GCHQ Security Gaffe: Spooks Send Passwords In Plain Text

One of the UK’s core intelligence agencies, GCHQ, has been caught with its pants down, sending passwords in plain text – a fundamental no-no of Internet security.

Evidence that GCHQ is not adequately encrypting or hashing its passwords came to light in a blog post from budding security pro Dan Farrall. Hoping to apply for a job at the agency, Farrall realised he already had an account needed to apply for the role. He had forgotten his password, and asked for a reset. But instead of going through a secure passwords reset process, as is good practice, GCHQ just sent him his login information in a plain text email.

‘Shocking’ from GCHQ

“Pretty shocking in my opinion, so I sent them an email on the 28th of January letting them know about this issue, but have heard nothing back,” Farrall  wrote.

The GCHQ career site may not be run by an internal team, but given it was alerted about the issue some time ago, it will concern many to see nothing has been done.

It is possible that GCHQ is protecting the passwords it holds in its own storage, but sending them in plain text is still bad practice from a major intelligence body that is one of the leading organisations for the promotion of security in the UK.

Another UK giant, Tesco, came in for heavy criticism last year for doing the same thing. It eventually changed its ways after heavy press pressure.

GCHQ said it is in the process of changing systems, although did not say whether it would stop sending passwords in plain text.

“The current applicant tracking system used by GCHQ is a legacy system and we are currently in the process of changing it,” a GCHQ spokesperson said, in a statement emailed to TechWeekEurope. “Only the very small percentage of applicants (who need their accounts reset) are sent a new password. This comes with clear instructions of how to protect their data.”

Are you a security expert? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

View Comments

  • I contacted GCHQ a little over a year ago after running a metadata dig on various websites, GCHQ amongst a few others (The Cabinet Office aswell) were all leaking metadata.

    GCHQ showed me UNC paths to local directories (thus showing some internal infrastructure), usernames, applications and versions etc. I still have the output from that scan.

    I contacted the press office who responded with a thankyou and the next day it was resolved, but another rookie mistake.

    Never trust an organisations of secrets, they are all useless, never mind a democracy, we live in a idiocracy.

Recent Posts

Tesla Shares Surge On China Advanced Self-Driving Push

Tesla makes key advances toward advanced self-driving rollout in China as chief Elon Musk meets…

2 hours ago

UK Law Aims To Boost Security For ‘Smart’ Devices

New UK rules bring in basic security requirements for millions of internet-connected devices, aiming to…

3 hours ago

Alphabet Value Surges Over $2tn On Dividend Plan

Google parent Alphabet sees market capitalisation surge over $2tn on plan to over first-ever cash…

9 hours ago

Google Asks US Court To Dismiss Federal Adtech Case

Google asks Virginia federal court to dismiss case brought by US Justice Department and eight…

10 hours ago

Snap Sees Surge In Users, Ad Revenues

Snapchat parent Snap reports user growth, revenues in spite of tough competition, in what may…

10 hours ago

Shein Subject To Most Stringent EU Digital Rules

Quick-growing fast-fashion company Shein must comply with most stringent level of EU digital rules after…

11 hours ago