April 23, 2015 By Douglas Bonderud 2 min read

So-called “doxing” occurs when malicious actors gather private information about an individual online and then post that data publicly. While it occasionally happens to private citizens who run afoul of cybercriminal groups or journalists who cover cybersecurity stories, there is a new target on the horizon: public officials. According to a new warning from the U.S. Computer Emergency Readiness Team (US-CERT), both law enforcement personnel and public officials are being victimized by these cyberattacks.

New Risks

As noted by the FBI’s recent public service announcement, it’s not just personal doxing that should worry public officials. Hacktivist groups are also targeting family members of government personnel in an effort to compromise their safety or compel a specific response. Additionally, the announcement warns about the rise of “swatting,” in which anonymous reporters call police and claim high-risk criminal incidents are taking place at a victim’s address, prompting a large-scale law enforcement response. The result? Unwanted attention and wasted tax dollars.

So how worrisome is doxing? A recent Ars Technica article describes the experience of one writer who found himself on the receiving end of such a cyberattack. With private details such as his name, address and phone number posted publicly online, he ended up with multiple unwanted deliveries to his door and text messages on his phone.

For public officials, there are higher risks. For example, if details about which schools their children attend are leaked or information about their personal schedules is compromised, there is a real risk of kidnapping or home intrusion. According to Gizmodo, the militant Islamic State group recently posted personal information about more than 100 American military personnel online in hopes that supporters in the United States would seek out and cause harm to these soldiers.

Staying Safe From Cyberattacks

Along with its warning, US-CERT also linked to its tips on staying safe when using social networking sites since this is often the fastest path to compromise for both government officials and law enforcement personnel. It works like this: Police officers or government officials post something using an official Twitter handle or post a blog on their organization’s website. However, in many cases, these “secure” communications contain links to personal social media profiles, which reveal unwanted details.

Protecting this data is a two-step process. First, using easily found social profiles — for example, those that are publicly viewable and use real names — makes doxing cyberattacks simple for cybercriminals. Instead, it’s a good idea to use aliases where possible and require approval to view any images or posted content. The same goes for family members, whose profiles often provide clues about family life and personal habits.

Second, it is also essential to monitor email communications. Always use encrypted message services, and never rely on insecure public wireless connections. It is also important to take precautions offline, such as restricting driver’s license and vehicle information with the Department of Motor Vehicles and real estate data with land title agencies. Finally, public officials should take the time to periodically run their name through a public search engine and see what comes up; there may be surprises in store.

Ultimately, doxing and other information-gathering cyberattacks will always find a foothold, especially in the lives of public officials and law enforcement agents. The goal, however, is to make hacktivists work hard enough for the information they want that their efforts are detected, giving time for potential victims to react and respond.

Image Source: iStock

More from

Research finds 56% increase in active ransomware groups

4 min read - Any good news is welcomed when evaluating cyber crime trends year-over-year. Over the last two years, IBM’s Threat Index Reports have provided some minor reprieve in this area by showing a gradual decline in the prevalence of ransomware attacks — now accounting for only 17% of all cybersecurity incidents compared to 21% in 2021. Unfortunately, it’s too early to know if this trendline will continue. A recent report released by Searchlight Cyber shows that there has been a 56% increase in…

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today