Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

Football player hacked live during NFL draft

Experts had Laremy Tunsil flagged as one of the top prospects in Thursday night’s NFL draft. But shortly before the opening pick, something disturbing happened. An incriminating video tweeted from...
Rob Sobers
2 min read
Last updated June 30, 2022

Experts had Laremy Tunsil flagged as one of the top prospects in Thursday night’s NFL draft. But shortly before the opening pick, something disturbing happened. An incriminating video tweeted from Tunsil’s own verified Twitter account showed the Ole Miss star smoking a “marijuana-like substance” from a gas mask.

Laremy Tunsil smoking marijuana from a gas mask

Get the Free Pen Testing Active Directory Environments EBook

“This really opened my eyes to AD security in a way defensive work never did.”

It quickly became clear that Tunsil’s account was hacked by someone who not only had damaging information on the player, but a deep desire to sabotage his career.

This meticulously-timed hack caused Tunsil’s stock to plummet – though he was eventually nabbed by the free-wheeling Miami Dolphins with the 13th overall pick – and may have cost him more than $13 million.

The nightmare doesn’t end there. Moments after being picked, more information was leaked. This time, LT’s hacked Instagram account posted two screencaps of text conversations that show him asking an Ole Miss coach for money to help pay his rent and his mom’s electric bill, which would be a violation of NCAA rules.

Keep in mind, the Instagram leak was unfolding as Tunsil was being interviewed live by the media, catching him completely off guard:

Meanwhile, back at Ole Miss, the powers that be are all:

Michael Scott from the Office

OK, so this is a bloody disaster. Clearly someone had access to Tunsil’s accounts long before the draft and had been planning on crushing his dreams.

But who dunnit? Was it a mad ex-girlfriend? A jealous friend who happened to know that his password to everything is, let’s guess, “f00tball”? The stepfather with whom he is engaged in a lengthy legal battle? A fellow Ole Miss student who watched him type his password in the computer lab? An actual hacker who phished his credentials and tried to extort him?

It’s not yet clear who hacked Tunsil, but what is crystal clear is that his agent doesn’t understand cybersecurity. Here’s his statement:

Agent's statement on Tunsil hack

Wow. Where do we begin? We could make educated guesses about what “open source hacking” is (why does open source always get dragged through the dirt?!), but I’m more interested in pointing out the embarrassing attempt at deflecting Tunsil’s transgressions. The agent cites the “shortcomings” of the US government and some mythical Silicon Valley cybersecurity conglomerate as the real issue. As if we had big switch labeled “allow hacking” that we could flip on and off.

For the sake of everyone who is trying to help make the world’s information more secure, I truly hope this statement gets the ridicule it deserves as a lame PR jiu-jitsu tactic and isn’t a reflection of how the layperson thinks cybersecurity works.

UPDATE 4/29 3:03PM ET: Alas, the agent’s statement turned out to be false (or at least unconfirmed; the story is still developing). Bad on me for believing a statement this ignorant could be real, but sadly the mainstream commentary around infosec has made it hard to distinguish misguidance from parody.

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

how-to-create-a-good-security-policy
How to Create a Good Security Policy
CIOs have taken note of the nightmarish scenarios data breaches can bring – remember Sony and Target? To combat this ticking time bomb, they’ve beefed up their security budgets. The Computer...
securityrwd---introduction-to-aws-elastic-compute-cloud-(ec2)
SecurityRWD - Introduction to AWS Elastic Compute Cloud (EC2)
Concerning headlines about threat groups targeting major security and technology vendors are keeping more than a few security and IT professionals up at night. Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team discuss why advanced attackers target technology like SSO and why organizations must "assume" breach. Watch now for helpful tips to harden your environment and protect your data.
why-do-sharepoint-permissions-cause-so-much-trouble?
Why Do SharePoint Permissions Cause So Much Trouble?
SharePoint permissions can be the stuff of nightmares.  At Varonis, we get a chance to meet with a lot of SharePoint administrators and it’s rare that they’re not exhausted trying...
introducing-the-automation-engine,-datalert-analytics-rewind,-and-more
Introducing the Automation Engine, DatAlert Analytics Rewind, and more
Getting to least privilege can be a nightmare. The first steps – tracking down inconsistent ACLs and remediating global access groups can turn even the most basic file share clean-up...