In recent years , it ’s becomealarmingly routinefor law enforcement agencies to subpoena technical school platforms for user data — a practice that some critic see as an invasiveprivacy violation . Criminals are taking notation , and now they ’re doing it too .

security measures blogger Brian Krebsreportsthat hacker have been hijacking law enforcement electronic mail accounts and using them to pass on phony data demands to technical school party . The ploy has been working — and hoodwinked firms have been handing over treasure trove of exploiter data to crooks by accident .

Krebs details a recent incident in which cybercriminals took over the electronic mail account of an nameless constabulary enforcement agency . The hacker then used the account to submit a data postulation to chat platform Discord , asking for data on an 18 - year - older substance abuser from Indiana . Discord fall for it and forked over the data .

Article image

Photo: Frederic Genest / EyeEm (Getty Images)

“ This tactic poses a substantial threat across the technical school industry , ” a Discord example told Gizmodo .

Discord confirmed that the company had mistakenly provided datum to a “ malicious role player ” using a copper ’s compromise email account :

“ We can confirm that Discord received request from a lawful constabulary enforcement domain and comply with the petition in accord with our policy . We verify these requests by chink that they add up from a genuine source , and did so in this instance . While our check process confirmed that the law enforcement account itself was lawful , we later learn that it had been compromised by a malicious histrion . We have since conducted an investigation into this illegal activity and notified practice of law enforcement about the compromised email accounting . ”

Hp 2 In 1 Laptop

The mode that criminals have managed to get aside with this modern effort is by train vantage of a special sort of governing subpoena , foretell an Emergency Data Request , or EDR . Such subpoena are meant lodge in life or end scenario where entropy is needed like a shot and the wait of judicature commendation would lead to grave consequence . As such , EDRs do not require the distinctive inner review that companies are supposed to carry out with normal information requests . Mark Rasch , a former Justice Department prosecutor , state Krebsthat an EDR amounted to an “ emergency outgrowth , almost like you see on Law & Order , where they say they need certain data immediately ” and tech companies lean to dutifully respond .

Krebs reports that compromise cop email accounts are oftentimes put up for sale on the Dark Web . A hacker source secernate Krebs that it has become progressively typical for cybercriminals to use EDR requests to collar datum to commit “ haunt , hacking , harassing and publicly humiliating ” campaigns against their victims .

Daily Newsletter

Get the good technical school , skill , and culture news in your inbox day by day .

newsworthiness from the time to come , pitch to your present tense .

You May Also Like

Karate Kid Legends Review

Jblclip5

Ugreentracker

How To Watch French Open Live On A Free Channel

Argentina’s President Javier Milei (left) and Robert F. Kennedy Jr., holding a chainsaw in a photo posted to Kennedy’s X account on May 27. 2025.

William Duplessie

Starship Test 9

Hp 2 In 1 Laptop

Karate Kid Legends Review

Jblclip5

Ugreentracker

Roborock Saros Z70 Review

Polaroid Flip 09

Feno smart electric toothbrush

Govee Game Pixel Light 06