Dark Web Sales of Government Email Addresses from the US and More Expose Global Risks

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

Cybercriminals are selling active law enforcement and government email addresses from the U.S., U.K., India, Brazil, Germany, and more on dark web forums, with prices starting at $40, according to a recent report from Abnormal Security.

These accounts enable attackers to exploit institutional trust, carry out fraudulent activities, and access critical systems, posing severe cybersecurity risks.  

Methods of Compromise  

The offers advertise the sale of details such as government email addresses, full names, dates of birth, employer, home address, work and personal phone numbers, insurance company, and policy holder and number. However, passwords are not on the list.

Dark web sale of .gov email addresses, names, and more | Source: Abnormal AI 

According to the research, attackers employ several techniques to acquire these high-value accounts: 

European, Asian, and African accounts for sale on the dark web forums | Source: Abnormal AI

Once compromised, these accounts provide unfettered access to inboxes, systems, and services designed exclusively for law enforcement and government use.  

Implications and Risks  

Compromised accounts allow attackers to impersonate law enforcement or government officials, increasing the chances of successful phishing campaigns, fraud, and data theft. Fraudulent legal requests using these credentials further enhance their potential for misuse, enabling access to confidential information from telecom providers or social platforms. 

More troubling, some accounts are being marketed as "toolkits" for accessing restricted databases and investigative platforms.  

Securing Government Email Accounts  

Enhanced security measures like mandatory MFA, stricter password policies, and proactive phishing awareness training are essential to counter these threats. Prioritizing email account security in government institutions is crucial to mitigating future incidents and protecting sensitive public data.

Last month, reports highlighted a surge in phishing attacks impersonating financial institutions and payment platforms, and hackers cloned the U.S. Department of Education’s grant site in a credential theft campaign.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: