GCHQ Security Gaffe: Spooks Send Passwords In Plain Text

One of the UK’s core intelligence agencies, GCHQ, has been caught with its pants down, sending passwords in plain text – a fundamental no-no of Internet security.

Evidence that GCHQ is not adequately encrypting or hashing its passwords came to light in a blog post from budding security pro Dan Farrall. Hoping to apply for a job at the agency, Farrall realised he already had an account needed to apply for the role. He had forgotten his password, and asked for a reset. But instead of going through a secure passwords reset process, as is good practice, GCHQ just sent him his login information in a plain text email.

‘Shocking’ from GCHQ

“Pretty shocking in my opinion, so I sent them an email on the 28th of January letting them know about this issue, but have heard nothing back,” Farrall  wrote.

The GCHQ career site may not be run by an internal team, but given it was alerted about the issue some time ago, it will concern many to see nothing has been done.

It is possible that GCHQ is protecting the passwords it holds in its own storage, but sending them in plain text is still bad practice from a major intelligence body that is one of the leading organisations for the promotion of security in the UK.

Another UK giant, Tesco, came in for heavy criticism last year for doing the same thing. It eventually changed its ways after heavy press pressure.

GCHQ said it is in the process of changing systems, although did not say whether it would stop sending passwords in plain text.

“The current applicant tracking system used by GCHQ is a legacy system and we are currently in the process of changing it,” a GCHQ spokesperson said, in a statement emailed to TechWeekEurope. “Only the very small percentage of applicants (who need their accounts reset) are sent a new password. This comes with clear instructions of how to protect their data.”

Are you a security expert? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

View Comments

  • I contacted GCHQ a little over a year ago after running a metadata dig on various websites, GCHQ amongst a few others (The Cabinet Office aswell) were all leaking metadata.

    GCHQ showed me UNC paths to local directories (thus showing some internal infrastructure), usernames, applications and versions etc. I still have the output from that scan.

    I contacted the press office who responded with a thankyou and the next day it was resolved, but another rookie mistake.

    Never trust an organisations of secrets, they are all useless, never mind a democracy, we live in a idiocracy.

Recent Posts

SoftBank Promises To Invest $100bn In US

Japanese tech investment firm SoftBank promises to invest $100bn during Trump's second term to create…

20 hours ago

Synopsys, SiMa.ai To Collaborate On AI Car Chips

Synopsys to work with start-up SiMa.ai on joint offering to help accelerate development of AI…

20 hours ago

AI Start-Up Basis Raises $34m For Accountancy Agent

Start-up Basis raises $34m in Series A funding round for AI-powered accountancy agent to make…

21 hours ago

Databricks Raises $10bn In Huge AI Funding Round

Data analytics and AI start-up Databricks completes huge $10bn round from major venture capitalists as…

21 hours ago

Congo Files Complaints Against Apple Over Conflict Minerals

Congo files legal complaints against Apple in France, Belgium alleging company 'complicit' in laundering conflict…

22 hours ago