
How Hackers Tricked Tech Giants by Impersonating Law Enforcement
A sophisticated cybercrime operation has exposed a critical vulnerability in the very system designed to help law enforcement access data for emergencies. By compromising official government email accounts, hackers successfully impersonated police officers to submit fraudulent data requests, tricking major tech companies into handing over sensitive user information.
This scheme targeted the Law Enforcement Request System (LERS), a portal used by companies like Google to manage and respond to official demands for user data. While the tech companies’ own servers were not breached directly, the incident reveals a dangerous weakness in the chain of trust between Silicon Valley and government agencies.
Understanding the Law Enforcement Request System
When a government or law enforcement agency needs user data for an investigation—such as emails, location history, IP addresses, or contact information—they submit an official request through a dedicated portal. These systems are built to streamline a legal process that typically requires a subpoena or search warrant signed by a judge.
However, there is a critical exception for emergencies. Emergency Data Requests (EDRs) are designed to bypass the usual legal process in situations involving imminent danger, such as a kidnapping, bomb threat, or active shooter event. In these cases, tech companies can provide data immediately based on a good-faith belief that the request is legitimate and necessary to prevent harm. It is this high-stakes, trust-based system that criminals have learned to exploit.
The Anatomy of the Attack: Exploiting Trust
The cybercriminals behind these attacks did not need to hack into fortified corporate networks. Instead, they targeted a much softer link in the security chain: the email accounts of law enforcement officials around the world.
The process was deceptively simple:
- Compromise an Official Account: Hackers first gained access to a legitimate police or government email account, likely through phishing attacks or by purchasing stolen credentials on the dark web.
- Submit a Fraudulent EDR: Using the compromised account, the criminals logged into the official LERS portal and submitted a fake Emergency Data Request.
- Fabricate an Emergency: The fraudulent requests were carefully crafted to appear authentic, often citing a fabricated life-or-death scenario and including forged signatures of supervising officers.
- Receive the Data: Believing the request was a legitimate emergency from a verified law enforcement source, the tech company would comply and release the requested user data directly to the hacker-controlled account.
The core of this breach lies not in a technical flaw, but in the manipulation of a system built on trust. The tech companies were responding to requests that, on the surface, came from authenticated, official sources.
The Real-World Consequences for Victims
The data obtained through these fraudulent requests was not used for idle curiosity. Criminals have weaponized this sensitive information for a range of malicious activities, including:
- Financial Harassment: Using personal details to access financial accounts or to extort victims.
- Doxing: Publishing a person’s private information online with malicious intent, leading to severe harassment and threats.
- SWATing: Making false emergency reports to law enforcement, causing heavily armed police teams to be dispatched to a victim’s home.
This scheme turns a user’s private data into a tool for intimidation and real-world harm, all by subverting a process meant to ensure public safety.
How to Protect Your Digital Footprint
While this specific breach exploited weaknesses in government systems, it serves as a powerful reminder of the importance of personal data security. Individuals can take several steps to minimize their exposure and protect their accounts from unauthorized access.
- Enable Multi-Factor Authentication (MFA): This is the single most effective step you can take. MFA requires a second form of verification (like a code from your phone) in addition to your password, making it exponentially harder for criminals to access your accounts even if they steal your password.
- Use Strong, Unique Passwords: Avoid reusing passwords across different services. Use a password manager to generate and store complex, unique passwords for every account.
- Be Vigilant Against Phishing: This entire attack chain often begins with a successful phishing email. Learn to recognize the signs of phishing—suspicious links, urgent requests for information, and poor grammar—and never click on links or download attachments from unverified senders.
- Review Your Account Privacy Settings: Regularly check the privacy and security settings on your key accounts (like Google, Apple, and social media). Limit the amount of personal information you share publicly and review which third-party apps have access to your data.
This incident is a stark wake-up call, highlighting the need for enhanced security verification not just for users, but for the government agencies entrusted with accessing our data. For now, proactive personal security remains the best defense against a constantly evolving landscape of digital threats.
Source: https://securityaffairs.com/182266/security/cybercrime-group-accessed-google-law-enforcement-request-system-lers.html


