Illustration by Alex Castro / The Verge
Apple and Meta handed over user data to hackers who faked emergency data request orders typically sent by law enforcement, according to a report by Bloomberg. The slip-up happened in mid-2021, with both companies falling for the phony requests and providing information about usersā IP addresses, phone numbers, and home addresses.
Law enforcement officials often request data from social platforms in connection with criminal investigations, allowing them to obtain information about the owner of a specific online account. While these requests require a subpoena or search warrant signed by a judge, emergency data requests donāt ā and are intended for cases that involve life-threatening situations.
Fake emergency data requests are becoming increasingly common, as explained in a recent report from Krebs on Security. During an attack, hackers must first gain access to a police departmentās email systems. The hackers can then forge an emergency data request that describes the potential danger of not having the requested data sent over right away, all while assuming the identity of a law enforcement official. According to Krebs, some hackers are selling access to government emails online, specifically with the purpose of targeting social platforms with fake emergency data requests.
As Krebs notes, the majority of bad actors carrying out these fake requests are actually teenagers ā and according to Bloomberg, cybersecurity researchers believe the teen mastermind behind the Lapsus$ hacking group could be involved in conducting this type of scam. London police have since arrested seven teens in connection with the group.
But last yearās string of attacks may have been performed by the members of a cybercriminal group called Recursion Team. Although the group has disbanded, some of them have joined Lapsus$ with different names. Officials involved in the investigation told Bloomberg that hackers accessed the accounts of law enforcement agencies in multiple countries and targeted many companies over the course of several months starting in January 2021.
āWe review every data request for legal sufficiency and use advanced systems and processes to validate law enforcement requests and detect abuse,ā Andy Stone, Metaās policy and communications director, said in an emailed statement to The Verge. āWe block known compromised accounts from making requests and work with law enforcement to respond to incidents involving suspected fraudulent requests, as we have done in this case.ā
When asked for comment, Apple directed The Verge to its law enforcement guidelines, which state: āIf a government or law enforcement agency seeks customer data in response to an Emergency Government & Law Enforcement Information Request, a supervisor for the government or law enforcement agent who submitted the Emergency Government & Law Enforcement Information Request may be contacted and asked to confirm to Apple that the emergency request was legitimate.ā
Meta and Apple arenāt the only known companies affected by fake emergency data requests. Bloomberg says hackers also contacted Snap with a forged request, but itās not clear if the company followed through. Krebs on Securityās report also includes a confirmation from Discord that the platform gave away information in response to one of these fake requests. Snap and Discord didnāt immediately respond to requests for comment from The Verge.