From the article: “According to court evidence, the incident began on Feb. 1, 2025, when Muneeb Akhter asked his brother for the plaintext password of a user who had submitted a complaint through the Equal Employment Opportunity Commission’s Public Portal.”
Comment on Former IT contractor convicted for wiping 96 US government databases
dabster291@lemmy.zip 8 hours agoYou can’t un-hash a hash back into plaintext, though…
alia@nord.pub 3 hours ago
shiftymccool@piefed.ca 1 hour ago
Copying and pasting doesn’t prove your point. HOW did they get the plain text password? Hashes aren’t reversible so they must be stored in plain text or are encrypted in a reversible fashion which is an amateur move as well. Either way, they somehow had access to the user’s password which is a huge no-no
Overwrite7445@lemmy.ca 19 minutes ago
Still possible to find the plaintext using rainbow tables. Especially so if hashed without a salt and using MD5.
Do you really think they implemented proper password hashing?