News: 1752218947

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Security company hired a used car salesman to build a website, and it didn't end well

(2025/07/11)


On Call Welcome once again to On Call, The Register 's Friday column that shares your stories of tech support terror and triumph.

This week, meet a fellow reader we'll Regomize as "Boris" who shared a story from his time working at a cybersecurity firm that specialized in email and web security.

His story starts when the company's support team ran a customer satisfaction survey and dangled the prospect of winning an iPad to encourage participation.

[1]

"After much grumbling from our notoriously frugal CFO, a handful of iPads were finally purchased," he told On Call. "Naturally, IT was tasked with keeping them safe, so we locked them in a secure safe inside the IT room."

[2]

[3]

"Fast-forward a year – yes, a whole year – and the support team finally got around to the big giveaway. We retrieved the iPads from the safe and handed them to the support manager."

A few minutes later, that manager stormed into IT and demanded to know where he could find the iPads, as someone had made a razor-thin cut through the plastic in which Apple wraps its tablets and made off with the machines. The manager even accused Boris and his IT team of stealing them.

[4]

"Weeks passed. Door access logs were reviewed, and suddenly our Head of Legal was fired," Boris told On Call. "Turns out, the company had hired an ex-convict for the role, and he'd helped himself to the iPads."

In the wake of the incident, Boris's employer decided to conduct mandatory background checks on all staff.

Which is why a couple of days after the company lawyer got his marching orders, Boris received an email that included a username to log into a site on which employees were now required to upload numerous identity documents and credentials.

[5]

Boris checked out the site and could find no reviews, noticed it loaded over the insecure HTTP before redirecting to HTTPs, and couldn’t shake the feeling it was not much more than a WordPress installation.

The site was also a little confusing as it accepted his username and then demanded a password, but the email Boris received didn't include that credential.

Given the importance of the site and the data it would store, Boris decided to investigate further.

After pressing F12 to access his browser's Developer Tools, he found his password in the site's code.

It wasn't a strong password at all. Indeed it was related to Boris's name in unsophisticated ways that hinted at similar passwords for all other employees.

Boris tested his theory and was able to guess all his colleagues' passwords and, once he used them, see all the info they'd uploaded to the background check data store.

Boris reported this mess to the HR person who sent the emails, then demonstrated the problem.

She exploded in a fit of rage.

"Why would you do that?!" she shouted. "This is a disciplinary offence!"

[6]'Trained monkey' from tech support saved know-it-all manager's mistake with a single keypress

[7]Don't shoot me, I'm only the system administrator!

[8]Techie traveled 4 hours to fix software that worked perfectly until a new hire used it

[9]User demanded a 'wireless' computer and was outraged when its battery died

Boris retreated and found a senior manager who he felt would understand the gravity of his discovery. That manager calmed the HR person who tersely demanded the site be fixed.

Another investigation ensued, during which it was discovered the HR person hired a friend – an actual used car salesman – to develop the background check website.

"We never found out how much he was paid," Boris told On Call. "And we never got an apology for being accused of stealing the iPads or for being forced to hand over our personal data to a dodgy used car dealer under threat of termination."

Instead of waiting, Boris took matters into his own hands and got a new job.

Have you been blamed for a workplace crime you did not commit? It's an offense not to share such a story with On Call by [10]clicking here to send us an email that tells your tale! ®

Get our [11]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aHDgt0iyJ454_g1pLi7X1QAAAU0&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aHDgt0iyJ454_g1pLi7X1QAAAU0&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aHDgt0iyJ454_g1pLi7X1QAAAU0&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aHDgt0iyJ454_g1pLi7X1QAAAU0&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aHDgt0iyJ454_g1pLi7X1QAAAU0&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[6] https://www.theregister.com/2025/07/04/on_call/

[7] https://www.theregister.com/2025/06/27/on_call/

[8] https://www.theregister.com/2025/06/20/on_call/

[9] https://www.theregister.com/2025/06/13/on_call/

[10] mailto:oncall@theregister.com

[11] https://whitepapers.theregister.com/



Korev

Another investigation ensued, during which it was discovered the HR person hired a friend – an actual used car salesman – to develop the background check website.

In most companies this would go against HR policy; I wonder if the HR Droid got the boot for this?

KittenHuffer

I think the HR Droid probably got the whole car, not just the boot!

-------> Mine's the one that has the jangle of used car keys in the pocket if you shake it!

xyz123

Not when she's given some parts of her human "resources" to the boss. On his desk. When everyone else has gone home.

Boris sensibly buggered off...

Anonymous Coward

"Another investigation ensued, during which it was discovered the HR person hired a friend – an actual used car salesman – to develop the background check website."

" In most companies this would go against HR policy; I wonder if the HR Droid got the boot for this? "

Threatening an employee with unwarranted disciplinary action to conceal your own misdeeds would in many jurisdictions constitute a criminal offence.

Clearly couldn't be the case in the US where all law is private; literally privilege .

Taken as a whole I cannot imagine from my experience that the firm that employed Boris would change at all, even after his departure at least until the receivers rolled up.

Korev

"Weeks passed. Door access logs were reviewed, and suddenly our Head of Legal was fired," Boris told On Call. "Turns out, the company had hired an ex-convict for the role, and he'd helped himself to the iPads."

Well, I guess he was familiar with the law...

MiguelC

It's the same reasoning people use for hiring ex*-hackers to do cybersecurity

[* for any value of "ex"]

"I Could Be So Good for You"

Anonymous Coward

" Used car salesman – to develop the website. "

Anyone else get a picture of Arthur Daley ably assisted by his minder, Terry, knocking up shonky WordPress sites as a sideline ?

A nice little earner.

Re: "I Could Be So Good for You"

Michael H.F. Wilkinson

I was put in mind of CMOT Dibbler or perhaps Bergholt Stuttley Johnson entering the web design market

Re: "I Could Be So Good for You"

Anonymous Coward

Back in the 1980's, when th eUK "Enterprise Initiative" was in full swing, grants were available to companies to hire consultants to help them get BS5750 (later ISO9001) certification. Consultants had to be registered with an oversight body but the qualification requirements were quite low. In my region one of the approved consultants had previously been a user-car salesman and used his skills to sell his skills and get a lot of work.

The scheme had some quite strict rules - the day-rate for the fees, a limit to the number of days (15), and the company had to pass a subsequent third-party certification audit. Those rules were perfect for him as it was possible to meet them with cut-and-paste/search-and-replace document templates, and being present during the audit (and selecting an audit body that employed box-ticking auditors). However, most management systems produced this way soon fell apart as they were not designed for the actual business. I picked up quite a bit of work helping companies sort out the mess they ended up with, as did colleagues.

That reminds me

Eclectic Man

"Given the importance of the site and the data it would store, Boris decided to investigate further.

After pressing F12 to access his browser's Developer Tools, he found his password in the site's code.

It wasn't a strong password at all. Indeed it was related to Boris's name in unsophisticated ways that hinted at similar passwords for all other employees.

Boris tested his theory and was able to guess all his colleagues' passwords and, once he used them, see all the info they'd uploaded to the background check data store.

Boris reported this mess to the HR person who sent the emails, then demonstrated the problem.

She exploded in a fit of rage.

"Why would you do that?!" she shouted. "This is a disciplinary offence!"

"

This reminds me of an event last millennium when home banking was just a new thing. One customer logged on to the Barclays site to check his account. He found that he had access to any account except his own. Concerned at this major security flaw he contacted Barclays and explained the issue, and was promptly accused of hacking their web site. Barclays eventually did accept their web site had an undesirable 'feature' and withdrew their allegation.

Management generally blames the messenger, not the culprit, especially when that culprit is them.

Re: That reminds me

Ochib

Pressing F12 is hacking

https://techcrunch.com/2021/10/15/f12-isnt-hacking-missouri-governor-threatens-to-prosecute-local-journalist-for-finding-exposed-state-data/

Re: That reminds me

John Sager

I found an issue with a bank's app and reported to my contact at the bank. He passed it on and their tech people were quite grateful I had spotted it. I was expecting the 'shoot the messenger' treatment so I was quite pleased it got resolved amicably.

"Boris took matters into his own hands and got a new job"

Pascal Monett

Yes, I do believe that that was the best thing he could do.

Betweeen the idiot hiring an ex-convict as company lawyer and the bitch getting her buddy (lover ?) to be paid for a Wordpress website hosting private data, that company was obviously a complete write-off and nothing good could have come from trying to actually make things work correctly.

Re: "Boris took matters into his own hands and got a new job"

Anonymous Coward

Betweeen the idiot hiring an ex-convict as company lawyer and the bitch getting her buddy (lover ?) to be paid for a Wordpress website hosting private data, that company was obviously a complete write-off

Any resemblance to the administrative arrangements of a quondam superpower are unintended and purely coincidental.

It was obviously...

Mishak

going to be a car wreck.

Sam not the Viking

We had an HR person from a sister-company, she proposed an on-line personal-data storage 'application'. "It's free" What could possibly go wrong? Apart from the usual address and employee reference etc, this store would hold banking details, passport, drivers licence...... I'm no security genius but I steadfastly refused for any of my personal information to be stored in this manner. I was threatened with disciplinary action.

At a demonstration of the app's power she held a training session for all of us. Being a super-user, she had access to everyone's data. In the demo, she confided that her password was her daughter's name: "Maisie". Furthermore, she used it for all her passwords......

Incredibly, the system was not adopted and she didn't darken our premises again, so not all bad news ---->

"she didn't darken our premises again"

Anonymous Coward

Only for the few seconds as she passed the building's windows on the path of her expedited descent into the company carpark.

Actually Simon might have actually encouraged the use of the software as he and the PFY would never need pay for their drinks or much else ever again. Still Maisie's mom would still require Simon's assistance to exit the building; you don't leave any loose ends hanging around.

Log

Rtbcomp

I was once accused of leaving a log where it could be easily seen. This was completely untrue as I didn't even have a key for that particular room.

Re: Log

Anonymous Anti-ANC South African Coward

Was it a proper Captain's Log?

Re: Log

LogicGate

The captain had more of a beam than what you would normally call a captain's log.

The first mate handled the log, and the rest of the ship was full of seamen.

Re: Log

KittenHuffer

And was the cabin boy named Roger?

Re: Log

Korev

> I was once accused of leaving a log where it could be easily seen.

So who saw it?

Re: Log

Anonymous Anti-ANC South African Coward

Hope the Bossly Unit did...

Re: Log

breakfast

The Carpenters.

Re: Log

WonkoTheSane

Robert Plant

tatatata

I once had to review the security of a physical security system made by a reputable firm in that domain.

In the morning, we had presentations on how safe the badges were, how everything was encrypted, and how people could see their own entry times etcetera.

Lunch, and then demo.

The salesperson logged in and showed his access times. The URL was https://some.name/something?p=1234321. Asked what that number was; it was his personnel number. Asked the personnel number of the other salesperson and filled that in and had instantly access to the other's access times without new login. Scared white faces from sales persons. 10 seconds to break the system, without f12.

And that was made by a reputable firm, not a car salesman. Granted: end of the previous century, but still.

Anonymous Anti-ANC South African Coward

That reminds me of when the City of Johannesburg had the exact same vulnerability - you could log in on their website and with a little bit of URL manipulation, view other people's accounts etc.

CoJ threatened a massive lawsuit against the "hackers" as well as the person who reported it initially.

Nothing happened.

There are two types of Linux developers - those who can spell, and
those who can't. There is a constant pitched battle between the two.
(From one of the post-1.1.54 kernel update messages posted to c.o.l.a)