Cybercriminals Capitalize on Law Enforcement Email Accounts
The Emerging Threat
A recent report from Abnormal Security Corp., a leader in human behavior security, sheds light on a troubling trend in cybercrime: the active selling of law enforcement and government email accounts on dark web platforms. This alarming practice essentially commodifies institutional trust, enabling criminals to exploit it for a surprisingly low price.
Price of Compromise
According to the findings, these compromised accounts can be acquired for as little as $40 each. Such access provides attackers with the credibility of official communications, allowing them to impersonate government officials, issue fraudulent subpoenas, and even navigate restricted information systems.
A Global Concern
The researchers at Abnormal have identified compromised accounts originating from several countries, including the United States, the United Kingdom, Germany, India, and Brazil. This underscores the global nature of the threat, highlighting that institutional vulnerabilities are not confined to a specific region.
The Mechanics of Compromise
What makes this situation particularly dire is that the accounts for sale are not just old or inactive credentials; they are fully functional accounts with legitimate histories. This characteristic increases their likelihood of evading both automated security measures and human scrutiny. Abnormal’s research reveals three primary methods by which these accounts are compromised:
- Credential Stuffing: This method exploits reused or weak passwords.
- Infostealer Malware: Attackers use this malware to gather saved login details from browsers.
- Targeted Phishing and Social Engineering: Criminals directly deceive individuals into revealing their login information.
Once compromised, these accounts are typically sold via encrypted channels like Telegram, where buyers receive full SMTP, POP3, or IMAP credentials for immediate exploitation.
Beyond Simple Impersonation
The consequences of such compromises extend beyond the ability to send deceptive emails. Attackers can utilize these accounts to issue fraudulent emergency data requests that companies might feel obliged to comply with. Furthermore, they can access sensitive law enforcement portals and exploit investigative tools for personal data retrieval. For instance, recent incidents have highlighted how attackers used compromised accounts to engage with systems like the X Legal Request Submission, which facilitates account takedowns and private data access. The U.S. Federal Bureau of Investigation has also documented an uptick in bogus data requests tied to hijacked police emails.
Exploiting Investigative Capabilities
The researchers at Abnormal have identified that threat actors have gained access to sensitive investigative databases, license plate lookup systems, and even social media investigative tools. This represents a significant escalation from merely impersonating officials to directly exploiting the capabilities afforded to law enforcement agents. Such access empowers attackers to compel disclosures, surveil targets, and gather vital intelligence for future criminal endeavors.
Challenges in Detection
Using legitimate government domains with active authentication poses significant detection challenges. Since these emails can easily pass Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) checks, they often slip past rule-based secure email gateways, making it difficult for organizations to identify threats.
Strengthening Defenses
To combat this growing menace, researchers advocate for heightened security measures. Recommendations include improving credential hygiene, increasing the implementation of multifactor authentication across systems, and adopting advanced anomaly detection techniques. By prioritizing these enhancements, institutions can fortify their defenses against this pervasive form of cybercrime.
This report from Abnormal Security serves as a crucial reminder of the evolving landscape of cyber threats and the ongoing need for vigilant security practices within government and law enforcement agencies.


