Jump to content

Hacker Say They Compromised ProtonMail. ProtonMail Says It's BS.


steven36

Recommended Posts

A person or group claiming to have hacked ProtonMail and stolen "significant" amounts of data has posted a lengthy ransom demand with some wild claims to an anonymous Pastebin. ProtonMail states it's complete BS.

 

protonmail-featured-image.png

 

According to the message, a hacker going by the name AmFearLiathMor makes quite a few interesting claims such as hacking ProtonMail's services and stealing user's email, that ProtonMail is sending their user's decrypted data to American servers, and that ProtonMail is abusing the lack of Subresource Integrity (SRI) use to purposely and maliciously steal their user's passwords.

 

After reading the Pastebin message (archive.is link), which is shown in its entirety below minus some alleged keys, and seeing the amount of claims, the first thing that came to mind was a corporate version of the sextortion scams that have been running rampant lately. As I kept reading it, though, it just felt like a joke.

 

Quote

Short Summary: We hacked Protonmail and have a significant amount of their data from the past few months.  We are offering it back to Protonmail for a small fee, if they decline then we will publish or sell user data to the world.

Long Explanation: While Protonmail's open-source code can be freely audited on Github, they haven't configured the mandatory SRI feature (https://www.w3.org/TR/SRI/). This leaves users without any guarantee about their source code integrity, thus allowing tampering and data collection at anytime. This will be totally transparent and unnoticed, because without enabling SRI all the users should inspect the website runtime code and its connections manually in the same moment they're being tampered with by Protonmail to discover it. Furthermore this requires spending a lot of time and advanced knowledge.  With this being clarified, we have proven and recorded that Protonmail intentionally manipulated their source code to reveal users decryption keys (private keys) by collecting their password. Protonmail abuses the lack of SRI technology to serve a modified version of their code that allows full data collection and decryption of their users content.  We haven't found the exact pattern that triggers this (probably by targeting IP ranges or just randomly to collect everybody's password), but again, we have proven and recorded this happens.
After proving Protonmail knowingly permits misconfiguration to maliciously target users we decided to deploy our full capabilities against them.  We began with months of dedicated penetration testing, we asked assistance from other organizations and deployed unreleased 0-days.  Although arduous we successfully installed a permanent backdoor on their major machines without Protonmail’s knowledge, bypassing their detection mechanisms. Once we obtained that access we took advantage of their misconfiguration and collected passwords from a large percentage of active accounts that accessed Protonmail during that period.

After that we were running a modified and automatized version of their webclient on our end, where we fetched, processed and stored email messages from those affected users in a huge database of our own, thus having significant useful information from many different individuals and companies.

If you have used Protonmail in the past several months it is probable we have your Username/Password and your decrypted emails recorded on our own private server. We also have names, addresses (If entered), contact lists, IP addresses, and much more.  We would not have been able to do this if Protonmail did not deliberately mis-configure their code to harm their own users.
Incidentally during this period we noticed that Protonmail sends decrypted user data to American servers frequently.  This may be due to the Swiss MLAT treaty requiring swiss companies reveal all their data to the Americans.  However it also might be possible they are sending this decrypted user data to the American firm that owns them.  This was simply a surprising thing to note but did not significantly influence our operation. 

After we obtained significant user data from Protonmail we removed our permanent backdoor for our own security. However we will publish recordings showing our defeat of Protonmail’s defenses and using their intentional misconfiguration to tamper with their source-code.

We successfully fully compromised Protonmail and notified them privately of our operation.  We also requested a small financial reward in return for their users data. 
Protonmail compromises their users data without their knowledge and charges each user a monthly subscription fee.  Therefore we felt morally justified compromising Protonmail’s data without their knowledge and charging them a fee for it’s return.  We all worked hard to accomplish this, incurred costs and felt this was reasonable. However they declined and ignored further discussion.  This seems to match their historical tendency to disparage researchers not at their own perceived high educational status. 
After we send this email to the Media we again ask Protonmail to pay a small fee to have their user data returned to them. We have exposed their malfeasance to the world and the attention of their users is toward them. We will give Protonmail until 23 November at 12:00 UTC to pay the fee, guaranteeing safe deletion and exploit descriptions released to them in private.  If given a choice we would not like to cause discomfort to regular people caught in this disagreement. 

If they decline again we will distribute as indicated in both #1 and #2 below:

#1 Freely send media outlets the below information:

- - - - - - - -Data Group One: Decrypted emails between individuals working for private military contractors discussing government contracts.  Specific details regarding circumventing the Geneva convention, underwater drone activities in the Pacific Ocean, and possible international treaty violations in Antarctica.  We have no way to validate this information but we do have these users information and all the details they use when describing their activities to their acquaintances

- - - - - - - -Data Group Two:  Conversations revealing rampant pedophilia among executives and the affluent who use Protonmail as their personal email.  Including full names and descriptions of their wrongdoings in their own words.  Prominent individuals to be named in many corporations and government positions. 

#2 Sold in bulk to the highest bidder on the darknet: 

1. All decrypted Protonmail customer data collected during the period we compromised their source code. Including plain text emails, attachments, full names, social media connections and IP addresses.  It’s possible we will not do this, instead selling email groups by topic. 

Historically it seems Protonmail makes unkind statements toward upstanding  organizations like my own.  If this happens we will gladly release “data group two” to the general public. 
In closing we wanted to express our desire to all Protonmail users that none of your data will be misused in any way if Protonmail cooperates.  We understand that it may be difficult to gain peoples trust in this regard due to the manner in which we came into possession of their Data.  All we can do is humbly offer our assurance that everything we have will be completely destroyed and never resurface again.  It seems like in this age honor is dead however we will be honorable regarding this and our future actions will prove it.

Deadline 23 November 12:00 UTC
AmFearLiathMor
[email protected]
 
ADDITIONALLY FOR SALE:
1. Non-Disclosed 0-Days. We are happy to discuss sale, but we will not release them to you until after we are done dealing with protonmail
2. Our services and connections

 

The information that the alleged hackers state that have access to includes underwater drone activity, treaty violations in Antarctica, and just reads like a prank.

 

ProtonMail appears to think so too as they posted on Twitter that this is a hoax and that there is no evidence that anything stated is true.

Quote


 

ProtonMail Reddit Post

 

ProtonMail has provided the following statement to BleepingComputer:

 

Quote

 

"We believe this extortion attempt is a hoax, and we have seen zero evidence to suggest otherwise. Not a single claim made is true and many of the claims are unsound from a technical standpoint.

We are aware of a small number of ProtonMail accounts that have been compromised as a result of those individual users falling for phishing attempts. However, there is zero evidence of a breach of our infrastructure."

 

 

 

BleepingComputer has also contacted the alleged hacker, but have not heard back by the time of this publication. 

 

As a bit of trivia, the hacker's name is from Scottish lore about a creature called "Am Fear Liath Mòr", or "Big Grey Man", that haunts the summit and passes of Ben Macdui.

Offering $20 USD in bitcoin for spreading info

The alleged hacker has been busy posting to various image boards and stating that they would send $20 in bitcoin to anyone who spread the word about this hack using the #Protonmail hashtag on Twitter. In this post, they up the ante by claiming they have data on Michael Avenatti and CNN employees.

 

posting-on-sites.jpg

Spreading the word on image boards

 

There is no reports that anyone has received bitcoins by the poster.

 

Source

Link to comment
Share on other sites


  • Replies 9
  • Views 1.2k
  • Created
  • Last Reply
On 11/17/2018 at 5:10 PM, knowledge said:

it was ddos sometime ago

So indeed was "ProtonMail" was hacked and their user's data/email were stolen?

Link to comment
Share on other sites


DDoS is not comparable to data leak or data hacking. Sites gets DDoS'ed all the time, Its not a serious concern, just sending massive traffic to create load on the server requests.

Link to comment
Share on other sites


knowledge-Spammer
8 hours ago, Screen said:

DDoS is not comparable to data leak or data hacking. Sites gets DDoS'ed all the time, Its not a serious concern, just sending massive traffic to create load on the server requests. 

sometimes ddos can leak info

 

8 hours ago, nsan3 said:

So indeed was "ProtonMail" was hacked and their user's data/email were stolen?

it was hacked sometime ago like in 2015 or 2017  i think  y i say this is i watch things like mr Robot

ProtonMail is founded by scientists from European Organization for Nuclear Research, or Cern. It has become widely known in the US since its appearance on popular USA network drama Mr Robot.

 

ProtonMail said it “grudgingly agreed” to pay the ransom after pressure to mitigate damage to the other customers of ProtonMail’s ISP and data center, which were affected by the attack, but the attacks continued even after ProtonMail paid up. The email provider emphasized that it had not been breached, merely disabled. “Even though access is limited, an important thing to note is that our core end-to-end encryption holds strong and is 100% untouched. All user data is fine and safe.”

 

u do not pay if all is safe

but they say they hacked back

https://motherboard.vice.com/en_us/article/qvvke7/email-provider-protonmail-says-it-hacked-back-then-walks-claim-back

 

 

Link to comment
Share on other sites


Protonmail has never been secure because the whole basis for their security, pgp encryption, is completely negated by the fact that the private keys are held server side.

Link to comment
Share on other sites


The beauty of this forum is that we all can agree to disagree with each other. 

But perhaps, we should practice restraint and should choose our responses wisely without using offensive words.

Link to comment
Share on other sites


Also, please note that OP's account is brand new, they very well could be the person who wrote the message. We have no source on the message other than them, I'd like to know where they found this. With nothing to back them up, this seems more like a hoax than a real threat to me.

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...