CIA protected its top-secret hacking tools with 123ABCdef

Tomcat

Professional
Messages
2,689
Reaction score
920
Points
113
b0690c8cecdc9194141d7.png


Many have heard of Joshua Schulte, who is accused of leaking "top-secret" hacking tools from the CIA. Schult is currently under arrest, and his case is being investigated by the court. During a recent meeting, several interesting details emerged regarding the practices of the American intelligence service.

According to the prosecution, Joshua Schult stole extremely valuable and confidential materials directly from the hands of the CIA, and then handed them over to WikiLeaks for distribution.

US federal prosecutors are striving for one thing - to put Schult in prison for life. However, Sabrina Shroff, the defendant's lawyer, strongly disagrees with this position, who more than once drew the court's attention to extremely faint evidence against her client.

According to the case file (PDF), Schult worked under the pseudonyms "King Josh" and "KingJosh3000", which he used during his time as a system administrator at the CIA.

This whole situation with access to secret tools of such a serious intelligence service gave rise to certain questions, one of which sounded quite justified: how poorly the CIA protects such information and files.

And now the most interesting thing is that the password from the virtual machine on which the aforementioned tools were stored was just a classic of weak credentials - "123ABCdef". And the root login from the main DevLAN server was no better - "mysweetsummer".
 
Top