Risk
4/4/2013
08:52 AM
50%
50%

Exposed Website Reboots, Reveals Celeb Credit Reports

Personal data on U.S. Secret Service director, Anderson Cooper, George Clooney and other public figures released by Exposed website, famous for leaking data on Michelle Obama.

Anonymous: 10 Things We Have Learned In 2013
Anonymous: 10 Things We Have Learned In 2013
(click image for larger view and for slideshow)
The social security number, addresses, phone numbers and credit report for the first-ever female director of the Secret Service, Julia Pierson, have been leaked online, just one week after she was appointed to the post by President Obama.

The leak -- aka data dox -- was perpetrated by the Exposed website as part of its "Secret Files" campaign. Launched last month, the website has revealed information about numerous celebrities and political figures, including first lady Michelle Obama, Vice President Joe Biden, FBI director Robert Mueller, U.S. Attorney General Eric Holder and Los Angeles Police Department (LAPD) chief Charlie Beck. The Exposed website was viewed more than half a million times before apparently being knocked offline.

In the wake of that campaign, the FBI, Secret Service and Los Angeles Police Department all announced that they'd launched related investigations. By late March, meanwhile, the Exposed website was offline.

[ Should the government be doing more? No Bold Moves On U.S. Cybersecurity Framework. ]

As of Thursday, however, the site resurfaced, courtesy of a domain name shift from Exposed.su -- the top-level domain for the Soviet Union -- to Exposed.re, which is the top-level domain for the French Réunion island, located in the Indian Ocean off the coast of Madagascar. According to a website counter, as of Thursday morning Exposed.re had been viewed more than 770,000 times, and received over 120 Facebook "likes."

The site now includes personal information and credit reports for more than 40 people, including CIA director John Brennan, U.S. Marshalls director Stacia Hylton, former president George W. Bush, and Secret Service director Pierson. For Pierson, it has a TransUnion-labeled credit report detailing her credit cards, mortgages, student loans and car leases. Information for numerous celebrities, including George Clooney, Bill Gates, Robert De Niro, Lady Gaga, Arnold Schwarzenegger, Anderson Cooper and Oprah Winfrey has also been posted.

The new Exposed website also linked to two recent news reports that Paris Hilton and P. Diddy (aka Sean J Combs) had separately been "swatted," which refers to the illegal practice of sending a prank call to police and reporting a serious but fake crime, with the intent to have the police department dispatch police officers to the target's house.

Was the information published by Exposed used to perpetrate the swatting pranks? The Hilton swat reportedly led to the LAPD being dispatched to her home, and the Exposed site lists multiple addresses for her in the Los Angeles area. In the case of P. Diddy, meanwhile, TMZ reported that police responded to a report that someone had been shot inside his Los Angeles home. But the Exposed website only lists addresses for P. Diddy in Georgia, Florida and New York, hence the site doesn't appear to have been the source of his L.A. address.

Regardless, whoever is behind the Exposed site is apparently still able to access people's credit reports via AnnualCreditReport.com, which is a service used by 16 million people each year to obtain a free copy of their credit report. The three credit reporting agencies that maintain the site -- as they're required to do by federal law -- last month said their site was the source of the leaks of personally identifiable information (PII).

How exactly did the Exposed gang access the information? After Exposed first debuted just over three weeks ago, a spokesman for Equifax told Forbes that "our initial investigation shows the perpetrators had the PII of the individuals whose files were accessed and were therefore able to pass the required authentication measures in place."

Press contacts for Equifax, Experian and TransUnion didn't immediately respond to requests for comment -- emailed Thursday, before normal working hours -- about whether they were aware of the Exposed website relaunch, what security changes they put in place as a result of last month's doxing campaign, or why the Exposed gang was still able to inappropriately access people's credit records and other PII.

But whatever new authentication measures -- or security defenses -- the credit reporting agencies may have adopted in the wake of the first wave of Exposed doxing, they don't appear to be strong enough to keep attackers, pranksters or fraudsters at bay.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4632
Published: 2015-01-31
VMware vSphere Data Protection (VDP) 5.1, 5.5 before 5.5.9, and 5.8 before 5.8.1 does not properly verify X.509 certificates from vCenter Server SSL servers, which allows man-in-the-middle attackers to spoof servers, and bypass intended backup and restore access restrictions, via a crafted certifica...

CVE-2014-7287
Published: 2015-01-31
The key-management component in Symantec PGP Universal Server and Encryption Management Server before 3.3.2 MP7 allows remote attackers to trigger unintended content in outbound e-mail messages via a crafted key UID value in an inbound e-mail message, as demonstrated by the outbound Subject header.

CVE-2014-7288
Published: 2015-01-31
Symantec PGP Universal Server and Encryption Management Server before 3.3.2 MP7 allow remote authenticated administrators to execute arbitrary shell commands via a crafted command line in a database-backup restore action.

CVE-2014-8266
Published: 2015-01-31
Multiple cross-site scripting (XSS) vulnerabilities in the note-creation page in QPR Portal 2014.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) title or (2) body field.

CVE-2014-8267
Published: 2015-01-31
Cross-site scripting (XSS) vulnerability in QPR Portal 2014.1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the RID parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.