Hacker CyberZeist claims to have hacked the FBI

A hacker using the handle @cyberzeist claiming to have hacked the content management system (CMS) of the official website of Federal Bureau of Investigation (FBI), the mainstream investigation agency of the United States.For the second time, a hacker known as CyberZeist has breached the FBI’s website and leaked personal account information to a public site.

On December 22, 2016, CyberZeist, also known as Le4ky, exploited a zero-day vulnerability in the Plone Content Management System (CMS) of the FBI’s website, and leaked some of the information to Pastebin, an open source site that is often used by hackers to post stolen information and bits of code.

FBI latest hack, hacking news

FBI had zero days to respond to the attack as it was a zero-day exploit.CyberZeist was able to find a vulnerability in the Plone CMS, which is considered to be the most secure CMS among security experts. It is worth nothing that Plone CMS is Open Source software that facilitates Content Management. The FBI uses this software for hosting its official website.

To prove that he actually hacked into the CMS of FBI’s website and leaked the data online, CyberZeist posted various screenshots on Twitter.

zero-day vulnerability in the Plone Content Management System (CMS) of the FBI’s website


zero day attack against PHP applications

The Plone Security Team believes that these claims are a hoax. As Plone is open source software, it is easy to fake a screenshot showing Plone’s code. Causing source code to be leaked to the end user is a common form of attack against PHP applications, but as Python applications don’t use the cgi-bin model of execution it has never been a marker of an attack against a Python site.

The firm also stated that its security team is aware of a recent claim and has thoroughly examined it and determining that it is a hoax since there is no zero-day flaw in Plone nor in Plone-based distributions.

“The hashes [the ‘hacker’] claims to have released have several warning signs that point to them being fake. Firstly, the email addresses used match other FBI emails that have been harvested over the years that are publicly available. The password hashes and salts he claims to have found are not consistent with values generated by Plone, indicating they were bulk generated elsewhere.”

Share This:

Leave a Reply

Your email address will not be published. Required fields are marked *