Exploiting Trust: Fraudulent Account Breaches Google's Law Enforcement Portal, Posing Serious Data Security Risk
Share- Nishadil
- September 16, 2025
- 0 Comments
- 2 minutes read
- 12 Views

In a significant disclosure that has sent ripples through the cybersecurity world, Google has confirmed that its Law Enforcement Request System (LERS) portal was compromised by a fraudulent account. This sophisticated digital attack saw threat actors leverage stolen legitimate law enforcement credentials to gain access, subsequently submitting fake Emergency Data Requests (EDRs) to various Internet Service Providers (ISPs) in a brazen attempt to illicitly acquire user data.
The incident, first brought to light by sources including Cloudflare and Apple, highlights a concerning vulnerability in the digital communication channels designed for critical law enforcement operations.
While Google maintains that its internal systems remained uncompromised, the unauthorized access to the LERS portal itself – a vital gateway for law enforcement agencies to request user data from Google – is a serious cause for alarm.
According to Google's official statement, "We have identified a limited number of instances where a legitimate law enforcement credential was compromised, and that credential was used to submit a fraudulent legal request for user data." This clarification underscores that the breach wasn't a direct attack on Google's infrastructure but rather an exploitation of compromised third-party credentials, a common tactic in today's intricate cyber threat landscape.
Google has affirmed its commitment to working closely with law enforcement partners to investigate the matter thoroughly.
The LERS portal is designed to streamline legitimate requests for user information, ranging from subpoenas and court orders to emergency data requests. EDRs are particularly sensitive, allowing law enforcement to bypass standard judicial processes in urgent situations where there is an immediate risk of death or serious physical injury.
The integrity of this system is paramount, as it relies on trust and strict verification to prevent abuse.
Cloudflare and Apple were among the companies that received these fraudulent EDRs. Fortunately, both tech giants confirmed they spotted the deceptive nature of the requests and did not hand over any user data.
Their vigilance serves as a crucial line of defense against such sophisticated social engineering and impersonation tactics. This success story emphasizes the critical need for ISPs and other online service providers to meticulously verify every law enforcement request, especially those submitted under emergency pretenses.
To bolster security, Google has advised law enforcement agencies utilizing the LERS platform to enable two-factor authentication (2FA) for their accounts.
This measure is a standard, yet highly effective, defense against credential stuffing and phishing attacks, which are often the initial vector for such compromises.
This incident is not an isolated event. It echoes a recent string of high-profile security breaches, including those orchestrated by a teen hacker group (LAPSUS$) that targeted T-Mobile and other major corporations.
The pattern suggests a persistent and evolving threat where adversaries are not only seeking to breach company systems directly but also to exploit trusted interfaces and supply chain vulnerabilities.
The Google LERS portal compromise serves as a stark reminder of the continuous need for robust cybersecurity practices across all sectors, particularly where sensitive user data is at stake.
It highlights the ingenuity of threat actors and the critical responsibility of both platform providers and recipient organizations to maintain unwavering vigilance in verifying the authenticity of data requests, thereby protecting user privacy against increasingly sophisticated digital deception.
.Disclaimer: This article was generated in part using artificial intelligence and may contain errors or omissions. The content is provided for informational purposes only and does not constitute professional advice. We makes no representations or warranties regarding its accuracy, completeness, or reliability. Readers are advised to verify the information independently before relying on