Kane Gamble who is the leader of the hacking group “Crackas With Attitude” used social engineering methods to pose as a CIA director John Brennan’s and to gain unauthorized access to Extremely Sensitive accounts.
The Hacking group “Crackas With Attitude” well known for social engineering attacks, which involves in convincing the people and they subject the victims to harassment and abuse.
Gamble is now 18 years old and he was only 15 when he possed as Brennan himself to gain access to sensitive data such as passwords, contact list and other documents.
John Lloyd-Jones QC prosecutor Said, “He accessed some extremely sensitive accounts referring to, among other things, military operations and intelligence operations in Afghanistan and Iran.”
Also Read OnePlus Website Hacked and Attackers Stolen Many Customers Credit Card Details
He also targetted deputy director of FBI Mark Giuliano, Jeh Johnson secretary of Homeland Security and Director of National Intelligence James Clapper.
Gamble was caught in February 2016, in October 2017, Kane Gamble conceded to ten charges identified with the aimed interruptions happened between late 2015 and mid-2016.
Two different individuals from Crackas With Attitude group, Andrew Otto Boggs, and Justin Gray Liverman, were captured by FBI in September 2016 and had just been condemned to five years in the federal prison.
He took control over John Brennan’s email account to play pranks with his family and even took control over his wife’s iPad.
Gamble was arrested in February 2016 Gamble was arrested in February 2016 at his council home in Coalville, he was pleaded guilty for 8 cases involved in performing an unauthorized computer and 2 for unauthorized modification of computer material.
Mr. Lloyd-Jones added: ‘He reported to a journalist, “It all started by me getting more and more annoyed at how corrupt and cold-blooded the US government are. So I decided to do something about it”.The teenager is waiting for the final sentence.
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…
Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…
Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…
Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…
Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…