Google Confirms Hackers Breached Law Enforcement Request System, No Data Accessed

Google confirmed hackers created a fraudulent account in its Law Enforcement Request System (LERS), used for official data requests, but no user data was accessed. The breach, quickly detected and shut down, highlights vulnerabilities in secure portals and raises concerns about potential misuse of law enforcement tools.
Google Confirms Hackers Breached Law Enforcement Request System, No Data Accessed
Written by Jill Joy

In a startling revelation that underscores the vulnerabilities even tech giants face, Google has confirmed that hackers successfully created a fraudulent account within its Law Enforcement Request System (LERS), a portal used by authorities worldwide to submit official data requests. The breach, first reported by BleepingComputer, highlights the sophisticated tactics employed by cybercriminals to infiltrate secure systems. According to the report, the intruders did not access user data or compromise broader Google services, but the incident raises alarms about potential misuse of law enforcement tools.

The LERS platform is designed to facilitate legal requests for user information, such as emails or location data, from agencies like the FBI or international police forces. Google emphasized in its statement that the fraudulent account was quickly detected and shut down, with no evidence of data exfiltration. However, cybersecurity experts warn that even brief access could allow bad actors to submit bogus requests or glean insights into how legitimate ones are processed.

Implications for Law Enforcement Collaboration

This incident comes amid a wave of high-profile breaches targeting tech infrastructure. Posts on X, formerly Twitter, from users like cybersecurity analyst Joseph Cox, have long highlighted similar risks, including past leaks of police data that exposed sensitive operations. In this case, Google’s swift response—detailed in notifications to affected parties—prevented escalation, but it prompts questions about authentication protocols in platforms handling sensitive requests.

Industry insiders point out that LERS relies on verified credentials, yet hackers exploited a vulnerability to forge an account. A related SecurityWeek article on a separate Salesforce-related hack earlier this year suggests a pattern of targeting enterprise tools. Google has since bolstered security measures, including enhanced verification and monitoring, but the breach could erode trust between tech firms and law enforcement.

The Broader Context of Cyber Threats

Delving deeper, this event echoes the ShinyHunters campaign, as noted in a The Hacker News analysis, where attackers used vishing attacks to breach SaaS platforms like those integrated with Google services. The group’s activities in 2025 have already impacted companies such as Workday, leading to data exposures that fueled phishing scams against Gmail users.

For tech professionals, the key takeaway is the need for zero-trust architectures in sensitive portals. Google’s confirmation aligns with a Cybersecurity News report on an August 2025 Salesforce breach, which notified users of potential risks. While no user data was stolen here, the potential for hackers to impersonate law enforcement could lead to unauthorized surveillance or data grabs in future incidents.

Preventive Measures and Future Safeguards

Experts recommend multifactor authentication tied to hardware keys and AI-driven anomaly detection to counter such threats. Discussions on Reddit’s technology subreddit, including the thread at reddit.com/r/technology, reflect public concern over recurring breaches, with users debating the balance between accessibility for authorities and robust security.

As cyber threats evolve, Google’s handling of this breach sets a precedent. The company is collaborating with law enforcement to investigate, per BleepingComputer sources, but insiders stress that transparency will be crucial to maintaining partnerships. This incident, while contained, serves as a reminder that no system is impervious, urging a reevaluation of how tech giants secure interfaces with global authorities.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us