The Westminster honeytrap mystery is even stranger than we thought

The honeytrapper - as we shall call him, her or them - first popped up on Saturday, 23 September last year in Bournemouth, the opening day of the Liberal Democrats' annual conference.
We have spoken to two male conference attendees who received messages that day on the gay hook-up app Grindr from someone with the user name M-xl.
Months later, people would suspect what became known as the Westminster honeytrap of being the act of anyone ranging from a lone individual seeking sexual gratification to being the actions of a hostile state.
Those messaged in Bournemouth reached a different conclusion: they thought they were being targeted by a journalist seeking information.
Others then disclosed that M-xl had asked them questions about what the worst thing they had ever heard an MP do was, and to share any compromising photos they had of others.
Despite Grindr being designed to show you men nearby, M-xl was not actually there.
One of those messaging M-xl realised why he appeared keen on information but not that keen on meeting up: he was using a feature of the app where you can chat to profiles elsewhere.
A few weeks later M-xl was messaging men at the Labour conference in Liverpool.
Several attendees, including an MP, have reported speaking to M-xl on Grindr there.
The BBC has not been able to speak directly to those who exchanged messages with M-xl on Grindr at the Labour conference.
A crucial question is whether M-xl was indeed in Liverpool or was messaging from London, as with the Liberal Democrat conference.
As polls closed, one person working in parliament received a message from a number they did not have saved on WhatsApp asking them if they were staying up for the by-election results.
The next day, as jubilant Labourites celebrated their victories, one got a message from Abi.
Either way, the honeytrapper's known actions became much more intense after the Met was first made aware of their work.
From February onwards, it seems to have mainly been politicians and political journalists receiving unwanted messages, as some of us have already recounted, including details of a fractious exchange on the morning of Monday, 11 March.
Last week we reported that a former MP had been messaged by Charlie just after 5pm.We now know that another man, a former Conservative MP, received a message from Charlie 15 minutes earlier that same night, to which he did not respond.
A serving government minister also received a message from Charlie late that night, telling Politico that they engaged briefly before blocking that number.
The BBC is aware of another man working in Westminster who was contacted by Charlie on 22 March.
If the honeytrapper is never identified, we may never know how vulnerable Westminster's inhabitants are to security threats.
Police knew about 'honeytrap' messages last year.


This Cyber News was published on www.bbc.com. Publication date: Sun, 14 Apr 2024 14:14:31 +0000


Cyber News related to The Westminster honeytrap mystery is even stranger than we thought

The Westminster honeytrap mystery is even stranger than we thought - The honeytrapper - as we shall call him, her or them - first popped up on Saturday, 23 September last year in Bournemouth, the opening day of the Liberal Democrats' annual conference. We have spoken to two male conference attendees who received ...
7 months ago Bbc.com
CVE-2019-5303 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
11 months ago
CVE-2019-5302 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
11 months ago
CVE-2020-9069 - There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: ...
3 years ago
Online safety laws: What's in store for children's digital playgrounds? - As children's safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in the digital realm. Tomorrow is Safer Internet Day, an annual awareness campaign that started in Europe in 2004 ...
1 year ago Welivesecurity.com
Here are all the red flags Charlotte Cowles missed in that viral NY Mag article - Last week, Charlotte Cowles-a seasoned journalist with a notable tenure at the New York Times and a seven-year streak of writing a personal finance column at The Cut-published a piece about how she'd fallen for a wild scam. The situation escalated ...
9 months ago Blog.avast.com
CVE-2017-8215 - Honor 8,Honor V8,Honor 9,Honor V9,Nova 2,Nova 2 Plus,P9,P10 Plus,Toronto Huawei smart phones with software of versions earlier than FRD-AL00C00B391, versions earlier than FRD-DL00C00B391, versions earlier than KNT-AL10C00B391, versions earlier than ...
5 years ago
CVE-2017-8214 - Honor 8,Honor V8,Honor 9,Honor V9,Nova 2,Nova 2 Plus,P9,P10 Plus,Toronto Huawei smart phones with software of versions earlier than FRD-AL00C00B391, versions earlier than FRD-DL00C00B391, versions earlier than KNT-AL10C00B391, versions earlier than ...
4 years ago
You Don't Know Where Your Secrets Are - Do you know where your secrets are? If not, I can tell you: you are not alone. Hundreds of CISOs, CSOs, and security leaders, whether from small or large companies, don't know either. No matter the organization's size, the certifications, tools, ...
1 year ago Thehackernews.com
CVE-2020-9235 - Huawei smartphones HONOR 20 PRO Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C185E3R5P1),Versions earlier than 10.1.0.231(C636E3R3P1);Versions earlier than ...
3 years ago
'Sex life data' stolen from UK government among record number of ransomware attacks - Data on the sex lives of up to 10,000 people was stolen from a British government department in one of the record number of ransomware attacks to have hit Westminster in the first half of this year. It is not known which department the information ...
11 months ago Therecord.media
CVE-2024-21596 - A Heap-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). If an attacker sends a specific ...
10 months ago Tenable.com
Digital Criminal Ontology; Trading Pistols for Programmers - Since computers were first connected with Ethernet cables, Hollywood started romanticizing hackers. The movie was a science fiction thriller starring Matthew Broderick and Ally Sheedy as high school students who accidentally hacked a military ...
10 months ago Cyberdefensemagazine.com
CVE-2024-21585 - An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker, using specific timing outside the attacker's control, to flap ...
10 months ago Tenable.com
US Charge Man with Running Stolen Credentials Marketplace - A man has been extradited from the UK to the US for allegedly operating a website that sold access to compromised computer credentials. Sandu Diaconu, 31, from Moldova, has been charged by the US with conspiracy to commit access device and computer ...
11 months ago Infosecurity-magazine.com
Love is in the AI: Finding love online takes on a whole new meaning - Technology is progressing faster than ever and AI is increasingly ready to help you deal with more nuanced and existential needs than checking the weather forecast or switching on the lights for you. As our interactions with technology become ...
10 months ago Welivesecurity.com
This year's resolution: remove nosey apps from your device - Some apps are plain greedy-like a stranger you invite for a meal who insists on ordering everything on the menu. Here's what upset me: After I downloaded the companion app that helps control it for my phone, the app wanted permission to make and ...
10 months ago Blog.avast.com
CVE-2020-9239 - Huawei smartphones BLA-A09 versions 8.0.0.123(C212),versions earlier than 8.0.0.123(C567),versions earlier than 8.0.0.123(C797);BLA-TL00B versions earlier than 8.1.0.326(C01);Berkeley-L09 versions earlier than 8.0.0.163(C10),versions earlier than ...
3 years ago
CVE-2024-39517 - An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). ...
4 months ago
Human cost of PSNI data breach laid bare in official review The Register - An official review of the Police Service of Northern Ireland's August data breach has revealed the full extent of the impact on staff. The review lays bare the broad impact on staff in Northern Ireland, detailing how various officers have been forced ...
11 months ago Packetstormsecurity.com
Okta Admits All Customer Support Users Impacted By Breach - Okta has revealed that an October security breach compromised all users of its customer support system rather than a small subset as previously thought. CSO David Bradbury said last month that only 134 customers were impacted after a threat actor ...
11 months ago Infosecurity-magazine.com
Human cost of PSNI data breach laid bare in official review The Register - An official review of the Police Service of Northern Ireland's August data breach has revealed the full extent of the impact on staff. The review lays bare the broad impact on staff in Northern Ireland, detailing how various officers have been forced ...
11 months ago Go.theregister.com
Hacker Conversations: Stephanie 'Snow' Carruthers, Chief People Hacker at IBM X-Force Red - Social engineering is effectively hacking human thought processes. Social engineering is a major factor in the overall process but is not directly part of repurposing electronic systems. A social engineer is usually classified as a hacker, and is ...
8 months ago Securityweek.com
Mystery attacker remotely bricked 600,000 SOHO routers The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
5 months ago Go.theregister.com
Mystery attacker remotely bricked 600,000 SOHO routers The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
5 months ago Theregister.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)