this post was submitted on 23 Jul 2025
67 points (100.0% liked)

Facepalm

3348 readers
1 users here now

founded 2 years ago
MODERATORS
 

“Cognizant was not duped by any elaborate ploy or sophisticated hacking techniques,” according to a copy of the lawsuit reviewed by Reuters. “The cybercriminal just called the Cognizant Service Desk, asked for credentials to access Clorox’s network, and Cognizant handed the credentials right over.”

https://www.nbcnews.com/business/business-news/lawsuit-says-clorox-hackers-got-passwords-simply-asking-rcna220313

you are viewing a single comment's thread
view the rest of the comments
[–] ReachMinusOne@lemmy.zip 1 points 1 week ago (1 children)

In high school, some friends essentially did the same thing. They fired up the tech support chat, using a real customer's username that the company included in a screenshot on the homepage as part of their product demo, and told support they needed them to send over the password because so-and-so was out of the office and they needed access. Support sent along full credentials. The software in question was a messaging app that my friends wanted to use on the school computers to chat while in class. Very innocuous, and no real harm or national security concerns.

FBI eventually got involved, and friends got put on double secret probation at school as a result. The dean of students later made an announcement at an assembly that he recently had to expel two students for "sending an email to California", all this while I was actively sitting next to one of said "expelled" students during the assembly.

Since they were both minors at the time, no real long-term issues came from it. One even worked for the feds for a while after college.

[–] Death_Equity@lemmy.world 1 points 1 week ago

Yeah, using government property for a crime is generally not a smart idea. Lol