FBI Warns U.S. Organizations of Fake Emergency Data Requests by Cybercriminals
FBI Warns U.S. Organizations of Fake Emergency Data Requests by Cybercriminals
In a rather interesting development, the FBI has issued an urgent warning to U.S. organizations about a growing tactic in cybercrime: fake emergency data requests (EDRs). Cybercriminals are increasingly posing as law enforcement to exploit this loophole, using fraudulent EDRs to harvest sensitive personal data from American companies. As these attacks gain traction, organizations must be vigilant to protect the privacy of their customers and guard against data breaches.
Table of Contents
What Are Emergency Data Requests, and Why Are They Dangerous?
Emergency data requests allow law enforcement agencies to quickly request information from service providers in urgent situations without a formal subpoena. Designed for life-or-death scenarios, EDRs bypass the usual legal processes to enable fast information access. However, cybercriminals have found a way to abuse this system by forging emergency requests, taking advantage of compromised email accounts from government agencies to make their schemes look legitimate.
The FBI’s alert revealed that threat actors, including prominent groups like Lapsus$, are increasingly using fake EDRs to gather personally identifiable information (PII) from major companies, aiming to use this data for a variety of criminal purposes, from identity theft to extortion. With phishing and social engineering tactics, cybercriminals gain access to official government or law enforcement email accounts. Using these accounts, they issue fraudulent EDRs to U.S.-based companies, which often release sensitive customer information under the assumption of a legitimate emergency.
The Role of Cybercrime Forums in Amplifying the Threat
Cybercriminal forums have become breeding grounds for knowledge-sharing around this method. The FBI notes that in recent months, forum posts have surged detailing how to exploit EDRs. For example, one cybercriminal recently advertised .gov email addresses for sale, boasting that these credentials could be used for espionage, social engineering, or issuing fraudulent data requests.
The trend escalated further in early 2024, when one threat actor on a forum claimed to possess government email addresses from 25 countries, with plans to use them in fake EDRs for obtaining sensitive information like usernames, phone numbers, and emails. Another cybercriminal claimed they attempted to exploit PayPal with a fraudulent data request under a Mutual Legal Assistance Treaty (MLAT). Although PayPal ultimately detected and denied the request, these attempts highlight the serious risk to organizations that manage large volumes of customer data.
Why Fake Emergency Data Requests Are Difficult to Detect
Cybercriminals rely on the urgent nature of EDRs to expedite their success. Often, companies—especially those with limited resources or cybersecurity experience—may not scrutinize an emergency request as carefully as a standard subpoena due to the assumed urgency. By manipulating the sense of immediacy, criminals exploit a shortcut in the verification process.
To make their fraudulent requests more believable, these threat actors often use sophisticated social engineering techniques. They may add doctored signatures, authentic-looking logos, or plausible legal references to make their requests appear legitimate. The FBI warns organizations to examine any discrepancies in these requests, such as inconsistencies in logos or unusual legal codes that don’t match those typically used by the purported authority.
Steps Organizations Can Take to Protect Against Fake Emergency Data Requests
With the FBI sounding the alarm on this rising threat, it’s critical for companies to adopt proactive measures to defend against fake EDRs and similar social engineering tactics. Here are key recommendations for protecting your organization and its data:
- Strengthen Communication Channels with the FBI: Organizations that frequently receive EDRs should build and maintain strong relationships with FBI representatives. Working closely with federal authorities can ensure faster detection and response to suspicious requests.
- Review and Enhance Incident Response Plans: Update incident response procedures to include checks specifically for verifying the authenticity of EDRs. This process should involve multiple layers of review and clear protocols for flagging potentially fraudulent requests.
- Educate Staff on Social Engineering Risks: Training personnel on identifying red flags, such as altered images, signatures, or unusual legal references, is critical. Staff should be empowered to question the legitimacy of any request that raises concerns, especially under high-pressure conditions.
- Implement Security Best Practices:
- MFA and Strong Password Protocols: Requiring multi-factor authentication (MFA) and robust password management reduces the chances of unauthorized access.
- Time-Based Access for Administrator Accounts: Restrict administrative access to set time periods, limiting the window for potential misuse.
- Regular Security Assessments: Perform routine assessments on user accounts and domain controllers to catch any signs of compromise or unauthorized access.
- Limit Remote Access and Segment Networks: Control access to sensitive data through remote services and network segmentation. Compartmentalizing data access reduces exposure in case of a breach.
- Vulnerability Management: Consistently update and patch systems to mitigate vulnerabilities that cybercriminals might exploit.
- Verify Emergency Data Requests with Extra Care: Always cross-reference legal codes in EDRs to confirm they match the originating authority. Review any attached images for signs of tampering or discrepancies that might indicate fraud. Taking a few extra moments to verify the request can prevent serious data breaches.
As cybercriminals become more adept at manipulating legitimate processes, organizations must remain vigilant. The FBI’s latest warning serves as a reminder that cybercrime is evolving in sophistication, and proactive defenses are essential. By implementing strict verification practices, maintaining close relationships with law enforcement, and investing in cybersecurity training, organizations can reduce the risk of falling victim to these scams.
The surge in fake emergency data requests underscores the need for companies to continually adapt to the evolving landscape of cyber threats. Although the urgency of a request may pressure organizations to act quickly, careful verification can make the difference between a secure database and a catastrophic data breach. In today’s world, a cautious, skeptical approach to emergency data requests is essential for any organization handling sensitive information.








