors.
Phone calls to a number of those named indicated that yes, the names and phone numbers are indeed correct. Some refused to answer any questions, and instead simply asked for this reporter’s identifying phone number.
Penis tweeted a link to the online database Monday afternoon, along with a password to decrypt it: “lol.”
The news came as no surprise to people following Penis. He gave the information to Motherboard on Sunday, which wrote about his plans to release. Penis accomplished this, he said, the old fashioned way: by tricking a government employee into thinking he was a colleague, claiming he’d lost his access to an employee portal, and finding the information on the Department of Justice Intranet.
The contents of what he was able to acquire—Penis didn’t release anything beyond names, job titles, phone numbers, or email addresses—were less impressive than the scope of what he published. Though the entries number more than 22,000, the listed names, arranged in alphabetical order by entrants’ last name, are cut off midway through the Js.
The FBI, which investigates most major hacks of U.S. companies without publicly confirming so, didn’t comment, and referred the Daily Dot to the DOJ.
In a statement provided to the Daily Dot, a DOJ spokesman said that “This unauthorized access is still under investigation; however, there is no indication at this time that there is any breach of sensitive personally identifiable information.”
A number of government agencies have been breached recently. Not all are as glaringly large and serious as that of the Office of Personnel Management (OPM), in which the human resource files of some 21.5 million government employees were exposed. Some are similarly childish. In October, a then-13-year-old hacker who goes by “Cracka” hacked the AOL account of CIA Director John Brennan, also relying heavily on social engineering.
Penis didn’t respond to request for comment.
Additional reporting by William Turton.
Photo via Matt Churchill/Flickr (CC BY 2.0) | Remix by Max Fleishman
A former senior politics reporter for the Daily Dot, Kevin Collier focuses on privacy, cybersecurity, and issues of importance to the open internet. Since leaving the Daily Dot in March 2016, he has served as a reporter for Vocativ and a cybersecurity correspondent for BuzzFeed.