MLT (hacktivist)

MLT, real name Matthew Telfer,[8][9] (born 1994) is a current cybersecurity researcher, former black hat computer hacker and former member of TeaMp0isoN. MLT was arrested in May 2012 in relation to his activities within TeaMp0isoN, a computer-hacking group which claimed responsibility for many high-profile attacks, including website vandalism of the United Nations, Facebook, NATO, BlackBerry, T-Mobile USA and several other large sites in addition to high-profile denial-of-service attacks and leaks of confidential data. Another reason for MLT's arrest was due to his role in operating bitst0rm, a malicious hacking group with a particular emphasis on targeting known figures within the Computer Security Industry.[10][11] Currently, MLT is an Ethical Hacker, appearing to have changed his ways. MLT now responsibly discloses security flaws to affected companies, and he has publicly documented and helped remediate security flaws in over two thousand separate websites within recent years.[12] MLT now works in the Computer Security Industry and also runs his own Cyber-Security firm named Project Insecurity LTD.[13]

Matthew "MLT" Telfer[1]
Recent photograph of MLT
[2]
Born1994
NationalityBritish
Other namesNicknames include "jmpeax", "ret2libc", "popeax", "POP_POP_RET", or simply "M" - there are many alternative names used by this individual although "MLT" appears to be the most popular nickname[3][4][5]
EducationNorthumbria University
OccupationChief Executive Officer at Project Insecurity LTD, Freelance Bug Bounty Hunter, UK Chapter lead at GDI Foundation, and Content Writer for Secjuice Magazine [6]
Years active2006 - Present Day[7]
Known forFormer affiliation with TeaMp0isoN, Computer Security Research, Bug Bounties, Exploit Development
Websitehttps://mlt.sh/

History

Believed to be the former co-leader and spokesperson of TeaMp0isoN,[14] MLT, along with Junaid Hussain and other hackers targeted many large websites and corporations over a two year period, from 2010 up until 2012 when both individuals were arrested. The group first gained popularity after targeting infamous hacking collective LulzSec, releasing personal information on their members and purporting to have hacked their websites, they then went on to target sites such as NATO, and various government officials from the United Kingdom and United States of America .[15] The arrests finally came as a result of the probe into the alleged hacking and wiretapping of the British Security Services Anti-Terrorism Hotline.[16]

MLT also operated a Black Hat hacking group known as bitst0rm which targeted the Computer Security industry in particular. It appears bitst0rm had a similar Modus operandi to that of other hacking groups within the Anti-Security Movement. Some of the targets of bitst0rm were individuals such as Kevin Mitnick and Dan Kaminsky as well as companies including Norton, F-Secure, Stack Exchange and Stack Overflow Q&A sites, hak5.org, and Metasploit Project.[17] After MLT's arrest, bitst0rm finally disbanded.

MLT was suspected of having direct ties to the global hacking collective, Anonymous,[18] and states that he started his hacking career from an early age of around 12 or 13.[19] The popular computer vigilante known as The Jester has accused MLT of having ties to Crackas With Attitude,[20] a blackhat group that leaked several government documents pertaining to the CIA and FBI.[21] MLT was also suspected of having ties to the blackhat hacking group known as Lizard Squad, as suggested by cybersecurity intelligence firm IntelCrawler LLC in a threat intelligence report that was released.[22] These claims were also supported by The Jester.[23]

MLT was the former hacking partner[24] of Junaid Hussain, who later went on to join ISIS and was killed in a drone strike[25] by the US Government after becoming the third highest target on their 'kill list' due to his role in inspiring international lone-wolf terrorism alongside his hacking activities for ISIS under the banner of Islamic State Hacking Division. It was reported by Vice that Junaid Hussain remained in contact with MLT while in Syria, and that he used to occasionally ask for advice relating to hacking or would sometimes even openly boast about his activities within ISIS to MLT.[26]

MLT states that his "Greatest hacking challenge" was gaining administrative access to Facebook as it required him to think outside of the box and employ techniques that he usually would not attempt. He also states that the "funniest hack" he carried out was gaining access to a United States Army Web Server by reading the contents of the publicly disclosed passwd file then simply using the password to login to a publicly-accessible Secure Shell interface in order to connect to the server back-end as a Superuser (Also known as a root user, the highest possible user permissions on a Linux-Based or Unix-Based system)[27][28].

Arrest

On Wednesday 9 May 2012, MLT was arrested in Newcastle upon Tyne by the Metropolitan Police who released a statement saying: "The suspect, who is believed to use the online 'nic' 'MLT', is allegedly a member of and spokesperson for TeaMp0isoN ('TeamPoison')--a group which has claimed responsibility for more than 1,400 offences including denial of service and network intrusions where personal and private information has been illegally extracted from victims in the U.K. and around the world,"[29]

It was reported that MLT could have faced up to 10 years in prison for the events leading to his arrest.[30] Junaid Hussain who was also arrested in relation to the same offences received a 6 month sentence under the Computer Misuse Act and the Malicious Communications Act after pleading guilty to hacking the email account of Tony Blair, the former British Prime Minister.[31]

Recent activity

In more recent years, Matthew Telfer has focused his attention on legitimate security research rather than malicious Black Hat hacking. He has identified and reported critical vulnerabilities in sites such as eBay[32] and the U.S. Department of Defense[33] and states that he avoids illegal activities and instead dedicates his time to participating in Bug Bounty Programs.[34]

In May 2015, someone purporting to be MLT featured on CNN, speaking to them about Junaid Hussain and claiming that he witnessed him appear on video chat once as a 'black power ranger' while wielding an AK-47.[35] In August 2015, MLT featured on Episode 5 of the TV show Viceland Cyberwar where he spoke about subjects ranging from the security of autonomous cars to the death of his former hacking partner.[36][37]

In early 2016, MLT released a blog post titled "An intro to advanced Phishing techniques" which appears to have contained the first ever publicly documented mention of the method to bypass Punycode protections put in place to prevent IDN Homograph Attacks (A form of URL spoofing attack also known as Script Spoofing) from being carried out in all major web browsers.[38] Although a Chinese Security Researcher named Xudong Zheng was credited for discovering this particular bypass method, he did not post it until April 2017, indicating that it was discovered and publicly disclosed by MLT fourteen months prior to the discovery by Xudong Zheng.[39]

In 2017, MLT appears to have shifted his focus to exploit development, publishing several zero-day vulnerabilities online under the banner of a group known as Project Insecurity.[40]

In 2019, he opened a Q&A on Reddit, where he answered questions from users.

Career

After his arrest, Matthew Telfer shifted his focus towards legitimate security research rather than illegal activities.

Matthew Telfer is the founder and Chief Executive Officer of Project Insecurity LTD, an exploit research group and educational platform responsible for identifying security flaws in software used by a number of high-profile websites, some examples being Google, Twitter, PayPal, Bank of America, Kaspersky, AT&T, Tesla, Verizon Media, and Sony, among many other websites.

In addition to this, Matthew Telfer is widely known for his work within the Bug Bounty Community, having identified and reported flaws in websites such as PayPal, Microsoft, eBay, Imgur Amazon, FBI, CIA, Sony, United States Department of Defense, Federal Government of the United States, and several-thousand other high-profile websites.[41]

Matthew Telfer is listed as the UK Chapter Lead for GDI Foundation, a non-profit international humanitarian group operated by Victor Gervers.[42] The purpose of GDI Foundation is to defend the free and open internet through means of responsible disclosure and remediation of security flaws. It is a global foundation with its headquarters in The Netherlands[43] and its goal is to safe-guard and protect the open internet through responsible disclosure carried out by a number of volunteers.[44] This organization has helped many researchers disclose a large number of critical security flaws, and has also shed light on surveillance by the Chinese Government through various breaking news stories[45][46]. GDI Foundation also exposed to the public the fact that various high-profile dating applications were collecting data from users' chat history.[47]

Matthew Telfer also does Freelance writing for SecJuice Magazine, with informative tutorials covering topics such as how to secure yourself online and how to identify security vulnerabilities.[48]

References

  1. https://www.theregister.co.uk/2018/08/07/openemr_vulnerabilities/
  2. https://twitter.com/pop_pop_ret
  3. https://twitter.com/POP_POP_RET
  4. https://twitter.com/jmpeax
  5. https://instagram.com/pop_eax_
  6. https://uk.linkedin.com/in/matthew-telfer-bb2325167
  7. http://securityaffairs.co/wordpress/49735/hacking/teamp0ison-member-interview.html
  8. https://www.theregister.co.uk/2018/08/07/openemr_vulnerabilities/
  9. https://internetofbusiness.com/critical-security-flaws-found-in-popular-medical-records-software/
  10. Introduction to cyberwarfare: a multidisciplinary approach. 2013.
  11. "British Cops Arrest Third Teampoison Hacker". NBC. 2012. Retrieved 2016-09-20.
  12. https://www.openbugbounty.org/researchers/MLT/
  13. https://beta.companieshouse.gov.uk/company/11545346/officers
  14. "Teenager arrested accused of computer hacking". Sky News. 2012. Retrieved 2017-07-09.
  15. Deception in the Digital Age, exploiting and defending human targets. Cameron H. Malin. 2017. Retrieved 2016-09-20.
  16. "TeaMp0isoN Hacks Met Police Anti-Terror Hotline". Sky News. 2012. Retrieved 2016-09-20.
  17. "Archived copy". Archived from the original on 2012-11-19. Retrieved 2012-11-19.CS1 maint: archived copy as title (link)
  18. Introduction to cyberwarfare: a multidisciplinary approach. 2013.
  19. "teamp0ison member interview". Security Affairs. July 2016. Retrieved 2017-07-09.
  20. "Tcia-director-brennan-aol-hack-what-you-need-to-know". Jesters Court. 2015. Retrieved 2017-07-09.
  21. "cia-email-hackers-return-with-major-law-enforcement-breach". WIRED. November 2015. Retrieved 2017-07-09.
  22. "IC_GOP.pdf". IntelCrawler LLC. December 2014. Retrieved 2017-07-09.
  23. "The Stupid, it burns". The Jester. January 2015. Retrieved 2017-07-09.
  24. "How a Teenage Hacker Became the Target of a US Drone Strike". Vice. August 2016. Retrieved 2016-09-20.
  25. "British Born ISIS hacker killed in drone strike". The Independent. August 2015. Retrieved 2016-09-20.
  26. "British Hacker is No. 3 on Pentagon kill list". The Sunday Times. August 2015. Retrieved 2016-09-20.
  27. https://www.academia.edu/27828605/How_Linux_Works_What_Every_Super-User_Should_Know
  28. https://securityaffairs.co/wordpress/49735/hacking/teamp0ison-member-interview.html
  29. "teampoison hacker suspect has anonymous ties". darkreading.com. 2012-05-11. Retrieved 2016-09-20.
  30. "teenager arrested over teampoison hacking attacks". telegraph.co.uk. 2012-05-10. Retrieved 2016-09-20.
  31. "teamp0ison hacker trick pleads guilty to hacking tony blairs e-mail". threatpost.com. July 2012. Retrieved 2016-09-20.
  32. "eBay XSS bug left users vulnerable to (almost) undetectable phishing attacks". Sophos. January 2016. Retrieved 2016-09-20.
  33. "Researcher Finds Several 'Serious' Vulnerabilities in US Military Websites". Vice. January 2016. Retrieved 2016-09-20.
  34. "TeaMp0isoN member interview". Security Affairs. August 2016. Retrieved 2016-09-20.
  35. "ISIS jihadi linked to Garland attack has long history as hacker". CNN. May 2015. Retrieved 2016-09-20.
  36. "Cyberwar: Syria's Cyber Battlefields". Viceland. August 2015. Retrieved 2016-09-20.
  37. "MLT on the Future of Hacking". Viceland. August 2015. Retrieved 2016-09-20.
  38. https://ret2libc.wordpress.com/2016/02/01/an-intro-to-advanced-phishing-techniques/
  39. https://thehackernews.com/2017/04/unicode-Punycode-phishing-attack.html
  40. "Files From Project Insecurity". Packetstorm Security. 2017. Retrieved 2016-09-20.
  41. https://www.openbugbounty.org/researchers/MLT/
  42. https://github.com/GDI-foundation
  43. https://www.linkedin.com/company/gdi-foundation
  44. https://gdi.foundation/#/
  45. https://www.bleepingcomputer.com/news/security/over-90-million-records-leaked-by-chinese-public-security-department/
  46. https://www.npr.org/2019/08/29/751116338/china-intercepts-wechat-texts-from-u-s-and-abroad-researcher-says?t=1567626693042&t=1577090302221
  47. https://z6mag.com/2019/06/21/tinder-match-com-and-other-dating-apps-are-collecting-data-from-your-chat-history/
  48. https://uk.linkedin.com/in/matthew-telfer-bb2325167
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.