{"id":51093,"date":"2023-03-20T12:43:43","date_gmt":"2023-03-20T12:43:43","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34436\/Inside-The-DEA-Tool-Hackers-Allegedly-Used-To-Extort-Targets.html"},"modified":"2023-03-20T12:43:43","modified_gmt":"2023-03-20T12:43:43","slug":"inside-the-dea-tool-hackers-allegedly-used-to-extort-targets","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/","title":{"rendered":"Inside The DEA Tool Hackers Allegedly Used To Extort Targets"},"content":{"rendered":"<div readability=\"32\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6414843394247363ae963913\/lede\/1679067179691-dea.jpeg?crop=0.9875555555555555xw:1xh;center,center&amp;resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6414843394247363ae963913\/lede\/1679067179691-dea.jpeg?crop=0.9875555555555555xw:1xh;center,center&amp;resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6414843394247363ae963913\/lede\/1679067179691-dea.jpeg?crop=0.9875555555555555xw:1xh;center,center&amp;resize=20:*\"><img class=\"responsive-image__img\" alt=\"DEA\" decoding=\"async\" loading=\"eager\"><\/picture><\/div>\n<p>Image: Ryan Lackey\/Flickr<\/p>\n<\/div>\n<div data-component=\"BodyComponentRenderer\" readability=\"83.462322315465\">\n<div class=\"topic-callout\" readability=\"7.2888888888889\">\n<div class=\"topic-callout__img\"><a href=\"https:\/\/www.vice.com\/en\/topic\/cyber\"><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" alt=\"Screen Shot 2021-02-24 at 3\"><\/a><\/div>\n<p>Hacking. Disinformation. Surveillance. CYBER is Motherboard&#8217;s podcast and reporting on the dark underbelly of the internet.<\/p>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>Hackers accused of using law enforcement tools and other tactics to extort people online gained access to a sensitive, password protected portal run by the Drug Enforcement Administration, according to a screenshot of the portal obtained by Motherboard.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34.85393258427\"><\/p>\n<p>The new screenshot and other information provides some more clarity on charges unsealed against Sagar Steven Singh, 19, and Nicholas Ceraolo, 25, <a href=\"https:\/\/www.vice.com\/en\/article\/pkae7g\/nobody-is-safe-in-wild-hacking-spree-hackers-accessed-federal-law-enforcement-database\">earlier this week<\/a>. That pair, who were at one point part of a group called \u201cViLE,\u201d allegedly went on a wide-spanning hacking spree. That included breaking into the federal U.S. law enforcement portal; using a hacked Bangladeshi police officer\u2019s email account to fraudulently request user data from a social media company; and trying to use it to buy facial recognition services too.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--blockquote\" readability=\"11\">\n<p><em><strong>Do you know anything else about this portal, or how criminals are obtaining sensitive data? We&#8217;d love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, or email&nbsp;joseph.cox@vice.com.<\/strong><\/em><\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"26.832861189802\"><\/p>\n<p>\u201cEPIC Portal,\u201d the top of the screenshot reads, referring to the El Paso Intelligence Center (EPIC). EPIC is a multiagency intelligence center led by the DEA with 21 participating agencies, <a href=\"https:\/\/www.dea.gov\/what-we-do\/law-enforcement\/epic\" target=\"_blank\" rel=\"noopener\">according to the DEA\u2019s website<\/a>. The mission of EPIC is not just limited to drugs, but also <a href=\"https:\/\/americansecuritytoday.com\/doj-oig-deas-el-paso-intelligence-center-learn\/\" target=\"_blank\" rel=\"noopener\">includes terrorism, human trafficking, money laundering, and more<\/a>.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29.48275862069\"><\/p>\n<p>The portal appears to provide access to a variety of tools, including one labeled as \u201cLPR,\u201d according to the screenshot. LPR typically refers to license plate readers, which are cameras that take photographs of vehicles as they pass certain points and record where a certain vehicle was at a particular time. A <a href=\"https:\/\/www.aclu.org\/sites\/default\/files\/field_document\/33552-33575_2014.01.31_-_DEA_Response.pdf\" target=\"_blank\" rel=\"noopener\">2010 email obtained by the American Civil Liberties Union<\/a> says that federal, state, and local agencies have the ability to query an \u201cLPR database via EPIC.\u201d A <a href=\"https:\/\/oig.justice.gov\/reports\/DEA\/a1005.pdf\" target=\"_blank\" rel=\"noopener\">report from the Department of Justice\u2019s Office of Inspector General<\/a> says EPIC has access to the \u201cDEA\u2019s License Plate Reader Database,\u201d which stores license plate information captured along the Southwest border.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32.984402079723\"><\/p>\n<p>The screenshot also includes \u201cHSIN,\u201d which is the Homeland Security Information Network, <a href=\"https:\/\/bja.ojp.gov\/sites\/g\/files\/xyckuh186\/files\/media\/document\/A%20Fusion%20Center_s%20Role%20During%20Mass%20Casualty%20Events.pdf\" target=\"_blank\" rel=\"noopener\">which is used to share intelligence among agencies<\/a>. The EPIC Portal also provides other areas for users to explore, such as \u201cseizures,\u201d \u201creports,\u201d and \u201cglobal drug pricing,\u201d according to the screenshot. (In <a href=\"https:\/\/www.documentcloud.org\/documents\/23710817-ceraolo-complaint\" target=\"_blank\" rel=\"noopener\">the complaint against Singh and Ceraolo<\/a>, prosecutors wrote that \u201cData available through the Portal is not classified but is sensitive and includes detailed, nonpublic records of narcotics and currency seizures, as well as law enforcement intelligence reports.\u201d)<\/p>\n<p><\/span><\/p>\n<div class=\"body-image\" data-component=\"ImageBlock\" readability=\"31\">\n<div class=\"body-image__img\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1679067504267-portal.jpeg?resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1679067504267-portal.jpeg?resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1679067504267-portal.jpeg?resize=20:*\"><img class=\"responsive-image__img\" alt=\"portal.jpg\" decoding=\"async\" loading=\"eager\"><\/picture><\/div>\n<\/div>\n<div class=\"body-image__caption\" readability=\"32\">\n<p>A screenshot of someone logged into the EPIC Portal obtained by Motherboard. Image: Motherboard.<\/p>\n<\/div>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"21.377358490566\"><\/p>\n<p>The screenshot also shows access to \u201cJetway\/Pipeline,\u201d referring to two different types of training that teach officers <a href=\"https:\/\/www.iadlest.org\/Portals\/0\/Repository\/FedDirectory\/Flyers\/DEA%20EPIC%20Training.pdf?ver=2020-02-14-121054-770\" target=\"_blank\" rel=\"noopener\">how to interdict at airports and highways respectively<\/a>, and the <a href=\"https:\/\/www.judiciary.senate.gov\/imo\/media\/doc\/QFR%20Responses%20-%20DOJ%20-%202021-10-27.pdf\" target=\"_blank\" rel=\"noopener\">Deconfliction and Information Coordination Endeavor (DICE)<\/a>, which helps law enforcement officials not double up on investigations.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32.571428571429\"><\/p>\n<p>In May 2022, Singh, also known as Weep, allegedly logged into the portal from the same IP address he had previously used to access a social media account registered to him, according to the complaint. Records from Singh\u2019s computer and the government servers themselves showed Singh accessed multiple guides on how to use the portal, and sections that track narcotic seizures in the U.S., the complaint says. Krebs on Security <a href=\"https:\/\/krebsonsecurity.com\/2022\/05\/dea-investigating-breach-of-law-enforcement-data-portal\/\" target=\"_blank\" rel=\"noopener\">reported on a breach of the portal at the time<\/a>. The outlet reported the breach also impacted the Law Enforcement Inquiry and Alerts (LEIA) system, managed by the DEA, which provides search capabilities for EPIC and other external databases. Krebs <a href=\"https:\/\/krebsonsecurity.com\/2023\/03\/two-us-men-charged-in-2022-hacking-of-dea-portal\/\" target=\"_blank\" rel=\"noopener\">also reported these latest charges relate to the DEA breach<\/a>.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34\"><\/p>\n<p>\u201cWere <em>[sic] <\/em>all gonna get raided one of these days i swear,\u201d Ceraolo wrote after Singh shared the login credentials with him, according to the complaint. Ceraolo, who used the handle Convict, also asked an associate how they could scrape data from inside the portal, the complaint says.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30.925531914894\"><\/p>\n<p>Within one day of gaining access to the portal, \u201cSingh was using his access to the Portal to extort victims,\u201d <a href=\"https:\/\/www.justice.gov\/usao-edny\/pr\/two-men-charged-breaching-federal-law-enforcement-database-and-posing-police-officers\" target=\"_blank\" rel=\"noopener\">according to a press release from the Eastern District of New York<\/a> accompanying the charges. Singh also told a contact \u201cthat portal had some fucking potent tools,\u201d and listed five search tools accessible through the portal, the court records add. <a href=\"https:\/\/oig.justice.gov\/reports\/DEA\/a1005.pdf\" target=\"_blank\" rel=\"noopener\">External databases accessible from EPIC<\/a> include those run by the FBI, Customs and Border Protection, the Federal Aviation Administration, the Federal Bureau of Prisons, and the U.S. Marshals Service.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"35\"><\/p>\n<p>However, the exact contours of what information Singh may have accessed, or even been able to, is unclear. The complaint acknowledges that Singh was unable to access other databases because they required other login credentials. KT, a leader of ViLE, told Motherboard in an online chat that the claim that Singh used access to the portal to extort victims \u201cis a lie.\u201d KT said a lot of people accessed the DEA portal at the time after it was shared in a \u201csemi large\u201d Telegram group.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"25.071428571429\"><\/p>\n<p>KT said Ceraolo was kicked from ViLE when he was first raided. The complaint says Homeland Security Investigations agents executed a search warrant at Ceraolo\u2019s residence in May, 2022. <a href=\"https:\/\/www.vice.com\/en\/article\/k7zqqe\/nicholas-ceraolo-arrested-florida-hackers-federal-law-enforcement-database\">Motherboard reported Ceraolo handed himself in<\/a> earlier this week in light of the new charges.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>The DEA declined to comment, and directed inquiries to the Eastern District of New York, which also declined to comment.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"19.105882352941\"><\/p>\n<p><em><strong>Subscribe to our cybersecurity podcast,&nbsp;<a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener\">CYBER<\/a>. Subscribe to&nbsp;<a href=\"https:\/\/www.twitch.tv\/motherboardtv\" target=\"_blank\" rel=\"noopener\">our new Twitch channel<\/a>.<\/strong><\/em><\/p>\n<p><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34436\/Inside-The-DEA-Tool-Hackers-Allegedly-Used-To-Extort-Targets.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51094,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10425],"class_list":["post-51093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusacybercrimedata-loss"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Inside The DEA Tool Hackers Allegedly Used To Extort Targets 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside The DEA Tool Hackers Allegedly Used To Extort Targets 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-20T12:43:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Inside The DEA Tool Hackers Allegedly Used To Extort Targets\",\"datePublished\":\"2023-03-20T12:43:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/\"},\"wordCount\":934,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets.jpg\",\"keywords\":[\"headline,hacker,government,usa,cybercrime,data loss\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/\",\"name\":\"Inside The DEA Tool Hackers Allegedly Used To Extort Targets 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets.jpg\",\"datePublished\":\"2023-03-20T12:43:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets.jpg\",\"width\":240,\"height\":238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,cybercrime,data loss\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentusacybercrimedata-loss\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Inside The DEA Tool Hackers Allegedly Used To Extort Targets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Inside The DEA Tool Hackers Allegedly Used To Extort Targets 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/","og_locale":"en_US","og_type":"article","og_title":"Inside The DEA Tool Hackers Allegedly Used To Extort Targets 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-20T12:43:43+00:00","og_image":[{"url":"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Inside The DEA Tool Hackers Allegedly Used To Extort Targets","datePublished":"2023-03-20T12:43:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/"},"wordCount":934,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets.jpg","keywords":["headline,hacker,government,usa,cybercrime,data loss"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/","url":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/","name":"Inside The DEA Tool Hackers Allegedly Used To Extort Targets 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets.jpg","datePublished":"2023-03-20T12:43:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets.jpg","width":240,"height":238},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/inside-the-dea-tool-hackers-allegedly-used-to-extort-targets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,cybercrime,data loss","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusacybercrimedata-loss\/"},{"@type":"ListItem","position":3,"name":"Inside The DEA Tool Hackers Allegedly Used To Extort Targets"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51093"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51093\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51094"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}