515

A case study in why credentials are revoked before firings.

top 50 comments
sorted by: hot top new old
[-] Cytobit@piefed.social 174 points 1 week ago

Why were they storing passwords in plaintext in the databases?!

[-] LadyMeow@lemmy.blahaj.zone 171 points 1 week ago

First time reading about government systems, eh?

[-] WereCat@lemmy.world 50 points 1 week ago

Why not? National Safety Department of Slovak Republic (Narodny Bezpecnostny Urad) had password NBUSK123… just government things

[-] testaccount789@sh.itjust.works 31 points 1 week ago

No, that was a bit different.
login: nbusr
password: nbusr123

load more comments (1 replies)
[-] msage@programming.dev 12 points 1 week ago

The K in password doesnt match Republic in the name.

Totally secure.

[-] echodot@feddit.uk 44 points 1 week ago

Because like all critical infrastructure it was setup by somebody's kid on work experience

[-] IWW4@lemmy.zip 20 points 1 week ago

Or some poor guy who is setting it up, because it is a one off and just get it done project, that metastasizes into a fucking mess.

[-] scytale@piefed.zip 7 points 1 week ago

Or lowest bidder contractor.

[-] IWW4@lemmy.zip 5 points 1 week ago

All contracts go to the lowest bidder.

[-] village604@adultswim.fan 5 points 1 week ago

Fun fact, if the federal government contracts your company for a service, you arent legally allowed to sell it others for less.

load more comments (1 replies)
load more comments (1 replies)
[-] betterdeadthanreddit@lemmy.world 18 points 1 week ago

It's like leaving your car door unlocked in a bad neighborhood so your window doesn't get smashed for the $.36 in the center console. Attacker might take the prize and go without showing that everything around it is just as poorly-built.

[-] JeeBaiChow@lemmy.world 8 points 1 week ago

Well how else would they help the users if they ever forgot their passwords? Duh.

/s

[-] CosmoNova@lemmy.world 8 points 1 week ago

Probably for the same reasons web browsers store them in plain text: They don‘t care.

[-] OwOarchist@pawb.social 18 points 1 week ago

the same reasons web browsers store them in plain text

Why one web browser stores them in plain text. Fucking Edge.

Who knows about the others, but I can pretty much guarantee you that Librewolf, for example, isn't doing that shit.

[-] VeganCheesecake@lemmy.blahaj.zone 13 points 1 week ago

If you can autofill passwords without authenticating in some way, they are probably either stored in plaintext, or encrypted with a key that is stored in plaintext. Cause, like, how is it supposed to magically encrypt it.

load more comments (1 replies)
[-] CosmoNova@lemmy.world 5 points 1 week ago

Firefox and chromium browsers also store them in plain text. I know because I literally copied them from a file when setting up my password manager.

[-] railwhale@lemmy.nz 5 points 1 week ago

I believe Firefox (and forks) only encrypt if you have set a master password.

load more comments (1 replies)
[-] ByteJunk@lemmy.world 112 points 1 week ago* (last edited 1 week ago)

Back in 2015, the brothers pled guilty in Virginia to a scheme involving wire fraud and computers. Muneeb was sentenced to three years in prison, while Sohaib got two.

I'm not gonna say there were signs that these two weren't the most law abiding of citizens to begin with, buuuuut...

[-] ParlimentOfDoom@piefed.zip 32 points 1 week ago

I briefly worked with a government client that would bring in prison laborers to collect trash. From the IT building of the tax agency.

But don't worry, they were just white collar criminals. You know, people who only went to jail for stealing... financial data... The very thing that was accessible in that building.

Genius.

load more comments (2 replies)
[-] VOwOxel@discuss.tchncs.de 15 points 1 week ago

Oh I'm sure the government loved taking them, since >Half of all Politicians are corrupt fraudsters.

load more comments (1 replies)
[-] MonkderVierte@lemmy.zip 12 points 1 week ago

wire fraud

Relatives of El Nasir?

[-] deegeese@sopuli.xyz 6 points 1 week ago

Company only paid for a 7 year background check, so you mis them getting out of prison 8 years ago.

load more comments (1 replies)
[-] rekabis@lemmy.ca 109 points 1 week ago

And why couldn’t they have done that to the student loans system?

Like JFC, they could have instantly made themselves immune from trial-by-jury anywhere in America by doing that one tiny thing.

[-] ApertureUA@lemmy.today 32 points 1 week ago* (last edited 1 week ago)

Probably not one of the 96(+) databases they had :(

DROP TABLE students

[-] FiniteBanjo@feddit.online 22 points 1 week ago* (last edited 1 week ago)

Student loans are loans from third party lenders which are cosigned by the federal government for collateral.

Even if every government record of it were destroyed, the loan servicers would have perfect multiple ledger copies of it all.

[-] rob_t_firefly@lemmy.world 6 points 1 week ago

Fight Clubs HATE this one simple trick!

[-] teyrnon@sh.itjust.works 12 points 1 week ago

Peter Thiel probably has a backup copy now from doge unfortunately.

[-] explodicle@sh.itjust.works 8 points 1 week ago

Oh for something important like that we have backups.

[-] modus@lemmy.world 5 points 1 week ago

Wasn't that a premise in Mr Robot?

[-] village604@adultswim.fan 7 points 1 week ago* (last edited 1 week ago)

It was kinda the premise of Fight Club, although private sector instead of public

[-] zeroConnection@programming.dev 86 points 1 week ago* (last edited 1 week ago)

Muneeb Akhter asked Sohaib Akhter for the plaintext password

The more scary part in this story is that the government stores your passwords in plain text!

So basically ANYONE with access to the database can steal your credentials, including employees, the government and any authorities.

Never re-use passwords.

[-] Corkyskog@sh.itjust.works 18 points 1 week ago

Every place I have worked, most of HR and like half of finance/accounting has access to your social security number, full address and phone number. Sometimes even the password and security questions you used for whatever BS portal they made you setup an account in.

[-] pineapplelover@lemmy.dbzer0.com 14 points 1 week ago

Never heard of hashing and salting apparently

[-] zeroConnection@programming.dev 16 points 1 week ago

"Oh yeah we did that at the last company barbeque event. They hashed and salted all the steaks"

[-] hakunawazo@lemmy.world 64 points 1 week ago

To be fair, what else could they do with that keyboard.

load more comments (2 replies)
[-] SeeMarkFly@lemmy.ml 40 points 1 week ago

Only a living wage can prevent data dumps.

Upper management can't even see it...yet.

[-] sundray@lemmus.org 34 points 1 week ago
[-] everett@lemmy.ml 38 points 1 week ago

Try not to delete any databases on your way to the parking lot!

[-] elvith@feddit.org 11 points 1 week ago

But I explicitly stated in the ~~CLAUDE.md~~ employee guidelines to not delete production databases!

[-] ArtVandelay@lemmy.world 10 points 1 week ago

"I can't go out for a pack of smokes without running into 9 databases that you dropped!"

load more comments (1 replies)
[-] wreckedcarzz@lemmy.world 7 points 1 week ago

Oops! All Databases

load more comments (2 replies)
[-] pelya@lemmy.world 32 points 1 week ago

“Eh, they can recover from yesterday,” he said, referring to daily database backups.

But did they recover from backups? Don't leave the most juicy intrigue out of the story.

[-] Speculater@lemmy.world 15 points 1 week ago

No one ever tested the backups so they don't know if they will work!

[-] Microtonal_Banana@lemmy.zip 28 points 1 week ago

Its always interesting when people are both very smart and also very stupid at the same time.

[-] buddascrayon@lemmy.world 17 points 1 week ago

Knowledgeable and smart are not the same thing. These two are very knowledgeable about the systems they worked on and database manipulation, believe it or not these are not hard skills to learn. But they were incredibly dumb regardless given every single action they took at every point in their lives.

[-] dustyData@lemmy.world 10 points 1 week ago

Fun fact. In psychology assessment this are being called hard skills: very technical abilities for doing specialized tasks; and soft skills: social and emotional abilities to navigate social contexts, manage conflict and self regulate emotions.

Hard skills are easier to teach, while soft skills are very hard.

[-] Gumus@lemmy.dbzer0.com 18 points 1 week ago

soft skills are very hard

🤔

load more comments (10 replies)
[-] ApeNo1@lemmy.world 13 points 1 week ago

Redundant twin brothers to handle the redundant twin backups.

[-] BlackLaZoR@lemmy.world 13 points 1 week ago* (last edited 1 week ago)

Muneeb and Sohaib Akhter, now both 34, had been in trouble before. Back in 2015, the brothers pled guilty in Virginia to a scheme involving wire fraud and computers. Muneeb was sentenced to three years in prison, while Sohaib got two.

They had a track record and found employment in government IT

HR should've been fired for that fuckup.

A case study in why credentials are revoked before firings.

No. A case study against employing known criminals.

load more comments (4 replies)
[-] SocialMediaRefugee@lemmy.world 10 points 1 week ago

Commits hundreds of crimes then starts bringing up god. Class act.

load more comments
view more: next ›
this post was submitted on 13 May 2026
515 points (98.5% liked)

Technology

84878 readers
6298 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS