Google’s Law Enforcement Portal Prank: Hackers Go Dark After Creating Fake Account!
Google’s Law Enforcement Request System had a brief run-in with a sneaky hacker account, but no data was accessed. Meanwhile, the “Scattered Lapsus$ Hunters” claim to have infiltrated both Google’s portal and the FBI’s eCheck system. Google swiftly disabled the rogue account, but the hackers’ bold claims have left cybersecurity experts on high alert.

Hot Take:
Google just learned that their Law Enforcement Request System (LERS) is a bit too inviting, even for the wrong crowd. A fraudulent account was caught trying to play detective without a badge. While it sounds like the plot of a bad buddy cop movie, Google insists that no data was accessed, and the FBI is staying as tight-lipped as a poker player with a royal flush. Meanwhile, the “Scattered Lapsus$ Hunters” gang is waving screenshots like they just won a game of cyber charades. Who knew cybersecurity could be so dramatic?
Key Points:
- Google discovered a fraudulent account in its LERS platform used for law enforcement data requests.
- No requests were made, and no data was accessed through the fake account.
- The “Scattered Lapsus$ Hunters” gang claims they accessed both Google’s LERS and the FBI’s eCheck systems.
- The gang has a history of data theft, using social engineering and technical exploits.
- Despite claims of “going dark,” experts believe the threat actors may continue operations quietly.