this post was submitted on 13 May 2026
4 points (100.0% liked)

Technology

84699 readers
4874 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

A case study in why credentials are revoked before firings.

top 33 comments
sorted by: hot top controversial new old
[–] BlackLaZoR@lemmy.world 3 points 2 days ago* (last edited 2 days ago) (1 children)

Muneeb and Sohaib Akhter, now both 34, had been in trouble before. Back in 2015, the brothers pled guilty in Virginia to a scheme involving wire fraud and computers. Muneeb was sentenced to three years in prison, while Sohaib got two.

They had a track record and found employment in government IT

HR should've been fired for that fuckup.

A case study in why credentials are revoked before firings.

No. A case study against employing known criminals.

[–] isVeryLoud@lemmy.ca 2 points 18 hours ago (1 children)

Both conclusions are correct, but step 1 was a background check

[–] BlackLaZoR@lemmy.world 1 points 17 hours ago (1 children)

Don't know how it works in US, but in most of EU you're obligated to notify the employee about termination of work agreement like a month in adavnce. In case of IT revoking access that early would mean effectively month of paid leave.

[–] isVeryLoud@lemmy.ca 1 points 17 hours ago (1 children)
[–] BlackLaZoR@lemmy.world 2 points 17 hours ago

Sounds nice.

That's why it doesn't happen

Commits hundreds of crimes then starts bringing up god. Class act.

[–] zeroConnection@programming.dev 4 points 4 days ago* (last edited 4 days ago) (1 children)

Muneeb Akhter asked Sohaib Akhter for the plaintext password

The more scary part in this story is that the government stores your passwords in plain text!

So basically ANYONE with access to the database can steal your credentials, including employees, the government and any authorities.

Never re-use passwords.

Never heard of hashing and salting apparently

[–] hakunawazo@lemmy.world 3 points 4 days ago

To be fair, what else could they do with that keyboard.

[–] Cytobit@piefed.social 4 points 4 days ago (5 children)

Why were they storing passwords in plaintext in the databases?!

[–] LadyMeow@lemmy.blahaj.zone 5 points 4 days ago

First time reading about government systems, eh?

[–] WereCat@lemmy.world 3 points 4 days ago (2 children)

Why not? National Safety Department of Slovak Republic (Narodny Bezpecnostny Urad) had password NBUSK123… just government things

[–] testaccount789@sh.itjust.works 4 points 4 days ago (1 children)

No, that was a bit different.
login: nbusr
password: nbusr123

[–] WereCat@lemmy.world 1 points 3 days ago
[–] msage@programming.dev 1 points 4 days ago

The K in password doesnt match Republic in the name.

Totally secure.

[–] echodot@feddit.uk 1 points 4 days ago

Because like all critical infrastructure it was setup by somebody's kid on work experience

[–] JeeBaiChow@lemmy.world 1 points 4 days ago

Well how else would they help the users if they ever forgot their passwords? Duh.

/s

[–] CosmoNova@lemmy.world 1 points 4 days ago (1 children)

Probably for the same reasons web browsers store them in plain text: They don‘t care.

[–] OwOarchist@pawb.social 1 points 4 days ago (1 children)

the same reasons web browsers store them in plain text

Why one web browser stores them in plain text. Fucking Edge.

Who knows about the others, but I can pretty much guarantee you that Librewolf, for example, isn't doing that shit.

If you can autofill passwords without authenticating in some way, they are probably either stored in plaintext, or encrypted with a key that is stored in plaintext. Cause, like, how is it supposed to magically encrypt it.

[–] rekabis@lemmy.ca 2 points 4 days ago (4 children)

And why couldn’t they have done that to the student loans system?

Like JFC, they could have instantly made themselves immune from trial-by-jury anywhere in America by doing that one tiny thing.

[–] FiniteBanjo@feddit.online 3 points 3 days ago* (last edited 3 days ago)

Student loans are loans from third party lenders which are cosigned by the federal government for collateral.

Even if every government record of it were destroyed, the loan servicers would have perfect multiple ledger copies of it all.

[–] explodicle@sh.itjust.works 1 points 3 days ago

Oh for something important like that we have backups.

[–] ApertureUA@lemmy.today 1 points 4 days ago* (last edited 4 days ago)

Probably not one of the 96(+) databases they had :(

DROP TABLE students

[–] modus@lemmy.world 0 points 4 days ago (1 children)

Wasn't that a premise in Mr Robot?

[–] village604@adultswim.fan 1 points 3 days ago* (last edited 3 days ago)

It was kinda the premise of Fight Club, although private sector instead of public

[–] ByteJunk@lemmy.world 2 points 4 days ago* (last edited 4 days ago) (1 children)

Back in 2015, the brothers pled guilty in Virginia to a scheme involving wire fraud and computers. Muneeb was sentenced to three years in prison, while Sohaib got two.

I'm not gonna say there were signs that these two weren't the most law abiding of citizens to begin with, buuuuut...

[–] ParlimentOfDoom@piefed.zip 1 points 4 days ago

I briefly worked with a government client that would bring in prison laborers to collect trash. From the IT building of the tax agency.

But don't worry, they were just white collar criminals. You know, people who only went to jail for stealing... financial data... The very thing that was accessible in that building.

Genius.

[–] pelya@lemmy.world 1 points 4 days ago (1 children)

“Eh, they can recover from yesterday,” he said, referring to daily database backups.

But did they recover from backups? Don't leave the most juicy intrigue out of the story.

[–] Speculater@lemmy.world 1 points 4 days ago

No one ever tested the backups so they don't know if they will work!

[–] sundray@lemmus.org 1 points 4 days ago
[–] Microtonal_Banana@lemmy.zip 0 points 4 days ago (1 children)

Its always interesting when people are both very smart and also very stupid at the same time.

[–] buddascrayon@lemmy.world 1 points 4 days ago

Knowledgeable and smart are not the same thing. These two are very knowledgeable about the systems they worked on and database manipulation, believe it or not these are not hard skills to learn. But they were incredibly dumb regardless given every single action they took at every point in their lives.