Hackers Got User Data from Meta with Forged Request

3D-printed images of the logos of Facebook and parent company Meta Platforms are seen on a laptop keyboard. (File photo: REUTERS/Dado Ruvic)
3D-printed images of the logos of Facebook and parent company Meta Platforms are seen on a laptop keyboard. (File photo: REUTERS/Dado Ruvic)
TT
20

Hackers Got User Data from Meta with Forged Request

3D-printed images of the logos of Facebook and parent company Meta Platforms are seen on a laptop keyboard. (File photo: REUTERS/Dado Ruvic)
3D-printed images of the logos of Facebook and parent company Meta Platforms are seen on a laptop keyboard. (File photo: REUTERS/Dado Ruvic)

Facebook owner Meta gave user information to hackers who pretended to be law enforcement officials last year, a company source said Wednesday, highlighting the risks of a measure used in urgent cases.

Imposters were able to get details like physical addresses or phone numbers in response to falsified "emergency data requests," which can slip past privacy barriers, said the source who requested anonymity due to the sensitivity of the matter, AFP said.

Criminal hackers have been compromising email accounts or websites tied to police or government and claiming they can't wait for a judge's order for information because it's an "urgent matter of life and death," cyber expert Brian Krebs wrote Tuesday.

Bloomberg news agency, which originally reported Meta being targeted, also reported that Apple had provided customer data in response to forged data requests.

Apple and Meta did not officially confirm the incidents, but provided statements citing their policies in handling information demands.

When US law enforcement officials want data on a social media account's owner or an associated cell phone number, they must submit an official court-ordered warrant or subpoena, Krebs wrote.

But in urgent cases authorities can make an "emergency data request," which "largely bypasses any official review and does not require the requestor to supply any court-approved documents," he added.

Meta, in a statement, said the firm reviews every data request for "legal sufficiency" and uses "advanced systems and processes" to validate law enforcement requests and detect abuse.

"We block known compromised accounts from making requests and work with law enforcement to respond to incidents involving suspected fraudulent requests, as we have done in this case," the statement added.

Apple noted its guidelines, which say that in the case of an emergency application "a supervisor for the government or law enforcement agent who submitted the... request may be contacted and asked to confirm to Apple that the emergency request was legitimate."

Krebs noted that the lack of a unitary, national system for these type of requests is one of the key problems associated with them, as companies end up deciding how to deal with them.

"To make matters more complicated, there are tens of thousands of police jurisdictions around the world — including roughly 18,000 in the United States alone — and all it takes for hackers to succeed is illicit access to a single police email account," he wrote.



Microsoft Server Hack Has Now Hit 400 Victims, Researchers Say

A view shows the Microsoft logo on the day of the Hannover Messe, one of the world's largest industrial trade fairs with this year's partner country being Canada, as both Canada and the European Union face new US tariffs, in Hanover, Germany, March 31, 2025. (Reuters)
A view shows the Microsoft logo on the day of the Hannover Messe, one of the world's largest industrial trade fairs with this year's partner country being Canada, as both Canada and the European Union face new US tariffs, in Hanover, Germany, March 31, 2025. (Reuters)
TT
20

Microsoft Server Hack Has Now Hit 400 Victims, Researchers Say

A view shows the Microsoft logo on the day of the Hannover Messe, one of the world's largest industrial trade fairs with this year's partner country being Canada, as both Canada and the European Union face new US tariffs, in Hanover, Germany, March 31, 2025. (Reuters)
A view shows the Microsoft logo on the day of the Hannover Messe, one of the world's largest industrial trade fairs with this year's partner country being Canada, as both Canada and the European Union face new US tariffs, in Hanover, Germany, March 31, 2025. (Reuters)

A sweeping cyber-espionage campaign organization centered on vulnerable versions of Microsoft's server software has now claimed about 400 victims, according to researchers at Netherlands-based Eye Security.

The figure, which is derived from a count of digital artifacts discovered during scans of servers running vulnerable versions of Microsoft's SharePoint software, compares to 100 organizations cataloged over the weekend. Eye Security says the figure is likely an undercount, Reuters reported.

"There are many more, because not all attack vectors have left artifacts that we could scan for," said Vaisha Bernard, the chief hacker for Eye Security, which was among the first organizations to flag the breaches, Reuters reported.

The spy campaign kicked off after Microsoft failed to fully patch a security hole in its SharePoint server software, kicking off a scramble to fix the vulnerability when it was discovered. Microsoft and its tech rival, Google owner Alphabet, have both said Chinese hackers are among those taking advantage of the flaw. Beijing has denied the claim.

The details of most of the victim organizations have not yet been fully disclosed. Bernard declined to identify them.