Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People’s Private Data


When a privacy specialist at the legal response operations center of Charter Communications received an emergency data request via email on September 4 from Officer Jason Corse of the Jacksonville Sheriff’s Office, it took her just minutes to respond, with the name, home address, phone numbers, and email address of the “target.”

But the email had not in fact come from Corse or anyone else at the Jacksonville Sheriff’s Office. It was sent by a member of a hacking group that provides doxing-as-a-service to customers willing to pay for highly sensitive personal data held by tech companies in the United States.

“This took all of 20 minutes,” Exempt, a member of the group that carried out the ploy, told WIRED. He claims that his group has been successful in extracting similar information from virtually every major US tech company, including Apple and Amazon, as well as more fringe platforms like video-sharing site Rumble, which is popular with far-right influencers.

Exempt shared the information Charter Communications sent to the group with WIRED, and explained that the victim was a “gamer” from New York. When asked if he worried about how the information he obtained was used against the target, Exempt said: “I usually do not care.”

The victim did not respond to WIRED’s requests for comment.

“It is definitely concerning to hear criminals impersonating officers in such a manner, more so when they are claiming to be one of our employees,” says Christian Hancock, the media relations manager at the Jacksonville Sheriff’s Office. Officer Corse declined to comment.

Charter Communications declined to comment.

This method of tricking companies into handing over information that can be used to harass, threaten, and intimidate victims has been known about for years. But WIRED has gained unprecedented insight into how one of these doxing groups operates, and why, despite years of warnings, it is still happening so often.

The Charter Communications incident was one of up to 500 successful requests Exempt claims to have made in recent years. To back up his claims, the hacker shared multiple documents and recordings with WIRED, including what he claimed were screenshots of email requests, fake subpoenas, responses from tech companies, and even a video recording of a phone call with one company’s law enforcement response team, which was seeking to verify a request. Exempt also shared evidence suggesting that a current law enforcement officer (Exempt refused to provide the officer’s location or name) was in contact with the group about allegedly working with them to submit requests from his own account in return for a cut of the profits.



Source link

  • Related Posts

    Honor says its 4.8mm thick MagicPad 4 is the world’s slimmest Android tablet

    Ahead of a full release at Mobile World Conference (MWC), Honor has teased the MagicPad 4 that it calls the world’s thinnest Android tablet. The new model is just 4.8mm…

    Now is a good time for doing crime

    You have to remember, this was before all of us lived with a constant rain of text messages and emails designed to elicit the information necessary to pull something like…

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    You Missed

    How Trump’s Economic Pitch at the State of the Union Echoes Biden’s

    Honor says its 4.8mm thick MagicPad 4 is the world’s slimmest Android tablet

    Honor says its 4.8mm thick MagicPad 4 is the world’s slimmest Android tablet

    13 Chic Wedding Hairstyles Experts Predict Will Define 2026

    13 Chic Wedding Hairstyles Experts Predict Will Define 2026

    Trump plans to take his State of the Union message on the road – eventually

    Trump plans to take his State of the Union message on the road – eventually

    La Mancha Investments S. à r. l. to File Early Warning Report

    John Cleese says he’s now avoiding B.C. because of crackdown on gender ideology criticism