Revealed the hacker attacking email Mrs. Palin

US authorities have identified suspects who attacked the Yahoo Mail account of the party's vice-presidential candidate, Sarah Palin.

The National Security Agency (Secret Service) and the US Federal Bureau of Investigation (FBI) on September 17 officially launched an investigation into the attack. So far, the suspect has been identified as the son of Democratic Party Senator Mike Kernell. He is named David Kernel - 20 years old and currently a student at Tennessee-Knoxville University.

Senator Mike Kernell himself also officially confirmed the above information but refused to disclose more information about his son.

Traces left

In an article published on a hacker website, a person named 'rubico' explained in great detail how he used to break into Palin's Yahoo Mail email account.

Revealed the hacker attacking email Mrs. Palin Picture 1 David Kernel - Suspects attacked Palin's email account. ( Wjnoblog image ) According to this, the hacker has come from media sources that appear in the media to trace Ms. Palin's Yahoo Mail address. Then by searching the Internet, this hacker found the 'Washilla High School' answer to a secret question ' Where dit you meet your husband? '(Where did you meet your partner for the first time?).

And then the hacker took advantage of a vulnerability in Yahoo Mail's password-changing mechanism to change the password set by Ms. Palin as a separate password. From there, he was able to freely access Palin's email account, steal information and take it online.

Specifically, Yahoo Mail's password deletion mechanism only requires the user to enter the correct email address, enter the correct CAPTCHA code and correctly answer the secret question that the password can be changed without the need for an email address. Alternate email was previously declared in the user profile.

The security community said secret types of questions such as the name of a favorite pet, the first car, the mother's offering name . are all information that hackers can easily find on the Internet. The hacker himself attacked Palin's email account and confirmed that it took him only 45 minutes to find the answer to the secret question.

Following the article, hacker 'rubico' expressed his anger when he could not download all the documents and information in Palin's email account and also published the password and screenshot. content of several emails, family photos, contents of Mrs. Palin's mailbox. Not only that 'rubico' also asks other hackers to use the password he published to check the information in the article.

The website administrator has used the password revealed by 'rubico' to log in, change the password and contact the password for Palin and warn her of a hacker breaking in. email account.

Follow the track

After determining that 'rubico' has used a proxy server to conceal its origin, the proxy service provider Ctunnel has actively cooperated with the FBI to investigate and trace IP addresses. This hacker. This IP address is then confirmed to belong to David Kernel.

Shortly after it was discovered, most of David's accounts at YouTube, MySpace and other email accounts were blocked. Notably among David's email accounts there is an account using username 'rubico10'. Not only that, David often uses the name 'rubico' on a variety of online groups and forums that he participates in.

However, the information that David announced also sparked a debate about whether Palin violated the prohibition against using personal e-mail accounts to resolve public issues. is not. American law requires all governor's emails to be archived, except for personal emails.

4 ★ | 1 Vote

May be interested

  • Microsoft admits that hacker Lapsus$ stole the source codeMicrosoft admits that hacker Lapsus$ stole the source code
    a series of major technology companies in the world are becoming victims of the lapsus$ hacker group. after attacking nvidia, samsung and many other companies, recently this group of hackers also claimed to have successfully hacked microsoft and obtained part of the source code of bing and cortana in a block of data of nearly 37gb.
  • Detecting new culprits attacking Windows 10Detecting new culprits attacking Windows 10
    kaspersky security researchers have discovered a new culprit - puzzlemaker - who used the google chrome and windows 10 zero-day exploit chain in highly targeted attacks against multiple companies all around the world.
  • This is a way to prevent hackers from stealing your data when using public WifiThis is a way to prevent hackers from stealing your data when using public Wifi
    one advice is to be cautious when browsing the web. never let your curiosity be the cause of unworthy errors. on your browser, block and remove all tracking cookies. especially 'stay away' from unsafe and unknown sources (beware of free software), and stay away from 'suspicious' links sent to your email or links that appear on new feeds social networking sites.
  • Stunned because the 'worm' spread via emailStunned because the 'worm' spread via email
    symantec's security response department has warned of a new worm w32.imsolk.b@mm that is spreading through e-mail at a dizzying speed, attacking hundreds of thousands of computers around the world.
  • Teen hacker is believed to be behind the notorious hacker group Lapsus$Teen hacker is believed to be behind the notorious hacker group Lapsus$
    in recent weeks, the lapsus$ hacker group has appeared in the media. security researchers are actively investigating the activities of the lapsus$ hacker group.
  • 10 tips to help you avoid hacker trap10 tips to help you avoid hacker trap
    using computers is familiar in a modern and vibrant city like hongkong. in 2009, the number of internet-related crimes increased dramatically ...
  • Appears a free game that allows you to practice being a hackerAppears a free game that allows you to practice being a hacker
    anonymous hacker simulator is a simulation game, allowing you to transform into a professional white hat hacker with the mission to uncover the conspiracy behind the civil data surveillance program of a dark organization.
  • Send Email using PHPSend Email using PHP
    php must be configured correctly in the php.ini file with details about how your system sends email. open php.ini available in the / etc / directory and find the section that starts with [mail function].
  • Beware of the 7 most common types of spamBeware of the 7 most common types of spam
    email, as we know, is always the most vulnerable object on the internet today. anyone who has ever used email is no stranger to having to spend time 'processing' the spam pile almost regularly.
  • Try being a hacker with these 4 hacking simulators!Try being a hacker with these 4 hacking simulators!
    have you ever imagined yourself in the role of a hacker? one way to do that is through a hacking emulator. through these emulators, you can experience the scenarios and challenges that a hacker faces today.