NEW CARTOON: How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992

While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.

n 1992, Kevin Mitnick was on the run from the cops, one of the most wanted men in the United States, and certainly the most wanted hacker. He was living in Denver under a pseudonym, and was very worried about government surveillance.

To avoid it, he thought it’d be a good idea to hack the Motorola MicroTAC Ultralite, the iPhone X of the 1990s. His plan was to try changing the identifying data on the phone, or even turn off the ability for cellphone towers to connect to it and, thus, give the cops his location.

That’s when he made “the stupid and regrettable decision” to go after the phone’s source code. The rest, as they say, is history—hacking history to be precise.

We sat down with Mitnick, who told us how he stole the source that source code just using social engineering over the phone for the latest episode of Greatest Moments in Hacking History, our series on the most famous and influential hacks in the history of information security.

Watch the episode here.

Source: MOTHERBOARD

Topics: Social Engineering, Speaking Engagements, GMIHH, government surveillance, TAR, cyber security, Denver, GZiP, hackers, hacking, INFOSEC, LINUX, source code, cell phone, Hacking History, identifying data, Kevin Mitnick, Motorola MicroTAC Ultralite

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg