- How to live stream Guadalajara vs. Atletico Madrid 3 Years Ago
- Forget Area 51—People are planning to storm the Bermuda Triangle 3 Years Ago
- It’s too late to book a room for the Area 51 raid 3 Years Ago
- Adam Sandler’s next Netflix film is a star-studded Halloween comedy 3 Years Ago
- How to live stream Arsenal vs. Real Madrid Today 12:06 PM
- Netflix’s ‘7SEEDS’ is an abominable adaptation of the original manga Today 11:59 AM
- Alinity Divine hasn’t been punished for throwing her cat—and people are livid Today 10:16 AM
- Gamer Krucial B passes away during Defend the North tournament Today 9:25 AM
- Brexit supporter Boris Johnson becomes prime minister—spawning lots of memes Today 9:16 AM
- Democrats want to ban use of facial recognition in public housing Today 8:29 AM
- In America’s meme war, the left and right are fighting different battles Today 8:10 AM
- Mahershala Ali’s ‘Blade’ movie won’t arrive until Phase 5 of the MCU Today 7:18 AM
- Natalie Portman isn’t playing ‘female Thor’—she’s ‘Mighty Thor’ Today 7:08 AM
- How to watch ‘Breaking Bad’ online Today 7:00 AM
- Controversial Instagram influencer plans event called ‘The Scam’ Today 7:00 AM
It’s the work of a pro-genetalia, pro-Buzz Lightyear, pro-Palestinian account.
A Twitter account named “Penis,” sporting a Buzz Lightyear avatar and pro-Palestinian message, has just released the names, job titles, and phone numbers of apparently more than 22,000 FBI employees and contractors.
Phone calls to a number of those named indicated that yes, the names and phone numbers are indeed correct. Some refused to answer any questions, and instead simply asked for this reporter’s identifying phone number.
Penis tweeted a link to the online database Monday afternoon, along with a password to decrypt it: “lol.”
The news came as no surprise to people following Penis. He gave the information to Motherboard on Sunday, which wrote about his plans to release. Penis accomplished this, he said, the old fashioned way: by tricking a government employee into thinking he was a colleague, claiming he’d lost his access to an employee portal, and finding the information on the Department of Justice Intranet.
The contents of what he was able to acquire—Penis didn’t release anything beyond names, job titles, phone numbers, or email addresses—were less impressive than the scope of what he published. Though the entries number more than 22,000, the listed names, arranged in alphabetical order by entrants’ last name, are cut off midway through the Js.
The FBI, which investigates most major hacks of U.S. companies without publicly confirming so, didn’t comment, and referred the Daily Dot to the DOJ.
In a statement provided to the Daily Dot, a DOJ spokesman said that “This unauthorized access is still under investigation; however, there is no indication at this time that there is any breach of sensitive personally identifiable information.”
A number of government agencies have been breached recently. Not all are as glaringly large and serious as that of the Office of Personnel Management (OPM), in which the human resource files of some 21.5 million government employees were exposed. Some are similarly childish. In October, a then-13-year-old hacker who goes by “Cracka” hacked the AOL account of CIA Director John Brennan, also relying heavily on social engineering.
Penis didn’t respond to request for comment.
Additional reporting by William Turton.
Photo via Matt Churchill/Flickr (CC BY 2.0) | Remix by Max Fleishman
A former senior politics reporter for the Daily Dot, Kevin Collier focuses on privacy, cybersecurity, and issues of importance to the open internet. Since leaving the Daily Dot in March 2016, he has served as a reporter for Vocativ and a cybersecurity correspondent for BuzzFeed.