this post was submitted on 14 Aug 2025
42 points (100.0% liked)

Pulse of Truth

1471 readers
53 users here now

Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).

This community is automagically fed by an instance of Dittybopper.

founded 2 years ago
MODERATORS
 

Active police and government email accounts are being sold on the dark web for as little as $40, giving cybercriminals a direct line into systems and services that rely on institutional trust. According to new research from Abnormal AI, the accounts come from agencies in the United States, United Kingdom, Germany, India, and Brazil, and are being traded on underground forums. Source: Abnormal AI Unlike spoofed or dormant addresses, these accounts are functional and still … More → The post For $40, you can buy stolen police and government email accounts appeared first on Help Net Security.

you are viewing a single comment's thread
view the rest of the comments
[–] IllNess@infosec.pub 2 points 6 hours ago (3 children)

Don't use Tor. If the FBI found ways to break it before, assume it could have other vulnerabilities to do it again.

[–] PhilipTheBucket@piefed.social 2 points 6 hours ago (2 children)

When did they break Tor? Are you sure they didn't just exploit vulnerabilities on an onion site that was hosted on Tor or something?

[–] IllNess@infosec.pub 1 points 3 hours ago (1 children)

https://www.forbes.com/sites/kashmirhill/2014/11/07/how-did-law-enforcement-break-tor/

FBI kept information to themselves of how they did it and this isn't the first time.

Also I wouldn't trust accessing a site administered by the government on Tor if onion sites can't keep me anonymous.

[–] PhilipTheBucket@piefed.social 1 points 3 hours ago* (last edited 3 hours ago)

I dunno dude. I'll take "there are some research papers about theoretical attacks, speculation that similar techniques were used by law enforcement when after great effort they were able to take down a bunch of sites that were literally some of their highest priorities at the time because they were openly and flagrantly committing felonies in the open for years, and some vulnerabilities fixed in 2014 that might have been related" over "they would have to send a subpoena" any day.