Don’t Gamble with your password resets!
The cautionary tale of the Leicestershire teenager who hacked high-ranking officials of NATO allies shows the need for improved password security
Kane Gamble, the Leicestershire teenager, is the terrifying example of what happens when IT help desk security measures take a disastrously wrong turn.
Gamble was only 15 years old when he waged an eight-month campaign of “cyberterrorism” between June 2015 to February 2016, whereby he gained access and leaked the details of high-ranking foreign intelligence officials and government employees.
By impersonating his multitude of victims while on the phone, he conned call centres and IT help desk employees at international telecommunication companies into divulging confidential information.
From there, Gamble proceeded to reset passwords and gain access to “extremely sensitive” documents on military operations in Iraq and Afghanistan. Not only did the teenager have unlimited access to secure information, his reign of cyber terror continued after deliberately leaking details of 20,000 security officials and targeting the boss of the foreign country’s spying agency, as well as the ex-director of the foreign country’s home security agency.
This personal, sensitive information was leaked online to various websites, including WikiLeaks.
The passwords of the ex-deputy director of the country’s home security agency were reset, and he claimed he and his family were bombarded with phone calls, resulting in them getting police protection.
Gamble used the phone numbers he obtained to call and taunt his victims and their families and take control of their devices, including iPads.
Evoking fear amongst his victims, the British teenager hacked into the country’s security chief’s home television and made the words ‘I own you’ appear on screen. The wife of the country’s homeland security chief was left a chilling voicemail message asking: “Hi Spooky, am I scaring you?”.
Prosecutor John Lloyd-Jones QC told a sentencing hearing at the Old Bailey: "The group incorrectly have been referred to as hackers. The group, in fact, used something known as social engineering, which involves socially manipulating people – call centres or help desks - into performing acts or divulging confidential information."
With a British teenage boy, who had not yet even sat his GCSEs, being able to gain access to the foreign country’s top-secret government files, the security of passwords and the information delivered by IT help desks has become subject of intense scrutiny and investigation.
Using self-service password reset with multi-factor authentication (i.e. sending a code via SMS) would have prevented all these breaches.
That’s why major organisations that want to be as secure as possible use ReACT – the leading self-service password reset tool. ReACT can secure all your systems and is the only solution that can secure all three security systems on the mainframe.
Ability to compel telecoms firms to gather data was introduced in Investigatory Powers Act
More staff and further improvements to digital service aim to cut waiting times
Department seeks leaders in the areas of digital enablement and cyber risk
Department looks to cultivate ‘modern security stack’
BT reviews an event looking at how man and machine are working together to drive digital transformation
Migrating to the cloud or moving to a future network can be a risky business. BT explains how managing applications is important for end user experience, productivity and for understanding and...
BT presents a new eGuide, looking at how to build infrastructure able to support growth both now and into the future
BT spoke with Ovum's Brian Washburn about the network trends taking place in 2019, covering SD-WAN, NFV, hybrid networking and cloud connectivity services