Law Enforcement Email Accounts Sold for Just $40 on the Dark Web, Reveals Abnormal Security

Published:

spot_img

Cybercriminals Capitalize on Law Enforcement Email Accounts

The Emerging Threat

A recent report from Abnormal Security Corp., a leader in human behavior security, sheds light on a troubling trend in cybercrime: the active selling of law enforcement and government email accounts on dark web platforms. This alarming practice essentially commodifies institutional trust, enabling criminals to exploit it for a surprisingly low price.

Price of Compromise

According to the findings, these compromised accounts can be acquired for as little as $40 each. Such access provides attackers with the credibility of official communications, allowing them to impersonate government officials, issue fraudulent subpoenas, and even navigate restricted information systems.

A Global Concern

The researchers at Abnormal have identified compromised accounts originating from several countries, including the United States, the United Kingdom, Germany, India, and Brazil. This underscores the global nature of the threat, highlighting that institutional vulnerabilities are not confined to a specific region.

The Mechanics of Compromise

What makes this situation particularly dire is that the accounts for sale are not just old or inactive credentials; they are fully functional accounts with legitimate histories. This characteristic increases their likelihood of evading both automated security measures and human scrutiny. Abnormal’s research reveals three primary methods by which these accounts are compromised:

  1. Credential Stuffing: This method exploits reused or weak passwords.
  2. Infostealer Malware: Attackers use this malware to gather saved login details from browsers.
  3. Targeted Phishing and Social Engineering: Criminals directly deceive individuals into revealing their login information.

Once compromised, these accounts are typically sold via encrypted channels like Telegram, where buyers receive full SMTP, POP3, or IMAP credentials for immediate exploitation.

Beyond Simple Impersonation

The consequences of such compromises extend beyond the ability to send deceptive emails. Attackers can utilize these accounts to issue fraudulent emergency data requests that companies might feel obliged to comply with. Furthermore, they can access sensitive law enforcement portals and exploit investigative tools for personal data retrieval. For instance, recent incidents have highlighted how attackers used compromised accounts to engage with systems like the X Legal Request Submission, which facilitates account takedowns and private data access. The U.S. Federal Bureau of Investigation has also documented an uptick in bogus data requests tied to hijacked police emails.

Exploiting Investigative Capabilities

The researchers at Abnormal have identified that threat actors have gained access to sensitive investigative databases, license plate lookup systems, and even social media investigative tools. This represents a significant escalation from merely impersonating officials to directly exploiting the capabilities afforded to law enforcement agents. Such access empowers attackers to compel disclosures, surveil targets, and gather vital intelligence for future criminal endeavors.

Challenges in Detection

Using legitimate government domains with active authentication poses significant detection challenges. Since these emails can easily pass Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) checks, they often slip past rule-based secure email gateways, making it difficult for organizations to identify threats.

Strengthening Defenses

To combat this growing menace, researchers advocate for heightened security measures. Recommendations include improving credential hygiene, increasing the implementation of multifactor authentication across systems, and adopting advanced anomaly detection techniques. By prioritizing these enhancements, institutions can fortify their defenses against this pervasive form of cybercrime.


This report from Abnormal Security serves as a crucial reminder of the evolving landscape of cyber threats and the ongoing need for vigilant security practices within government and law enforcement agencies.

spot_img

Related articles

Recent articles

Verdant IMAP Wins Best Private Equity Advisory at 2025 Africa Service Providers Awards

Verdant IMAP Wins Top Honor at Africa Global Funds Awards 2025 Verdant IMAP has been recognized at the Africa Global Funds (AGF) Africa Service Providers...

CISA Warns of VMware Zero-Day Exploit Used by China-Linked Hackers in Ongoing Attacks

Cybersecurity Alert: Critical Vulnerability in VMware Affects Many Systems Overview of the Vulnerability On October 31, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) flagged...

Defense Contractor Manager Admits Guilt in Selling Cyber Exploits to Russian Broker

Understanding Insider Threats in Cybersecurity: The Case of Peter Williams Insider threats in cybersecurity pose a significant risk to national security and corporate integrity. The...

Nvidia: A Tech Titan Surpassing India’s Economy in the AI Era

Nvidia’s Historic $5 Trillion Valuation: A New Era in Global Economics New Delhi | Business Desk In a monumental moment that reshapes the landscape of global...