What happened with the FBI email infrastructure compromise in November 2021?
Summary
What email marketers say6Marketer opinions
Email marketer from KrebsOnSecurity explains that a poorly coded script on the FBI's Law Enforcement Enterprise Portal (LEEP) allowed someone to send out tens of thousands of fake emails. The attacker exploited a feature that allowed users to request an email with a one-time password, manipulating it to send out spam emails.
Marketer from Email Geeks shares that the FBI email infrastructure has been compromised and is being used to send fake emails about fake cyberattacks to system admins. These emails are being sent to addresses scraped from the ARIN database and causing disruption because the headers are real.
Email marketer from Reddit describes that the emails contained a warning about a sophisticated chain attack and mentioned a threat actor named Vinny Troia. The message urged recipients to check their systems and IDS monitoring.
Marketer from Email Geeks confirms receiving the fake FBI email at an address registered with ARIN and points to a Reddit thread discussing the issue.
Email marketer from Reddit shares that the emails appeared to be coming from a legitimate FBI email address (@ic.fbi.gov). Many system administrators and IT professionals received these emails, raising concerns about a potential breach.
Email marketer from Twitter explains that the email addresses targeted in the FBI email hoax appeared to have been scraped from the ARIN database. This suggested a targeted approach, focusing on individuals likely involved in network administration and security.
What the experts say2Expert opinions
Expert from Word to the Wise highlights that the FBI email incident demonstrated the potential damage from even relatively simple exploits, leading to widespread confusion and distrust. It also emphasizes the importance of securing web forms and email infrastructure.
Expert from Word to the Wise explains that the FBI email incident involved a flaw in a web form that allowed unauthenticated users to send emails via FBI servers. This flaw was exploited to send out hoax emails.
What the documentation says3Technical articles
Documentation from CISA confirms that the FBI and CISA were aware of the incident involving fake emails originating from an FBI-operated email server. They stated that the compromised system was taken offline quickly to remediate the issue.
Documentation from CERT notes the vulnerability that lead to the compromise was the result of using older CGI scripts on modern systems. This caused a weakness in the user authentication flow.
Documentation from FBI confirms that an actor was able to leverage a software misconfiguration in an FBI system to send these emails. Although the impacted system was offline quickly after detection, the ramifications were still large.