Risk
4/4/2013
08:52 AM
50%
50%

Exposed Website Reboots, Reveals Celeb Credit Reports

Personal data on U.S. Secret Service director, Anderson Cooper, George Clooney and other public figures released by Exposed website, famous for leaking data on Michelle Obama.

Anonymous: 10 Things We Have Learned In 2013
Anonymous: 10 Things We Have Learned In 2013
(click image for larger view and for slideshow)
The social security number, addresses, phone numbers and credit report for the first-ever female director of the Secret Service, Julia Pierson, have been leaked online, just one week after she was appointed to the post by President Obama.

The leak -- aka data dox -- was perpetrated by the Exposed website as part of its "Secret Files" campaign. Launched last month, the website has revealed information about numerous celebrities and political figures, including first lady Michelle Obama, Vice President Joe Biden, FBI director Robert Mueller, U.S. Attorney General Eric Holder and Los Angeles Police Department (LAPD) chief Charlie Beck. The Exposed website was viewed more than half a million times before apparently being knocked offline.

In the wake of that campaign, the FBI, Secret Service and Los Angeles Police Department all announced that they'd launched related investigations. By late March, meanwhile, the Exposed website was offline.

[ Should the government be doing more? No Bold Moves On U.S. Cybersecurity Framework. ]

As of Thursday, however, the site resurfaced, courtesy of a domain name shift from Exposed.su -- the top-level domain for the Soviet Union -- to Exposed.re, which is the top-level domain for the French Réunion island, located in the Indian Ocean off the coast of Madagascar. According to a website counter, as of Thursday morning Exposed.re had been viewed more than 770,000 times, and received over 120 Facebook "likes."

The site now includes personal information and credit reports for more than 40 people, including CIA director John Brennan, U.S. Marshalls director Stacia Hylton, former president George W. Bush, and Secret Service director Pierson. For Pierson, it has a TransUnion-labeled credit report detailing her credit cards, mortgages, student loans and car leases. Information for numerous celebrities, including George Clooney, Bill Gates, Robert De Niro, Lady Gaga, Arnold Schwarzenegger, Anderson Cooper and Oprah Winfrey has also been posted.

The new Exposed website also linked to two recent news reports that Paris Hilton and P. Diddy (aka Sean J Combs) had separately been "swatted," which refers to the illegal practice of sending a prank call to police and reporting a serious but fake crime, with the intent to have the police department dispatch police officers to the target's house.

Was the information published by Exposed used to perpetrate the swatting pranks? The Hilton swat reportedly led to the LAPD being dispatched to her home, and the Exposed site lists multiple addresses for her in the Los Angeles area. In the case of P. Diddy, meanwhile, TMZ reported that police responded to a report that someone had been shot inside his Los Angeles home. But the Exposed website only lists addresses for P. Diddy in Georgia, Florida and New York, hence the site doesn't appear to have been the source of his L.A. address.

Regardless, whoever is behind the Exposed site is apparently still able to access people's credit reports via AnnualCreditReport.com, which is a service used by 16 million people each year to obtain a free copy of their credit report. The three credit reporting agencies that maintain the site -- as they're required to do by federal law -- last month said their site was the source of the leaks of personally identifiable information (PII).

How exactly did the Exposed gang access the information? After Exposed first debuted just over three weeks ago, a spokesman for Equifax told Forbes that "our initial investigation shows the perpetrators had the PII of the individuals whose files were accessed and were therefore able to pass the required authentication measures in place."

Press contacts for Equifax, Experian and TransUnion didn't immediately respond to requests for comment -- emailed Thursday, before normal working hours -- about whether they were aware of the Exposed website relaunch, what security changes they put in place as a result of last month's doxing campaign, or why the Exposed gang was still able to inappropriately access people's credit records and other PII.

But whatever new authentication measures -- or security defenses -- the credit reporting agencies may have adopted in the wake of the first wave of Exposed doxing, they don't appear to be strong enough to keep attackers, pranksters or fraudsters at bay.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0986
Published: 2015-05-26
Multiple stack-based buffer overflows in Moxa VPort ActiveX SDK Plus before 2.8 allow remote attackers to insert assembly-code lines via vectors involving a regkey (1) set or (2) get command.

CVE-2015-3808
Published: 2015-05-26
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

CVE-2015-3809
Published: 2015-05-26
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not properly track the current offset, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

CVE-2015-3810
Published: 2015-05-26
epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.

CVE-2015-3811
Published: 2015-05-26
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-...

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.