I remember coming across a serious bug in a site that belonged to a top multi-billion company. My brother also found what essentially an unrestricted privacy leak (and possibly editing access) in a top university (leaked data is sensitive personal information, not academic). Neither of us reported (or exploited) what we found.Protection from this kind of blame-shifting and misdirected retaliation should be guaranteed by law. Until it is, bugs in critical and important infrastructure will go on unreported, and remain available for malicious actors to exploit.
jogjayr|8 years ago
Would they also prosecute a person who told them one of their doors was left unlocked after-hours?
A normal person's reaction upon being told "You left your keys in the lock" is usually gratitude, not calling the cops.
EDIT: Is it suspicion? "Hmm...this person found an unlocked door, which means they were clearly trying all the doors. Don't like that. Who knows what else they found but didn't report." Which is understandable, but clearly counter-productive. If the person was a malicious actor, they obviously wouldn't go to the trouble of reporting in the first place.
jannes|8 years ago
- BKK is the client of T-Systems. They have a contract for the development and maintenance of this system which might contain clauses about liability or indemnification in cases of hacking, security bugs, negligency, etc.
- This guy reported it to BKK who obviously don't have any technical knowledge
- BKK (the client) forwards the email to T-Systems (the contractor): "What's this about? Looks like hacking or something."
- Now T-Systems has two options: 1. Blame it on the guy, or 2. Take the blame for overpromising and screwing it up, possibly taking a financial loss of an unkown amount (depending on the contract and how widespread exploitation was)
mekkkkkk|8 years ago
To push your analogy further, the non-tech person thinks of this type of exploit discovery as if someone has trespassed onto their private yard in the cover of darkness, trying every door and window.
A tech savvy person might instead think of it as a row of doors lined up next to a busy street, in broad daylight.
Knocking, and telling someone that they have "forgot their keys in the door" seems a bit creepy in the first scenario, but completely legitimate in the second.
jasonzemos|8 years ago
I'll also add: when I was a teenager I've been in this position countless times, reporting security issues at school, etc. The reactions I received from fully grown adults was nothing short of stochastic. This fascinated me enough to minor in political science and philosophy/ethics. I draw on that for insight, but it doesn't really provide a final answer.
emiliobumachar|8 years ago
csomar|8 years ago
And multi-billion companies or governments are in the business of bending over customers and effing them. So another guy getting fked is business as usual.
SeanDav|8 years ago
Perhaps not, but they probably would be tempted to prosecute someone who opened the door with a toothbrush and told them about it...
The temptation is to squash anything that comes along and potentially makes you look like you weren't doing your job properly (installing a better lock in the first place) rather than thank the person and then install a better lock, or fix the design of the lock.
bigbugbag|8 years ago
Then again there is this culture of making an example to discourage others to even try, similar to prison, which we know is not that effective if at all.
Silhouette|8 years ago
A normal person's reaction upon being told "You left your keys in the lock" is usually gratitude, not calling the cops.
Well, those aren't quite the same thing.
If someone told me I'd left my key in the lock, I'd say thanks and remove the key.
If someone told me I'd left my door unlocked after-hours, I might wonder what they were doing trying my door after-hours in the first place.
nkrisc|8 years ago
pavanred|8 years ago
askvictor|8 years ago
patryn20|8 years ago
In hindsight it was a huge risk and I was dangerously trusting.
kpil|8 years ago
What they don't like is the publicity.
Edit: but maybe not in Hungary. It's the bad child in EU.
erroneousfunk|8 years ago
In both cases, they fixed it, thanked me, no arrests or threats were made. I think your experience is only outside the norm in the sense that you got monetary compensation out of it! Nice!
LunaSea|8 years ago
So even technical companies can react in really silly ways.
enraged_camel|8 years ago
What isn't cool is legal deciding to go after the party disclosing the vulnerability.
Gustomaximus|8 years ago
I have previously found a way to access very personal information in a large corporate billing system. When I contacted them I specifically used careful language that what I'd done was unintentional, and easy mistake that could lead others to this, that I kept zero data and exited the system as soon as I realised 'my mistake' and was very surprised. Basically enough that 1) If it should go to court the situation would be in my favour as much as it can be and 2) Given they were a well know public retailer I figured this would hit social media and make an uproar about the company should they act badly.
Initially I contact several people in IT and heard nothing. Six months later when I noticed this was still open. I then contacted the CEO. Expecting nothing or canned 'thanks', we was thankful had some followup contact about the issue.
I wont say there is no risk, but I think its the right thing to do and risk seems minimal. And you can always do it anonymously.
lovich|8 years ago
qb45|8 years ago
Assuming you have done the hacking anonymously in the first place.
giancarlostoro|8 years ago
loup-vaillant|8 years ago
"I have hacked your system, accessed <this information> and modified <that bit of data>, using <this procedure>. You have <this time> to send <this much> Bitcoins to <this wallet>, or I <copy or trash> your database. Thank you for your attention."
Maybe they will panic strongly enough to actually do something about the issue.
PeterisP|8 years ago
From the hacker "hat classification" perspective, that's obviously black hat, nothing gray about it.
From the legal perspective it's not a debate anymore (like in the original article) if you do this, it's clearly a crime, if you get caught in whatever way (e.g. by bragging about it someplace later that leads to your person, or by testing a "discounted" pass in some place that has cameras), it's a straightforward conviction for extortion.
From the ethical perspective, that is an unethical action, doing that shows that the person is immoral.
But you are right, yes, it can be quite effective, and definitely makes it more likely that they will panic strongly enough to actually do something about the issue. It's just that if this happens, then it's not sufficient to just fix the hole, identifying and catching the perpetrator becomes a big part of what they should be doing.
pfisch|8 years ago
wlll|8 years ago
etatoby|8 years ago
You have <this time> to fix the issue, or I <copy or trash> your database.
Asking for extortion does not push them to fix their systems, only to pay you and/or find you.
imhoguy|8 years ago
bondant|8 years ago
http://www.ssi.gouv.fr/en-cas-dincident/vous-souhaitez-decla...
pyroinferno|8 years ago
rtpg|8 years ago
I think the line is pretty grey though.
One analogy is telling a company that their front door is unlocked.
Another analogy is going into an unlocked front door, and going deeper into the building, and then reporting to the company that you could, in fact, get to classified information from this door.
IRL Pentesters get permission before trying to sneak into buildings, so there's some argument for it being the same for these sorts of things.
EDIT: I 100% think that users that are acting in good faith shouldn't be thrown in prison. This case is a pretty good example of this
loup-vaillant|8 years ago
If that was tantamount to not-breaking & entering, it means the it is okay to legally forbid step by step debugging on your own computer. That it may not be legal to inspect code from another company, even if it runs on your computer. That whatever the code decides (here, the price of the ticket), must be observed by the rest of the system (here, the price sent in the HTTP request wasn't the price decided by the web page).
The consequences of such thinking are chilling. If this is the kind of cyberpunk we're heading to, I'll seriously consider becoming a Runner.
alanfranzoni|8 years ago
In this situation, it would have been difficult to report the parameter tampering without verifying that it actually worked (there're systems that pass params back and forth without apparent use, but they throw an error when client and server states don't match) - and, most probably, the report would have been ignored without the verification.
TomK32|8 years ago
madaxe_again|8 years ago
posterboy|8 years ago
warrenm|8 years ago
Seems somewhat negligent - at the very least from a Good Samaritan™ point of view
skinnymuch|8 years ago
JohnGB|8 years ago
It's a choice between the certainty of no loss vs the possibility of great loss.
grrowl|8 years ago
Better to report anonymously, or report directly to someone who might appreciate or is responsible (and hope they appreciate responsible disclosure).
Antrikshy|8 years ago
Cerium|8 years ago