White House fooled by email prankster – Mimecast cyber-resilience expert responds

White House fooled by email prankster – Mimecast cyber-resilience expert responds

Following the news that a British “email prankster” fooled several White House officials into thinking that he was one of them, Mimecast cyber-resilience expert, Hiwot Mendahun comments that better security measures and training must be implemented to prevent further hoaxes.

Back in July, the prankster reportedly posed as the recently fired Chief of Staff, Reince Priebus and engaged in an email spat the also recently-fired but then newly hired White House director of communication, Anthony Scaramucci after he had insulted Priebus to a reporter.

Calling himself ‘@SINON_REBORN’, he then posted the email exchange on Twitter (see below).

White House fooled by email prankster, Mimecast cyber-resilience expert responds

The prankster also posed as Russia-designate Jon Huntsman, and caught out Homeland Security Adviser Tom Bossert, the White House official tasked with cyber security. Jared Kushner was also targeted.

Bossert is then said to have given the fake Kushner his email address.

Speaking to CNN, White House press secretary Sarah Huckabee Sanders acknowledged the incidents and said they were being treated seriously. “We take all cyber related issues very seriously and are looking into these incidents further,” she said.

The only person who realised he was a hoaxer was Eric Trump. After initially believing he was being emailed by his brother Donald Trump Jr, he soon caught on and responded: “I have sent this to law enforcement who will handle from here.”

Commenting on the hoax, Hiwot Mendahun, a cyber-resilience expert at email security firm Mimecast, said:

“Email connects the world’s leaders, businesses and everyday individuals, whatever their status or intent yet was never designed with security in mind. This prank follows a rise in similar attacks asking for wire transfers or confidential data like HR records or tax information. Spear phishing and impersonation attacks are easy to launch with free email addresses or by registering lookalike domains. Mobile email users are particularly vulnerable. All organisations need to consider stamping external emails with simple warnings and conduct regular training to help employees recognise possible scams.”

[su_button url=”
https://www.mimecast.com/” target=”blank” background=”#df2027″ color=”#ffffff” size=”10″ radius=”20″ icon=”icon: arrow-circle-right”]Click here for more information on Mimecast[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by SentinelOne

SentinelOne to Spotlight AI-Power at GISEC 2025

SentinelOne announces its participation at GISEC Global 2025 (6-8 May) at the Dubai World Trade Centre. The company will highlight..
Image provided by Altronix

Altronix Showcases New Technology

Altronix is displaying the company’s latest innovations here at ISC West in booth #11073. Features include integrated power…
Image provided by ASSA ABLOY

ASSA ABLOY Opening Solutions at ISC West

ASSA ABLOY Opening Solutions will showcase a comprehensive range of access solutions at ISC West, the security industry’s premier…
Two young intercultural programmers trying to solve problem with access to data while interacting in front of computers

DDoS attacks targeting critical infrastructure

NETSCOUT released its 2H2024 DDoS Threat Intelligence Report, revealing how Distributed Denial of Service (DDoS)…
Image Provided by Invixium

Invixium showcases new Biometric Solutions to ISC WEST 2025

Invixium is set to exhibit its latest Enterprise Series biometric solutions at ISC WEST. Making its entry into….
Image Provided by Contacta Inc

Contacta Inc bolsters security market with new distribution

Manufacturer of window intercom and assistive listening systems, Contacta Inc, has bolstered its presence in the market with new distribution
Image Provided by AtlasIED

AtlasIED Returns to ISC West

AtlasIED announces its return to ISC West 2025, where it will showcase its comprehensive and renowned Security Technology Solutions Ecosystem
Copyright: Security Buyer

ASIS UK Launches “Security is You(th)” Hackathon

ASIS International UK has launched Security is You(th), an initiative designed to engage students and early-career professionals…
Paxton

Paxton Announces New US Headquarters in Greenville, SC

Paxton, a manufacturer of security technology solutions has announced the opening of their new US headquarters. The company’s intention…
BeyondTrust

Into the Cloud – Morey J. Haber, BeyondTrust

The January edition of International Security Buyer featured Morey J Haber, Chief Security Advisor for BeyondTrust in our Into the Cloud…
Scroll to Top