use a key!
so why the picture of a telephone? well that is the key that a hacker used to gain entrance to the contact information of thousands of FBI and Department
of Homeland Security employees online, on Monday, the hacker made
good on said threat and released the information, first from the DHS, then from
the FBI, the hacker who released the information claimed to have had access to
up to 200GB further of information, meaning there could be plenty more releases
to come in the days ahead but how could this happen to two of America’s most high-profile agencies? in every chain there is a weak link, in this case a human, from Motherboard,
'The data was obtained, the hacker told Motherboard, by first
compromising the email account of a DoJ employee, although he would not
elaborate on how that account was accessed in the first place. (On Monday, the
hacker used the DoJ email account to contact this reporter). From there, he
tried logging into a DoJ web portal, but when that didn't work, he phoned up
the relevant department. “So I called up, told them I was new and I didn't
understand how to get past [the portal],” the hacker told Motherboard. “They
asked if I had a token code, I said no, they said that's fine—just use our
one.”'
there you have it, take probably the most secure systems in the world and then give out the 'keys' a similar thing happened to CIA chief John Brennan’s personal email, according to one hacker, it just goes to show how easy it is to hack into someones account when humans are in the loup!
No comments:
Post a Comment