An editor has nominated this article for deletion. You are welcome to participate in the deletion discussion, which will decide whether or not to retain it. |
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
|
Kevin McSheehan (born July 7, 1986) is an American cybersecurity researcher and ethical hacker from Plymouth, New Hampshire. His hometown is Lebanon, Maine. McSheehan is best known for finding cybersecurity vulnerabilities.
Kevin McSheehan | |
---|---|
Born | [1] | July 7, 1986
Occupation(s) | Cybersecurity researcher and programmer |
Known for | Cybersecurity, ethical hacking, software engineering |
He has discovered several exploits with CVSS ratings of High[2] and Critical.[citation needed] The most notable exploit was claiming an unregistered Telegram account from an accidentally published URL by the Central Intelligence Agency's Russian recruitment funnel on X.[3][4][5]
In 2015, he created software that would reveal Google, Microsoft, and other email services account names through a vulnerability with the Google Maps Engine. Google did not classify the issue as a security vulnerability.[6]
References
edit- ^ "Kevin McSheehan (@123456) / X". Retrieved June 21, 2024.
- ^ CVE-2023-33297
- ^ "Twitter glitch allows CIA informant channel to be hijacked". BBC. October 17, 2023. Retrieved 2024-06-21.
- ^ "Man Exploited CIA X Glitch to Reroute Russia Informants to His Telegram". Business Insider. October 18, 2023. Retrieved 2024-06-21.
- ^ "A Researcher Hijacked the CIA's Secure Contact Link for Informants Due to a Flaw in X". Vice. October 18, 2023. Retrieved 2024-06-21.
- ^ "Google Drive and Maps Engine Leak Name Info for Email Accounts". January 21, 2015. Retrieved June 21, 2024.