Back to Insights & News
December 14, 2025
6 min read
Marco Grima
Cybersecurity

Fake Cops Stealing Your Data From Big Tech Right Now

Hackers posing as police are social engineering Big Tech into handing over private user data. Multiple companies targeted. Here's what's happening.

Fake Cops Stealing Your Data From Big Tech Right Now
Share this article:

Hackers are pretending to be cops. And Big Tech is falling for it.

In what security researchers are calling a sophisticated social engineering campaign, threat actors posing as law enforcement officials have successfully manipulated employees at major technology companies into providing access to private user data. This isn't a software vulnerability you can patch overnight. This is human manipulation at scale. And it's working.

The attacks represent a troubling shift in how hackers target Big Tech. They're not trying to breach firewalls anymore. They're picking up the phone, claiming to have a warrant, and asking nicely for what they want. Employees—even those trained in security—are handing over sensitive information because the person on the other end sounds like they have legal authority.

The Social Engineering Playbook That's Fooling Everyone

Cybercriminals impersonating police officers

Cybercriminals impersonating police officers

The attack pattern is methodical. Threat actors research specific employees at target companies—sometimes starting with lower-level support staff who have database access but less skepticism about authority figures. They call claiming to be investigating a crime or cyber incident. They reference real case numbers, real legal terminology, and real-sounding urgency. Some attackers have even used spoofed phone numbers that appear to come from actual law enforcement agencies.

Once they establish fake credibility, they request very specific data. User account information. Metadata. Private messages. Payment information. They know exactly what to ask for because they've studied the company's infrastructure. This isn't spray-and-pray social engineering. This is precision-targeted manipulation.

The genius of this approach? It bypasses every technical security measure your company has spent millions defending. Your VPNs don't matter. Your firewalls are irrelevant. Your encryption is worthless when an authorized employee voluntarily hands over the decryption keys.

Why Big Tech's Defenses Are Crumbling Against This

Technology companies have security teams. They have policies. They have training modules about not trusting phone calls. Yet these attacks are succeeding across multiple organizations simultaneously.

The vulnerability isn't technical—it's organizational. Most employees have been trained to respect authority figures. When someone claims to be law enforcement, social conditioning kicks in. People assume if you sound official, you probably are official. Adding time pressure ("We need this immediately for an active investigation") or veiled threats ("If you don't cooperate, we'll have to escalate this") creates the psychological conditions where good employees make bad security decisions.

Companies also struggle with verification procedures. Real law enforcement, when they want data from tech companies, typically go through proper legal channels—subpoenas, warrants, mutual legal assistance treaties. But verifying whether someone actually IS a cop isn't straightforward over the phone. Attackers know that calling back to a main police number might connect to their accomplices. They know that asking for verification can make them sound less credible.

The scale of the problem suggests this campaign has been running for weeks or months before being publicly disclosed. That means thousands of employees across multiple companies have potentially been contacted. Many probably hung up. But some didn't.

The Data At Risk: Everything

We don't yet know the full scope of compromised data. Technical details about which specific information was accessed have not been publicly disclosed. But based on how these social engineering campaigns typically work, the attackers likely obtained:

  • User account credentials and authentication tokens
  • Private messages and communications
  • Payment and billing information
  • Email addresses and phone numbers
  • Location data and IP addresses
  • Subscriber information

For millions of users, this represents a complete privacy breach. Not because of a software flaw, but because someone who worked at a tech company trusted the wrong voice on the phone.

Data not yet available on exact number of users affected across all targeted companies. But given the sophistication and duration of the campaign, the number likely reaches into the millions.

The Real Threat: This Is Just The Beginning

This attack proves something critical: social engineering at scale works. Now that this method has succeeded, you can expect it to spread.

Criminal groups will teach each other the techniques. Ransomware gangs will add it to their playbook before launching network attacks. Nation-state actors who previously relied on technical exploits will start supplementing their operations with simple phone calls. The barrier to entry is almost zero. You just need confidence and the ability to research your targets.

Meanwhile, every tech company is now in panic mode trying to figure out if their employees were compromised. They're reviewing call logs. They're interviewing staff. They're implementing emergency verification procedures. Some are requiring employees to hang up and call back on verified company numbers before providing ANY data. Others are implementing multi-person approval processes even for "law enforcement" requests.

But here's the problem: you can't patch human nature. Even with better policies, determined attackers will find the social engineer's greatest advantage—the one employee who makes the mistake.

What Users Should Do Right Now

If you're a user of any major tech platform, you should assume your data may have been compromised. This means:

  • Change your passwords immediately. Use unique, complex passwords for each service.
  • Enable multi-factor authentication everywhere that offers it.
  • Monitor your accounts for suspicious activity.
  • Be skeptical of any unsolicited communications claiming to be from companies or authorities.
  • Check your financial accounts regularly for unauthorized transactions.
  • Consider a credit freeze if your financial data was exposed.

The companies being targeted should be notifying users. As of now, most have not released official statements about which data was compromised or what users should do. This silence itself is alarming.

Bottom Line: The Phone Call Is Your Biggest Security Risk

This attack proves that no amount of sophisticated security infrastructure matters if someone can convince your employees to bypass it with the right phone call. The future of cybercrime isn't hacking into systems—it's social engineering your way past the humans who control them.

Big Tech spent billions on security. They hardened their networks. They deployed AI-powered threat detection. They hired elite security researchers. And a threat actor with a phone and a convincing story defeated all of it. That's not a technical problem waiting for a software patch. That's an institutional problem that requires completely rethinking how companies verify requests for sensitive data—especially ones claiming legal authority. Until that happens, expect these attacks to intensify.


AI Generated Image | AI Generated Image

Need IT Support?

Ready to implement these solutions for your Malta business? Our experts are here to help.