DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

A puzzling private industry notification from the FBI (UPDATED)

Posted on March 30, 2017 by Dissent

Update of March 31: Tonight, Justin Shafer contacted this site to report that the FBI was raiding him again – for the third time – and this time, they had an arrest warrant for him. DataBreaches.net is waiting to get additional details and will post something when we know more.

Original post:

On March 22, the FBI issued a Private Industry Notification that this blogger found somewhat surprising, to say the least. In PIN Number 170322-001, they write that they are

aware of criminal actors who are actively targeting File Transfer Protocol (FTP) servers operating in “anonymous” mode and associated with medical and dental facilities to access protected health information (PHI) and personally identifiable information (PII) in order to intimidate, harass, and blackmail business owners. (emphasis added by DataBreaches.net)1

What case(s) or investigation is this stemming from, though? My first thought was that the FBI might be believing accusations by some covered entities who may have felt embarrassed after Justin Shafer exposed the fact that they were  leaking PII and PHI on “anonymous” FTP servers. At least one of those covered entities allegedly tried to get Shafer charged with hacking under the federal hacking statute (CFAA), and it’s still not clear whether Shafer will actually be charged by federal prosecutors. The FBI raided Shafer in May, 2016,  and then again in January of this year.

But the PIN says that the purpose of accessing the publicly exposed data is to “intimidate, harass, and blackmail business owners.” Is there any evidence Shafer ever did any of those things? Is there any evidence anyone ever did any of those things? The PIN does not provide any specific examples or cases at all. If this is such a significant problem that the FBI wants the private sector to take action to secure these FTP servers, how is it that they provided not even one example?

Could It Be Shafer?

DataBreaches.net knows, from experience, that if Shafer believes an entity should be disclosing or reporting a leak, he will continue to contact the entity to pressure them to do so – and/or he will file a formal complaint with HHS/OCR about the leak and the entity. But that is all likely protected speech and not criminal behavior. To this site’s knowledge, Shafer has never attempted to harass or blackmail any of the entities whose PHI he found exposed, although if they are on the receiving end of phone calls or numerous emails from him, they might feel harassed.

But blackmail? Truly criminal conduct? Shafer? That doesn’t sound plausible based on his history, although it might explain why during the second FBI raid, the agents were looking for bank accounts and credit cards. Could they really suspect him of blackmail?

Could It Be TheDarkOverlord?

The second FBI raid, which I had reported here, continues to be a head-scratcher, unless you know about a very peculiar convo TheDarkOverlord had with Shafer in private messages on Twitter. On February 6, TheDarkOverlord (TDO) contacted Shafer. It was  approximately one week after the raid and this site’s published post about the raid. In that conversation, TheDarkOverlord (TDO) made some bizarre statements to Shafer, including:

We understand your frustrations, Justin. Perhaps the FBI raided you because you’ve divulged intelligence to us?

Shafer (understandably) responded:

?

Somewhat later in the convo, TDO made a surprising admission or claim:

We’ve had a lot of fun with Dentrix lately, mate.

and

You’ve been a great help to us, Justin. We owe you some internet money.

What help would that be? Disclosing the fact that Dentrix used hard-coded credentials and wasn’t as secure as their advertising had claimed? Is that how Shafer allegedly helped them?

Was TDO trying to set Shafer up? It certainly sounded possible, as later in the convo, there was also this exchange:

TDO: What did you do with those coins we sent you before?
JS: I have no idea what you are refer ing to
TDO: We cut you in, remember?
JS: nope
TDO: Oh, right! Shhhh

At other points, TDO made comments like:

They’re onto our collaboration, perhaps?

[…]

We all know you’re passing us leads, mate.

[…]

Say Justin, do you think the FBI thinks you’re working with us?

From the writing style, the individual sending those messages is not the same individual who had posted as TDO’s spokesperson in the past. This individual appeared to be either trolling Shafer, trying to frame him, or phishing to find out if Shafer had had any relationship with the former TDO spokesperson. Whatever the explanation, the comments and questions might hurt Shafer if the FBI has been monitoring his private communications and if the FBI were to believe TDO’s claims in that convo.

But given TDO’s claims that they had been exploiting Dentrix installations and had been busy “showing Dentrix whose boss,” (sic), could the FBI be investigating TDO for acquiring PII/PHI from public FTP servers and using it to harass, intimidate, or blackmail business owners? A blackmail claim would certainly more consistent with TDO’s MO than with anything Shafer has ever been known to do.

To be clear: DataBreaches.net has no knowledge that TDO or its former spokesperson have been engaged in helping themselves to data from “anonymous” FTP servers. Nor does this site have any knowledge as to whether TDO has really been attacking Dentrix installations. But if the PIN is based on sound investigation, some criminal activity has occurred or is occurring, and if it’s not Shafer who’s engaging in attempted blackmail, then who is?

In any event, the FBI’s advice is good advice – review your servers and configurations to ensure that you are not making PII/PHI available on “anonymous” FTP servers.

——–
1 While PINS are not to be distributed or cited publicly, because this PIN was posted in its entirety publicly in a few places, and reported on and discussed by others, it seems appropriate to comment on it here, too.


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Some lower-tier ransomware gangs have formed a new RaaS alliance -- or have they? (1)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
  • Uncovering Qilin attack methods exposed through multiple cases
Category: Commentaries and AnalysesOf Note

Post navigation

← ShowTix4U Security Breach Notification
Lucchese Computer Hacker Pleads Guilty →

1 thought on “A puzzling private industry notification from the FBI (UPDATED)”

  1. ___J___ says:
    May 6, 2017 at 4:01 pm

    Oh, right! Shhhh?

    They must be kidding. I hope we aren’t paying this informant the usual six figure fee plus get out of jail/deportation free card.

    He is so bad it’s embarrassing.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.