GCHQ Security Gaffe: Spooks Send Passwords In Plain Text

One of the UK’s core intelligence agencies, GCHQ, has been caught with its pants down, sending passwords in plain text – a fundamental no-no of Internet security.

Evidence that GCHQ is not adequately encrypting or hashing its passwords came to light in a blog post from budding security pro Dan Farrall. Hoping to apply for a job at the agency, Farrall realised he already had an account needed to apply for the role. He had forgotten his password, and asked for a reset. But instead of going through a secure passwords reset process, as is good practice, GCHQ just sent him his login information in a plain text email.

‘Shocking’ from GCHQ

“Pretty shocking in my opinion, so I sent them an email on the 28th of January letting them know about this issue, but have heard nothing back,” Farrall  wrote.

The GCHQ career site may not be run by an internal team, but given it was alerted about the issue some time ago, it will concern many to see nothing has been done.

It is possible that GCHQ is protecting the passwords it holds in its own storage, but sending them in plain text is still bad practice from a major intelligence body that is one of the leading organisations for the promotion of security in the UK.

Another UK giant, Tesco, came in for heavy criticism last year for doing the same thing. It eventually changed its ways after heavy press pressure.

GCHQ said it is in the process of changing systems, although did not say whether it would stop sending passwords in plain text.

“The current applicant tracking system used by GCHQ is a legacy system and we are currently in the process of changing it,” a GCHQ spokesperson said, in a statement emailed to TechWeekEurope. “Only the very small percentage of applicants (who need their accounts reset) are sent a new password. This comes with clear instructions of how to protect their data.”

Are you a security expert? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

View Comments

  • I contacted GCHQ a little over a year ago after running a metadata dig on various websites, GCHQ amongst a few others (The Cabinet Office aswell) were all leaking metadata.

    GCHQ showed me UNC paths to local directories (thus showing some internal infrastructure), usernames, applications and versions etc. I still have the output from that scan.

    I contacted the press office who responded with a thankyou and the next day it was resolved, but another rookie mistake.

    Never trust an organisations of secrets, they are all useless, never mind a democracy, we live in a idiocracy.

Recent Posts

LastPass Separates From Parent After Security Incidents

New chapter for LastPass as it becomes an independent company to focus on cybersecurity, after…

2 hours ago

US To Ban Huawei, ZTE From Certifying Wireless Kit

US FCC seeks to ban Chinese telecom firms at centre of national security concerns from…

6 hours ago

Anthropic Launches Enterprise-Focused Claude, Plus iPhone App

Two updates to Anthropic's AI chatbot Claude sees arrival of a new business-focused plan, as…

8 hours ago

TikTok Viewed As Chinese Influence Tool By Most Americans – Poll

Most people in the United States view TikTok as a Chinese influence tool a poll…

22 hours ago

Ofcom Confirms OnlyFans Investigation Over Age Verification

UK regulator confirms it is investigating whether OnlyFans is doing enough to prevent children accessing…

23 hours ago