Kristoffer von Hassel

Last updated

Kristoffer von Hassel
Born2008 (age 1516)
NationalityAmerican
OccupationStudent
Known forBeing the world's youngest hacker

Kristoffer Wilhelm von Hassel (born 2008) is an American boy known for being the world's youngest known hacker [1] and notable for being the youngest "security researcher" listed on Microsoft's Security Techcenter as having exposed a security vulnerability. [2] At the age of five, Hassel exposed security lapses in the Microsoft Live Xbox system, prompting wide media coverage, with some journalists highlighting the dropping age of hackers and their technology mastery.

Contents

Personal life

Hassel's dad works in computer security. They live in Ocean Beach, near California. [3] When the media started covering Hassel in early April 2014, he was enrolled in Kindergarten. [4]

Hacking initiative

After wanting to play his father's video games but having parental blocks preventing it, five-year-old Hassel tried hacking into the Xbox Live system by trying different combinations of passwords. Eventually, he found a back door security glitch that allowed him first to enter the wrong password, then in the following screen to enter a series of spaces to unlock the system. [2] After he had "exploited the security hole", Hassel's parents found him playing the restricted video games and sternly asked him how he gained access. After he showed them, Davies contacted Microsoft to let them know about the security problem. [5] Microsoft responded “We’re always listening to our customers and thank them for bringing issues to our attention. We take security seriously at Xbox and fixed the issue as soon as we learned about it.” They also provided Hassel with a free year-long subscription to Microsoft Live Gold, four video games and $50USD. [6]

On its website, Microsoft has listed Hassel as one of its Security Researchers, of whom he is the youngest. [2] Of the people listed on the page as security researchers, he has been called "the most unusual but perhaps the most significant". [7] [8]

Davies has stated that Hassel had also learned "three or four other hacks" by the age of five, including how to bypass smartphone screen locks. [9]

Title

Hassel has been identified as the world's youngest hacker, beating out others who have also been quite young. The Huffington Post has reported on "teenage tech geniuses" [10] and The New York Times has stated "in some hacking circles, 15 would be considered middle aged." They continue to say that the age for hacking, coding, and tech adaptability continues to drop. [11]

See also

Related Research Articles

<span class="mw-page-title-main">SQL injection</span> Computer hacking technique

In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution. SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.

The Xbox network, formerly known as Xbox LIVE, is an online multiplayer gaming and digital media delivery service created and operated by Microsoft Gaming for the Xbox brand. It was first made available to the original Xbox console on November 15, 2002. An updated version of the service became available for the Xbox 360 console at the system's launch in November 2005, and a further enhanced version was released in 2013 with the Xbox One. This same version is also used with Xbox Series X and Series S. This service, in addition to a Microsoft account, is the account for Xbox ecosystem; accounts can store games and other content.

Homebrew, when applied to video games, refers to software produced by hobbyists for proprietary video game consoles which are not intended to be user-programmable. The official documentation is often only available to licensed developers, and these systems may use storage formats that make distribution difficult, such as ROM cartridges or encrypted CD-ROMs. Many consoles have hardware restrictions to prevent unauthorized development.

<span class="mw-page-title-main">Peiter Zatko</span> American computer security expert

Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

The Xbox 360 is a home video game console developed by Microsoft. As the successor to the original Xbox, it is the second console in the Xbox series. It competed with Sony's PlayStation 3 and Nintendo's Wii as part of the seventh generation of video game consoles. It was officially unveiled on MTV on May 12, 2005, with detailed launch and game information announced later that month at the 2005 Electronic Entertainment Expo (E3).

<span class="mw-page-title-main">Xbox (console)</span> Video game console by Microsoft

The Xbox is a home video game console manufactured by Microsoft that is the first installment in the Xbox series of video game consoles. It was released as Microsoft's first foray into the gaming console market on November 15, 2001, in North America, followed by Australia, Europe and Japan in 2002. It is classified as a sixth-generation console, competing with Sony's PlayStation 2 and Nintendo's GameCube. It was also the first major console produced by an American company since the release of the Atari Jaguar in 1993.

<span class="mw-page-title-main">Dan Kaminsky</span> American computer security researcher (1979–2021)

Daniel Kaminsky was an American computer security researcher. He was a co-founder and chief scientist of Human Security, a computer security company. He previously worked for Cisco, Avaya, and IOActive, where he was the director of penetration testing. The New York Times labeled Kaminsky an "Internet security savior" and "a digital Paul Revere".

<span class="mw-page-title-main">Kinect</span> Motion-sensing input device for the Xbox 360 and Xbox One

Kinect is a discontinued line of motion sensing input devices produced by Microsoft and first released in 2010. The devices generally contain RGB cameras, and infrared projectors and detectors that map depth through either structured light or time of flight calculations, which can in turn be used to perform real-time gesture recognition and body skeletal detection, among other capabilities. They also contain microphones that can be used for speech recognition and voice control.

weev Internet troll and hacker

Andrew Alan Escher Auernheimer, best known by his pseudonym weev, is an American computer hacker and professional Internet troll. Affiliated with the alt-right, he has been described as a neo-Nazi, white supremacist, and antisemitic conspiracy theorist. He has used many aliases when he has contacted the media, but most sources state that his real first name is Andrew.

RockYou was a company that developed widgets for MySpace and implemented applications for various social networks and Facebook. Since 2014, it has engaged primarily in the purchases of rights to classic video games; it incorporates in-game ads and re-distributes the games.

Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference. First held in April 2007 in Vancouver, the contest is now held twice a year, most recently in March 2024. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The Pwn2Own contest serves to demonstrate the vulnerability of devices and software in widespread use while also providing a checkpoint on the progress made in security since the previous year.

<span class="mw-page-title-main">Microsoft account</span> User account required for Microsoft-owned services

A Microsoft account or MSA is a single sign-on personal user account for Microsoft customers to log in to consumer Microsoft services, devices running on one of Microsoft's current operating systems, and Microsoft application software.

<i>Watch Dogs</i> (video game) 2014 video game

Watch Dogs is a 2014 action-adventure game developed by Ubisoft Montreal and published by Ubisoft. It is the first installment in the Watch Dogs series. The game is played from a third-person perspective, and its world is navigated on foot or by vehicle. Set within a fictionalized version of the Chicago metropolitan area in 2013, the single-player story follows grey hat hacker and vigilante Aiden Pearce's quest for revenge after the killing of his niece. An online multiplayer mode allows up to eight players to engage in cooperative and competitive gameplay.

<span class="mw-page-title-main">Xbox One</span> Video game console developed by Microsoft

The Xbox One is a home video game console developed by Microsoft. Announced in May 2013, it is the successor to Xbox 360 and the third console in the Xbox series. It was first released in North America, parts of Europe, Australia, and South America in November 2013 and in Japan, China, and other European countries in September 2014. It is the first Xbox game console to be released in China, specifically in the Shanghai Free-Trade Zone. Microsoft marketed the device as an "all-in-one entertainment system", hence the name "Xbox One". An eighth-generation console, it mainly competed against Sony's PlayStation 4 and Nintendo's Wii U and later the Switch.

A bug bounty program is a deal offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.

Tavis Ormandy is an English computer security white hat hacker. He is currently employed by Google and was formerly part of Google's Project Zero team.

<span class="mw-page-title-main">Benjamin Kunz Mejri</span> German IT security specialist and penetration tester

Benjamin Kunz Mejri is a German IT security specialist and penetration tester. His areas of research include vulnerabilities in computer systems, bug bounties, the security of e-payment payment services and privacy protection. Mejri is known for uncovering new zero-day vulnerabilities and making them transparent to the public.

References

  1. Thomas, Karl (11 August 2015). "5 child geniuses destined for a career in cybersecurity". WeLiveSecurity. ESET. Retrieved 28 October 2016.
  2. 1 2 3 Castillo, Michel del (4 April 2014). "5-year-old hacker lends Microsoft a hand". Upstart Biz Journals. Retrieved 23 April 2014.
  3. Molina, Brett (5 April 2014). "5-year-old discovers Xbox security flaw, Microsoft rewards him". The Sydney Morning Herald. Retrieved 23 April 2014.
  4. Callaham, John (4 April 2014). "5-year-old boy finds Xbox One security flaw, Microsoft rewards him with free games" . Retrieved 8 April 2014.
  5. Ecarma, Jordan (4 April 2014). "5-YEAR-OLD HACKS XBOX LIVE TO ACCESS LOCKED GAME". Auto World News. Retrieved 23 April 2014.
  6. Mosely, Jared (4 April 2014). "Kindergarten hacker: 5 year old breaks into dad's Xbox Live account". Venture Beat. Retrieved 8 April 2014.
  7. Syeda, S (7 April 2014). "Microsoft Xbox Security Flaw Exposed by Five Year Old". The News Reports. Archived from the original on 8 April 2014. Retrieved 23 April 2014.
  8. Merva, Nick (7 April 2014). "5-year-old Ocean boy exposes Microsoft Xbox Vulnerability" . Retrieved 23 April 2014.
  9. Gross, Doug (4 April 2014). "5-year-old boy hacks dad's Xbox account". CNN. Retrieved 8 April 2014.
  10. "Teen Hackers: 10 Stories of Young Code-Crackers". Huffington Post. 18 July 2012. Retrieved 8 April 2014.
  11. Glenny, Misha (8 March 2012). "Tap Into the Gifted Young Hackers". New York Times. Retrieved 8 April 2014.