Share this article on:
Powered by MOMENTUMMEDIA
Breaking news and updates daily.
The FBI has declined to comment after alleged IP addresses and physical server locations were posted to a clear web hacking forum.
A member of a popular clear web hacking forum has posted the alleged details of nine FBI.gov servers, complete with hosting ISP, IP addresses, and even what appear to be links to network login pages.
A user by the name of un3xpectedbandit made the post – headed “FBI.GOV backends/IPS/VMS” – on 30 June, with the details showing up on tracking platform Falcon Feeds not long after.
“The threat actor claims to have leaked information on several servers associated with the FBI’s back-end systems, including their IPs, server locations, organisations, and operating systems. The list includes servers located in various countries such as Turkey, Iceland, United States, Australia, Netherlands, Russia, etc.,” Falcon Feeds’ summary of the post said.
“These servers are reported to be running on various platforms like Nginx, Cloudflare, and OpenResty, with some specific details on their configurations and headers provided.”
The names of various hosting services do match the country the server is claimed to be hosted in, and the post lists nine discrete servers – though one appears to have been moved, and another belongs to what appears to be a seized domain owned by a fraudulent scam recovery company.
The details were posted for free, with several posters responding that they did not consider the post to be a smart move.
“You are getting swatted for this one,” said one user before declaring, “I’m saying personally I don’t f**k with FBI”.
A spokesperson for the FBI’s National Press Office told Cyber Daily that the agency declined to comment on the post and its claims.
The poster has previously commented on threads regarding source code for custom ransomware builders and bypassing know-your-customer verification on several crypto-trading platforms.
David Hollingworth has been writing about technology for over 20 years, and has worked for a range of print and online titles in his career. He is enjoying getting to grips with cyber security, especially when it lets him talk about Lego.
Be the first to hear the latest developments in the cyber industry.