Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People's Data
Key topics
Scammers are tricking big tech firms into handing over people's private data by posing as law enforcement and exploiting weaknesses in verification processes. Commenters are weighing in on the ease of spoofing official email addresses, with some pointing out that malicious actors can register similar domains or subdomains, such as jaxsheriff.us instead of jaxsheriff.org. One commenter suggests that simply calling back the listed number for the law enforcement agency would thwart these scams, but others counter that determined scammers could still find ways to deceive, like buying Google ads to appear as the top result. The discussion highlights the cat-and-mouse game between scammers and tech companies, with some arguing that stricter domain registration rules or more robust verification processes are needed to prevent these exploits.
Snapshot generated from the HN discussion
Discussion Activity
Very active discussionFirst comment
20m
Peak period
22
0-6h
Avg / period
5.7
Based on 34 loaded comments
Key moments
- 01Story posted
Dec 13, 2025 at 12:06 AM EST
28 days ago
Step 01 - 02First comment
Dec 13, 2025 at 12:27 AM EST
20m after posting
Step 02 - 03Peak activity
22 comments in 0-6h
Hottest window of the conversation
Step 03 - 04Latest activity
Dec 15, 2025 at 9:27 AM EST
25 days ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
How do companies decide which EDRs to fulfill and which ones require a judicial subpoena? Are companies ever even under the obligation to fulfill an EDR?
https://www.texasstandard.org/stories/flock-safety-cameras-h...
> So in a lot of the searches that we reviewed, we had about 500,000 to take a look at. We found the word “investigation” – or variations of the word “investigation” – or “suspect” a lot with really no details about what the investigation pertained to or what the suspect may have done.
> A lot of searches also just listed gibberish, like “ASDF” – that’s the sequence of letters in the center row of your computer keyboard. Or just said that they were there for random checks. We even found a search that just said “donut” or that didn’t say anything at all.
I'm honestly impressed. It's an interesting situation where the companies can only verify the same information that the hackers have access to
This would not be an issue if RFC 1480 had been taken seriously.
What am I missing? Not doing this is negligent. Same advice we'd give to phishing targets.
You'd connect to a live chat (or phone call) and tell the customer support rep that it's your first day on the job and the man training you has a thick accent, making it very difficult to understand him. You then ask a hypothetical, e.g "If someone phones in asking for help with regaining access to their account, or setting up security questions, what tool do I open up?". You'd then get more specific with the hypotheticals, gradually. The only thing you cared about were the name of the tool and the steps to pull up an account by IP address. At the time, almost all ISPs had their own software suite. Verizon used something related to Coffee. I think it was just called Coffee tbh. Anyway, the goal is to get them to tell you both the name of the internal tool they use + the rough steps on how to pull up an account. Most of the time, via phone and sheer confidence, you would get the information you needed within two to three attempts. You could also take it a step further if you were bored and try to get screenshots from the rep of the software.
Edit: You'd also ask the rep for their employee identification number, if applicable. You'd then use that if you need to hard-sell it in the next call. It really didn't matter if the ID was valid, so long as it was the correct length/format. Yes, they would really just tell you. I do not know why.
After you had that information, you'd phone back, making sure you got separate rep. Depending on size of ISP, you may have had to call back after a shift change.
You inform them your regional servers are down and you're unable to connect. You could flush this out more if you had additional information on the ISPs tech. You then would go on to say "I have a customer on the line who's rightfully upset after their account was apparently accessed without authorization. The customer is saying they changed the PII on the account and they're unable to recover it." This gives you a shitty, but somewhat valid-ish excuse to pull the account up by IP. You'd then use the information attained from the first step to sell that you are indeed an employee. Name of the tool, input labels (roughly), steps needed, button names, etc. If the rep is remotely technical, hang up, try again. You'd then confirm the information on the account with the rep. It helped if you had some information about the person already, e.g first name or rough location.
Comcast was the worst offender. Charter second. Verizon was a bit more tough, but not by much. People started doing this as a first-step in targeted identity fraud, which got a lot more attention on it. Along with all the typical information (street address, postal code, state) you'd also almost always be able to get the last four of the social on the account + last 4 of any card on auto-pay.
If you're worried about this sort of thing, the best advice I can give you is to check with your ISP and see if they allow a verbal password that can be tied to your account. Anyone calling in for support or connecting to live chat would need to provide it before the account's accessed.
I'm not sure how relevant swatting is nowadays, but if you're at all in a position where you have concerns over it happening, it would be wise to phone your local police department and let them know there's a possibility this might happen. From what I remember, most of the time they ask for your cell number. In the event that this does happen, they will still send the full swat team to your residence. But they will phone your cell and ask you to come out prior to kicking down the door.
Source: was bored in when I was 15/16 and doxxed pedophiles.
Netflix had Obiwan, Amazon had CRC.
Sometime a bit over a decade ago I used to have teamviewer on all of these :)
In my head, I miss those days. But I don't miss lacking a moral compass. I think I miss the feeling of fewer online barriers existing.
The root of the problem is that government agencies can request personal details and if the tech company fails to comply then the tech company is sanctioned. However the government agency forces the tech company to provide details in an insecure way often over email. If the tech company tries to demand reasonable security then the law enforcement agency views this as non-compliance and starts the sanctions.
https://archive.is/RltXf
- COVID lock down and I can't access my internal PC from home
- Call help desk line and say "hi, it's <ME> and I can't login. Btw, there is another person at the firm named <ME> (which was true) but that's not me HA HA."
- Help Desk removes 2FA
- Still doesn't work so I call back and reference the first call.
- Help Desk removes IP restriction
- This keeps happening (can't login, Help Desk removes something) until basically I can login with no password or 2FA (which did temporarily)
AT NOT POINT did someone ask me for a document/challenge/manager name to verify who I was.
Just being myself, knowing a couple pieces of info that were easily searchable on LinkedIn and I was in.
Scary stuff and a reminder that ALL of these systems are a lot easier to break into than many of us realize.
0 - https://jaysonestreet.com/media.php
The old hot thing was very similar. This no longer works and likely hasn't since 2016ish. But it was rampant starting in 2009.
You'd connect to a live chat (or phone call) and tell the customer support rep that it's your first day on the job and the man training you has a thick accent, making it very difficult to understand him. You then ask a hypothetical, e.g "If someone phones in asking for help with regaining access to their account, or setting up security questions, what tool do I open up?". At the time, almost all ISPs had their own software suite. Verizon used something related to Coffee. I think it was just called Coffee, tbh. Anyway, the goal is to get the mto tell you both the name of the internal tool they use + the rough steps on how to pull up an account. Most of the time, via phone and sheer confidence, you would get the information you needed within two to three attempts. You could also take it a step further if you were bored and try to get screenshots from the rep of the software.
After you had that information, you'd phone back, making sure you got separate rep. Depending on size of ISP, you may have had to call back after a shift change.
You inform them your regional servers are down and you're unable to connect. You could flush this out more if you had additional information on the ISPs tech. You then would go on to say "I have a customer on the line who's rightfully upset after their account was apparently accessed without authorization. The customer is saying they changed the PII on the account and they're unable to recover it." This gives you a shitty, but somewhat valid-ish excuse to pull the account up by IP. You'd then use the information attained from the first step to sell that you are indeed an employee. Name of the tool, input labels (roughly), steps needed, button names, etc. If the rep is remotely technical, hang up, try again. You'd then confirm the information on the account with the rep. It helped if you had some information about the person already, e.g first name or rough location.
Source: was bored in when I was 15/16 and doxxed pedophiles.