Don’t Gamble with your password resets!

Written by Inspired Solutions on 20 June 2018 in Sponsored Article
Sponsored Article

The cautionary tale of the Leicestershire teenager who hacked high-ranking officials of NATO allies shows the need for improved password security

Kane Gamble, the Leicestershire teenager, is the terrifying example of what happens when IT help desk security measures take a disastrously wrong turn.

Gamble was only 15 years old when he waged an eight-month campaign of “cyberterrorism” between June 2015 to February 2016, whereby he gained access and leaked the details of high-ranking foreign intelligence officials and government employees.

By impersonating his multitude of victims while on the phone, he conned call centres and IT help desk employees at international telecommunication companies into divulging confidential information. 

From there, Gamble proceeded to reset passwords and gain access to “extremely sensitive” documents on military operations in Iraq and Afghanistan. Not only did the teenager have unlimited access to secure information, his reign of cyber terror continued after deliberately leaking details of 20,000 security officials and targeting the boss of the foreign country’s spying agency, as well as the ex-director of the foreign country’s home security agency. 

This personal, sensitive information was leaked online to various websites, including WikiLeaks.

The passwords of the ex-deputy director of the country’s home security agency were reset, and he claimed he and his family were bombarded with phone calls, resulting in them getting police protection. 

Gamble used the phone numbers he obtained to call and taunt his victims and their families and take control of their devices, including iPads. 

Evoking fear amongst his victims, the British teenager hacked into the country’s security chief’s home television and made the words ‘I own you’ appear on screen. The wife of the country’s homeland security chief was left a chilling voicemail message asking: “Hi Spooky, am I scaring you?”.

Prosecutor John Lloyd-Jones QC told a sentencing hearing at the Old Bailey: "The group incorrectly have been referred to as hackers. The group, in fact, used something known as social engineering, which involves socially manipulating people – call centres or help desks - into performing acts or divulging confidential information."

With a British teenage boy, who had not yet even sat his GCSEs, being able to gain access to the foreign country’s top-secret government files, the security of passwords and the information delivered by IT help desks has become subject of intense scrutiny and investigation.

Using self-service password reset with multi-factor authentication (i.e. sending a code via SMS) would have prevented all these breaches. 

That’s why major organisations that want to be as secure as possible use ReACT – the leading self-service password reset tool. ReACT can secure all your systems and is the only solution that can secure all three security systems on the mainframe. 

 

Inspired Solutions distributes software in the UK and Ireland. Its portfolio of products addresses the most important areas in the datacentre for both mainframe and distributed platforms.

Share this page

Tags

Categories

Related Articles

AI fought the law?
4 October 2019

The relationship between artificial intelligence and the law is receiving ever greater focus – while somehow becoming less clear. PublicTechnology looks at the role that regulators and...

Watch: NHS and industry experts discuss opportunities and challenges of AI
4 October 2019

Webinar discussion – which is available to view for free – covers ethics, technical barriers, and key use cases of artificial intelligence

Related Sponsored Articles

Protecting what matters most: Security for growth
15 October 2019

Security can help you grow whilst protecting the very core of your organisation, writes BT 

Secure SD-WAN: Security by design
8 October 2019

BT looks at how to secure your SD-WAN services, starting with security by design 

Cloud security – it’s not black and white
1 October 2019

Nigel Hawthorn looks at how to review cloud use, report on risks and apply policies to reduce likely data loss incidents in this latest insight from BT

The CISOs and CIOs guide to securing networks in a digital age
24 September 2019

New network technology creates new risk, but the same technology is driving a step-change in how we think about security, writes BT