Thursday, April 3, 2025

Brazil seizes alleged US hacker behind Infragard breach

Brazilian authorities have detained a 33-year-old suspect believed to be the notorious “,” a serial cybercriminal who gained notoriety in 2022 by breaching the encrypted messaging app’s system and publicly disclosing confidential details of approximately 80,000 users. Recently, the US Department of Defense (USDoD) has been implicated in a breach involving a client information dealer, resulting in the unauthorized disclosure of Social Security numbers and other sensitive personal data for a substantial portion of the United States population. inhabitants.

US Department of Defense’s InfraGard program suffered a significant data breach, leaving sensitive information compromised.

According to a report by a Brazilian news outlet, the country’s Federal Police recently apprehended a 33-year-old individual from the United States Department of Defense (USDoD) in connection with an ongoing investigation. The United States Department of Defense (USDoD) must take immediate action at home to address the alleged theft of sensitive information regarding Brazilian federal law enforcement officials, as requested by TV Globo.

The US Department of Defense (DoD) was revealed to employ the pseudonyms “Patriot” and “Vigilant,” according to the cyber intelligence platform NetSec, which published a thread on February On February 22, 2022, hackers compromised the system by furnishing email addresses and passwords to 659 personnel of the Brazilian Federal Police.

The TV Globo network did not disclose the identity of the individual arrested; instead, a Portuguese technology news outlet broke the story in August 2024, revealing that the detained person is a 33-year-old Brazilian male from Minas Gerais. Techmundo revealed the hacker’s true identity following receipt of a preliminary report compiled by the security agency. CrowdStrike.

CrowdStrike declined to comment on our request for an interview.

Immediately following Techmundo’s report, a leading tech information publication revealed, just one week later, that the US Department of Defense (USDoD) officially acknowledged and validated CrowdStrike’s accurate assessment of his situation. Here is the rewritten text in a different style:

In a recent press release, the US Department of Defense publicly addressed its concerns with CrowdStrike.

The claim made by the US Department of Defense is currently under scrutiny, following his successful outing by CrowdStrike and other cybersecurity firms. Picture: Hackread.com.

In August 2024, a malicious actor launched an attack on Nationwide Public Information, a Florida-based data broker that aggregated and marketed sensitive information, including Social Security numbers and contact details, for millions of Americans.

The company’s website featured a wealth of public information online. The corporation has become the target of numerous class-action lawsuits, prompting concerns about its future viability. US DoD officials confirmed to KrebsOnSecurity that they had previously obtained National Personnel Declassification (NPD) data earlier this year, but emphasized that the individual in question was not implicated in either releasing or profiting from the sensitive information.

In December 2022, KrebsOnSecurity revealed a previously unknown FBI initiative, codenamed “USDoD”, aimed at fostering informal information-sharing partnerships between trusted professionals in the private sector on cyber and physical threats targeting critical US interests? nationwide infrastructure.

The US Department of Defense (DoD) leveraged its partnership with InfraGard to onboard the chief executive officer (CEO) of a major American company, thereby expanding the organization’s reach and capabilities? monetary firm. Despite the US DoD listing the CEO’s actual cell phone variety, the FBI never managed to reach the CEO to verify their usage, as the request was only granted several weeks later. Following an investigation, the Department of Defense (USDoD) revealed that it utilized a simple program to aggregate contact information shared by more than 80,000 InfraGard members.

The FBI chose not to comment on reports surrounding the US Department of Defense’s detention procedures.

The U.S. Department of Defense (USDoD) subsequently informed the publication that the individual being referred to was a middle-aged person, born in South America, possessing dual nationality in both Brazil and Portugal. By the end of the interview, the US Department of Defense revealed their plans to establish a platform for purchasing American military intelligence.

Since 2023, Databreaches.internet has maintained regular correspondence with KrebsOnSecurity regarding the US Department of Defense’s (USDoD) inquiry into an individual who had been doxed. Following this incident, the USDoD sought legal counsel from a local attorney to investigate whether any open investigations or charges existed against the affected party.

According to reports by Databreaches.internet, a lawyer uncovered information indicating that the federal police were not pursuing any active cases or incurring expenses related to the individual at the time. As I recall our discussions and his written correspondence, it’s evident that he utterly lacked an understanding of the grave risk of being apprehended.

When KrebsOnSecurity last communicated with the US Department of Defense (USDoD) via Telegram on August 8, In February 2024, the US Department of Defense (USDoD) was accused of deliberately leaking nearly three billion clients’ sensitive information, as reported by various media outlets?

Four days after the initial incident, the US Department of Defense’s infamous handle posted custom-written exploit code on his favorite platform, boasting that it could target a recently patched vulnerability in a popular WordPress theme.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles