Monday, July 15, 2024
EHA

15-year-old Hacker Acted as CIA Chief to Gain access to Extremely Sensitive Accounts

Kane Gamble who is the leader of the hacking group “Crackas With Attitude” used social engineering methods to pose as a CIA director John Brennan’s and to gain unauthorized access to Extremely Sensitive accounts.

The Hacking group “Crackas With Attitude” well known for social engineering attacks, which involves in convincing the people and they subject the victims to harassment and abuse.

Gamble is now 18 years old and he was only 15 when he possed as Brennan himself to gain access to sensitive data such as passwords, contact list and other documents.

John Lloyd-Jones QC prosecutor Said, “He accessed some extremely sensitive accounts referring to, among other things, military operations and intelligence operations in Afghanistan and Iran.”

Also Read OnePlus Website Hacked and Attackers Stolen Many Customers Credit Card Details

He also targetted deputy director of FBI Mark Giuliano, Jeh Johnson secretary of Homeland Security and Director of National Intelligence James Clapper.

Gamble was caught in February 2016, in October 2017, Kane Gamble conceded to ten charges identified with the aimed interruptions happened between late 2015 and mid-2016.

Two different individuals from Crackas With Attitude group, Andrew Otto Boggs, and Justin Gray Liverman, were captured by FBI in September 2016 and had just been condemned to five years in the federal prison.

He took control over John Brennan’s email account to play pranks with his family and even took control over his wife’s iPad.

Gamble was arrested in February 2016 Gamble was arrested in February 2016 at his council home in Coalville, he was pleaded guilty for 8 cases involved in performing an unauthorized computer and 2 for unauthorized modification of computer material.

Mr. Lloyd-Jones added: β€˜He reported to a journalist, β€œIt all started by me getting more and more annoyed at how corrupt and cold-blooded the US government are. So I decided to do something about it”.The teenager is waiting for the final sentence.

Website

Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles