John Jackson (hacker)
   HOME

TheInfoList



OR:

John Jackson (born ) also known as Mr. Hacking, is an American
security researcher A security hacker or security researcher is someone who explores methods for breaching or bypassing defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, prote ...
and founder of the
white-hat A white hat (or a white-hat hacker, a whitehat) is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabilit ...
hacking group Sakura Samurai.


Early career and education

Jackson served in the United States Marine Corps from 2012 until 2017, where he was a
petroleum engineer Petroleum engineering is a field of engineering concerned with the activities related to the production of hydrocarbons, which can be either crude oil or natural gas or both. Exploration and production are deemed to fall within the ''upstrea ...
and logistics manager. He was discharged from the military after suffering an injury, and began attending the LeaderQuest Colorado certification bootcamp. After studying at LeaderQuest and learning on his own, he earned several cybersecurity certificates including
ITIL ITIL (previously and also known as Information Technology Infrastructure Library) is a framework with a set of practices (previously processes) for IT activities such as IT service management (ITSM) and IT asset management (ITAM) that focus ...
,
CompTIA The Computing Technology Industry Association, more commonly known as CompTIA, is an American trade association that issues temporary vendor-neutral professional certifications for the information technology (IT) industry. Certifications All ce ...
A+ and Security+, and EC-Council Certified Network Defender (CND) and
Certified Ethical Hacker Certified Ethical Hacker (CEH) is a qualification given by EC-Council and obtained by demonstrating knowledge of assessing the security of computer systems by looking for vulnerabilities in target systems, using the same knowledge and tools as a m ...
(CEH).


Career

Jackson's first cybersecurity job was for Staples as an
endpoint detection and response Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is a cybersecurity technology that continually monitors an "endpoint" (e.g. a client device such as a mobile phone, laptop, Internet of things devi ...
engineer. Jackson then became an
application security Application security (short AppSec) includes all tasks that introduce a secure software development life cycle to development teams. Its final goal is to improve security practices and, through that, to find, fix and preferably prevent security is ...
engineer at
Shutterstock Shutterstock, Inc. is an American provider of stock photography, stock footage, stock music, and editing tools; it is headquartered in New York. Founded in 2002 by programmer and photographer Jon Oringer, Shutterstock maintains a library of ar ...
from 2019 until 2021, where he was involved with maintaining the security of their web applications, managing their
bug bounty program A bug bounty program is a deal offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security vulnerabilities. If no fin ...
, and managing their static and
dynamic application security testing Dynamic application security testing (DAST) represents a non-functional testing process to identify security weaknesses and vulnerabilities in an application. This testing process can be carried out either manually or by using automated tools. Manu ...
tools. While employed with Shutterstock, he also worked as a
penetration test A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is perform ...
er with 1337 Inc. and did bug bounty hunting in his spare time.


Independent research

In March 2020, Jackson published a blog post about a vulnerability he had discovered with the Talkspace mental health app, after he told the company about the issue and was dismissed. Talkspace sent him a
cease and desist A cease and desist letter is a document sent by one party, often a business, to warn another party that they believe the other party is committing an unlawful act, such as copyright infringement, and that they will take legal action if the oth ...
letter shortly after the post was published, in what ''
TechCrunch TechCrunch is an American global online newspaper focusing on topics regarding high tech, high-tech and Startup company, startup companies. It was founded in June 2005 by Archimedes Ventures, led by partners Michael Arrington and Keith Teare. I ...
'' described as "just the latest example of security researchers facing legal threats for their work". In November 2020, Jackson and researcher Sick.Codes discovered two vulnerabilities in
TCL TCL or Tcl or TCLs may refer to: Business * TCL Technology, a Chinese consumer electronics and appliance company ** TCL Electronics, a subsidiary of TCL Technology * Texas Collegiate League, a collegiate baseball league * Trade Centre Limited ...
brand televisions. The first would allow attackers on the adjacent network to access most system files, potentially leading to critical information disclosure. The second would allow attackers to read and write files in vendor resources directories, which could allow
arbitrary code execution In computer security, arbitrary code execution (ACE) is an attacker's ability to run any commands or code of the attacker's choice on a target machine or in a target process. An arbitrary code execution vulnerability is a security flaw in softwa ...
or enable attackers to compromise other systems on the network. After Jackson and Sick.Codes reported the vulnerability to TCL, TCL deployed a patch—however, Jackson and his researcher partner said the fix raised further concerns, as there had been no notification that the software had been updated, and TCL appeared to have full control over the device. The vulnerability came to be described in media as a "Chinese backdoor". In a December 2021 speech to
The Heritage Foundation The Heritage Foundation (or simply Heritage) is an American Conservatism in the United States, conservative think tank based in Washington, D.C. Founded in 1973, it took a leading role in the conservative movement in the 1980s during the Presi ...
, Acting
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
Secretary
Chad Wolf Chad Fredrick Wolf (born June 21, 1976) is an American former government official and lobbyist who was named the acting United States secretary of homeland security in November 2019. His appointment was ruled unlawful in November 2020. Wolf was ...
said his agency was investigating the vulnerability due to concerns that the Chinese manufacturer may have "expos dusers to cyber breaches and data exfiltration". Also in November 2020, Jackson found a
server-side request forgery Server-side request forgery (SSRF) is a type of computer security exploit where an attacker abuses the functionality of a server causing it to access or manipulate information in the realm of that server that would otherwise not be directly acces ...
vulnerability in , a popular
JavaScript JavaScript (), often abbreviated as JS, is a programming language and core technology of the World Wide Web, alongside HTML and CSS. Ninety-nine percent of websites use JavaScript on the client side for webpage behavior. Web browsers have ...
library published on npm. In March 2021, Jackson and other researchers discovered a similar bug in , a package used by around 278,000 software projects. The bug had existed for more than nine years. In April 2021, the group discovered the same flaw existed in the
Python Python may refer to: Snakes * Pythonidae, a family of nonvenomous snakes found in Africa, Asia, and Australia ** ''Python'' (genus), a genus of Pythonidae found in Africa and Asia * Python (mythology), a mythical serpent Computing * Python (prog ...
standard library In computer programming, a standard library is the library (computing), library made available across Programming language implementation, implementations of a programming language. Often, a standard library is specified by its associated program ...
, and more broadly was affecting other languages such as
Perl Perl is a high-level, general-purpose, interpreted, dynamic programming language. Though Perl is not officially an acronym, there are various backronyms in use, including "Practical Extraction and Reporting Language". Perl was developed ...
, Go, and
Rust Rust is an iron oxide, a usually reddish-brown oxide formed by the reaction of iron and oxygen in the catalytic presence of water or air moisture. Rust consists of hydrous iron(III) oxides (Fe2O3·nH2O) and iron(III) oxide-hydroxide (FeO(OH) ...
. In December 2020, Jackson and Nick Sahler reported that they had gained access to a large quantity of sensitive data associated with the children's website
Neopets ''Neopets'' is a free-to-play virtual pet site, virtual pet browser game. First launched in 1999, the game allows users to own virtual pets ("Neopets") and explore a virtual world called "Neopia." Players can earn one of two virtual currency, v ...
. The data included database credentials, employee emails, and website source code. In September 2021, Jackson and Sick.Codes disclosed a vulnerability they had found in Gurock's
test management tool Test management tools are used to store information on how testing is to be done, plan testing activities and report the status of quality assurance activities. The tools have different approaches to testing and thus have different sets of feature ...
TestRail, in which improper access control would allow access to a list of application files and file paths, which could then potentially expose sensitive data such as hardcoded credentials or API keys.


Sakura Samurai

In 2020, Jackson founded Sakura Samurai, a white-hat hacking and security research group. Other current and former members of the group have included Robert Willis,
Aubrey Cottle Aubrey Cottle (born ), also known as Kirtaner or Kirt, is a Canadian website forum administrator who claims to be an early member of the hacktivist group Anonymous. Cottle was involved with Anonymous during the late 2000s and in its resurgence ...
, and
Higinio Ochoa Higinio Ochoa, also known as w0rmer, is an American hacker. In 2012, while associated with the hacker group CabinCr3w (part of Anonymous), he was arrested by the US Federal Bureau of Investigation (FBI) and ultimately served two years in federal ...
. In January 2021, Jackson and other members of Sakura Samurai publicly reported that they had discovered exposed
git Git () is a distributed version control system that tracks versions of files. It is often used to control source code by programmers who are developing software collaboratively. Design goals of Git include speed, data integrity, and suppor ...
directories and git credential files on domains belonging to two groups within the
United Nations The United Nations (UN) is the Earth, global intergovernmental organization established by the signing of the Charter of the United Nations, UN Charter on 26 June 1945 with the stated purpose of maintaining international peace and internationa ...
. The vulnerability exposed more than 100,000 private employee records. In March 2021, Jackson and others in the group publicly disclosed vulnerabilities that affected 27 groups within the Indian government. After finding exposed git and configuration directories, Sakura Samurai were able to access credentials for critical applications, more than 13,000 personal records, police reports, and other data. The group also discovered vulnerabilities relating to
session hijacking In computer science, session hijacking, sometimes also known as cookie hijacking, is the exploitation of a valid computer session—sometimes also called a ''session key''—to gain unauthorized access to information or services in a computer s ...
and
arbitrary code execution In computer security, arbitrary code execution (ACE) is an attacker's ability to run any commands or code of the attacker's choice on a target machine or in a target process. An arbitrary code execution vulnerability is a security flaw in softwa ...
on finance-related governmental systems. After the issues reported to India's National Critical Information Infrastructure Protection Centre went unaddressed for several weeks, Sakura Samura involved the
U.S. Department of Defense The United States Department of Defense (DoD, USDOD, or DOD) is an executive department of the U.S. federal government charged with coordinating and supervising the six U.S. armed services: the Army, Navy, Marines, Air Force, Space Force, t ...
Vulnerability Disclosure Program, and the issues were remediated. Jackson and other Sakura Samurai members found a vulnerability in Pegasystems' Pega Infinity
enterprise software Enterprise software, also known as enterprise application software (EAS), is computer software used to satisfy the needs of an organization rather than its individual users. Enterprise software is an integral part of a computer-based information ...
suite, which is used for customer engagement and digital process automation. The vulnerability, which was first reported to Pegasystems in February 2021, involved a possible misconfiguration that would enable data exposure. The vulnerability led to the researchers breaching systems belonging to both
Ford Motor Company Ford Motor Company (commonly known as Ford) is an American multinational corporation, multinational automobile manufacturer headquartered in Dearborn, Michigan, United States. It was founded by Henry Ford and incorporated on June 16, 1903. T ...
and
John Deere Deere & Company, Trade name, doing business as John Deere (), is an American corporation that manufactures agricultural machinery, heavy equipment, forestry machinery, diesel engines, drivetrains (axles, Transmission (mechanical device), transmi ...
, incidents which were publicly disclosed in August 2021. Jackson and other members of Sakura Samurai have also reported notable vulnerabilities related to organizations and software including
Apache Velocity Apache Velocity first released in April 2001, is a Java-based template engine that provides a template language to reference objects defined in Java code. It aims to ensure clean separation between the presentation tier and business tiers in a W ...
, Keybase, and
Fermilab Fermi National Accelerator Laboratory (Fermilab), located in Batavia, Illinois, near Chicago, is a United States Department of Energy United States Department of Energy National Labs, national laboratory specializing in high-energy particle phys ...
.


Publications

*


References

{{DEFAULTSORT:Jackson, John Year of birth uncertain 1990s births Living people Ethical hackers Sakura Samurai United States Marines