Sunday, April 13, 2025
HomeData BreachBlack Hat Hacker CyberZeist (@cyberzeist2) Hacked FBI website "FBI.gov" and data leaked...

Black Hat Hacker CyberZeist (@cyberzeist2) Hacked FBI website “FBI.gov” and data leaked Online

Published on

SIEM as a Service

Follow Us on Google News

The infamous dark cap hacker CyberZeist (@cyberzeist2) has broken into the FBI site FBI.gov and spilled information on Pastebin

The Hacker released the FBI.GOV accounts that he found in a few reinforcement documents (acc_102016.bck, acc_112016.bck, old_acc16.bck, and so forth).

Spilled records contain accounts information, including names, SHA1 Encrypted Passwords, SHA1 salts, and messages.

- Advertisement - Google News

The interruption happened on December 22, 2016, the hacker uncovered to have misused a zero-day vulnerability in the Phone Content Management System

“Backtracking to 22nd December 2016, I tweeted around a 0day vulnerability in Plone CMS which is considered as the most secure CMS till date. This CMS is utilized by many top offices including FBI”

The Hacker dumped the 155 indicated stolen qualifications to online clipboard Pastebin, guaranteeing a defenselessness dwells in a Plone Python module. They said the sites of the European Union Agency for Network and Information Security and the National Intellectual Property Rights Coordination Center are likewise helpless.

Cyberzeist likewise guaranteed the FBI reached the programmer asking for a duplicate of the stolen qualifications, which they declined to give.

The Hacker figured the CMS was facilitated on a virtual machine running a custom FreeBSD. They said they will tweet the zero-day blemish once it is no longer available to be purchased.

The hacker also Tweeted an image of the FBI website that was down just after the hack.

According to CyberZeist, the FBI contacted him to pass on the leaks.

“I was contacted by various sources to pass on the leaks to them that I obtained after hacking FBI.GOV but I denied all of them. Why? just because I was waiting for FBI to react on time. They didn’t directly react and I don’t know yet what are they up to, but at the time I was extracting my finds after hacking FBI.GOV,” he wrote

experts at the FBI were working to fix the issue, he noticed that the Plone 0day exploit was still working on the CMS backend.

“I couldn’t gain a root access (obviously!), but I was able to recon that they were running FreeBSD ver 6.2-RELEASE that dates back to 2007 with their own custom configurations. Their last reboot time was 15th December 2016 at 6:32 PM in the evening,” he added.

Presently how about we sit and sit tight for the FBI’s response.I clearly can’t distribute the 0day assault vector myself as,

The Hacker affirmed that the 0-day is offered available to be purchased on Tor by a programmer that passes by the moniker “lo4fer.” Once this 0day is never again being sold, I will tweet out the Plone CMS 0day assault vector myself.

When this 0day is never again being sold, I will tweet out the Plone CMS 0day assault vector myself.” CyberZeist included.

This isn’t the first run through CyberZeist hacked the site of the Federal Bureau of Investigation, in 2011 when he was one of the individuals from the Anonymous aggregate he broke into the database of the law requirement office.

The hacker is very popular, among his victims, there are BarclaysTesco Bank, and the MI5.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

Hackers Claim WooCommerce Breach Exposing 4.4 Million Customer Records

A hacker operating under the alias “Satanic” has claimed responsibility for a massive data...

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...