FBI issues alert over hackers posing as law enforcement to steal private information

An FBI agent typing on a computer
(Image credit: Shutterstock)

The FBI has put out a warning that cybercriminals are pretending to be law enforcement (and other U.S. officials) to send out fraudulent "emergency data requests" (EDR). An EDR is a legal way for police and other agencies to obtain information from companies in "emergency" situations without a warrant or a subpoena.

An EDR is supposed to be used in life-or-death moments, but apparently, hackers are using them to get around company safeguards and obtain sensitive data quickly.

In the FBI's Private Industry Notification, the Bureau explained that there has been an uptick in fraudulent requests. "While the concept of fraudulent emergency data requests was previously used by other threat actors, such as Lapsus$, the increase in postings on criminal forums regarding the process of emergency data requests and sale of compromised credentials has led to an increase of their use."

The threat actor, Lapsus$, was an extortion group that apparently pioneered using EDR to gain information. 

According to the alert, the requests started seeing an update in August of this year, when a known cybercriminal on an online forum posted their sale of "High-Quality .gov emails for espionage/social engineering/data extortion/Dada requests, etc," which included US credentials. The poster indicated they could guide a buyer through EDRs and sell real stolen subpoena documents to pose as a law officer.

The notice does mention other crimes including some hackers who procured compromised government emails across 25 countries and "boasted" about being able to gain piles of private information.

The problem is that the hackers are targeting companies, something we as buyers don't have control over. The FBI did put out a list of "mitigations" that companies can use to reduce hacker harm, and if you work in a company that deals with sensitive data, perhaps those mitigations will be of use to you.

These include double checking the security posture of connections between third parties as they interact with systems, including external and remote connections. They also suggest being wary of EDRs that highlight the urgency of the request and to check the details for inconsistencies or doctoring. See the entire mitigation list starting on page 3 of this document for more recommendations.

How to stay safe

As with many data breaches and fraudulent activities, we are putting some amount of blind faith in the affected to companies to protect our data. This means that we need to be vigilant when we see reports of data breaches and hacked companies. You'll also want to pay attention to your mail box in case the company sends you a physical notice of a breach. 

If your personal or financial data was exposed, you'll want to carefully monitor all of your financial accounts for signs of fraud. If your Social Security number was lifted too, fraudsters can use it to sign up for loans, apply for jobs or commit more crimes in your name. It is one of the many reasons that identify theft is scary and quite difficult to recover from.

Additionally, you will want to pay attention to your inbox, messages and social accounts as hackers can use your information to pry more out of you. Watch out for emails from unknown senders or with blank subject lines. If something looks suspicious or tries to get you to act with urgency, don't respond or click any links or download attachments these emails might contain. It's best just to delete it.

More from Tom's Guide

Scott Younker
West Coast Reporter

Scott Younker is the West Coast Reporter at Tom’s Guide. He covers all the lastest tech news. He’s been involved in tech since 2011 at various outlets and is on an ongoing hunt to build the easiest to use home media system. When not writing about the latest devices, you are more than welcome to discuss board games or disc golf with him. 

Read more
A hacker typing on a computer
FBI issues serious warning to iPhone and Android users — stop doing this ASAP
An FBI agent typing on a computer
FBI issues warning to millions of Americans to avoid these websites that can steal your passwords and banking info
An open lock depicting a data breach
3.5 million hit in major law firm data breach — full names, SSNs, dates of birth, addresses and more exposed
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
A person typing on a computer while hackers use phishing to steal a file from their computer
Phishing: What is it, and how to avoid it
A person sat at a computer and a tablet, coding
What is social engineering and how to avoid becoming a victim
Latest in Online Security
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
A man filing his taxes electronically on a laptop
AI-powered tax scams are here - how to stay safe from deepfakes, phishing and more this tax season
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Latest in News
Apple Watch Series 10
Future Apple Watch models could get a surprising new feature — what we know
NYTimes Connections
NYT Connections today hints and answers — Monday, March 24 (#652)
NYT Strands on a cellphone
NYT Strands today — hints, spangram and answers for game #386 (Monday, March 24 2025)
iPhone 16 Pro vs iPhone 16 Pro Max in hand showing displays
Forget iPhone 17 — iPhone 18 could get this huge upgrade
The new Husqvarna iQ series robot lawn mower.
Husqvarna’s new robot mowers offer GPS for less
Rendered images of rumored foldable iPhone.
Foldable iPhone report just revealed key details — here's what we know