• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackerone employee caught stealing vulnerability reports for personal gains

HackerOne Employee Caught Stealing Vulnerability Reports for Personal Gains

You are here: Home / General Cyber Security News / HackerOne Employee Caught Stealing Vulnerability Reports for Personal Gains
July 4, 2022

Vulnerability coordination and bug bounty platform HackerOne on Friday disclosed that a previous staff at the agency improperly accessed security reports submitted to it for individual acquire.

“The person anonymously disclosed this vulnerability info outside the house the HackerOne platform with the aim of boasting additional bounties,” it said. “In below 24 several hours, we worked promptly to incorporate the incident by pinpointing the then-personnel and reducing off access to data.”

The employee, who had access to HackerOne methods concerning April 4 and June 23, 2022, for triaging vulnerability disclosures related with unique purchaser plans, has considering that been terminated by the San Francisco-headquartered business as of June 30.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Contacting the incident as a “distinct violation” of its values, lifestyle, policies, and work contracts, HackerOne said it was alerted to the breach on June 22 by an unnamed customer, which asked it to “look into a suspicious vulnerability disclosure” by way of an off-platform conversation from an particular person with the handle “rzlr” making use of “intense” and “scary” language.

Subsequently, analysis of inside log details used to watch employee access to buyer disclosures traced the publicity to a rogue insider, whose target, it famous, was to re-post copy vulnerability reviews to the exact same prospects using the system to acquire financial payouts.

“The menace actor produced a HackerOne sockpuppet account and experienced acquired bounties in a handful of disclosures,” HackerOne detailed in a article-mortem incident report, including seven of its clients obtained immediate interaction from the threat actor.

“Adhering to the money trail, we gained affirmation that the threat actor’s bounty was linked to an account that economically benefited a then-HackerOne worker. Assessment of the threat actor’s network site visitors supplied supplemental proof connecting the danger actor’s principal and sockpuppet accounts.”

CyberSecurity

HackerOne more reported it has individually notified clients about the exact bug reviews that ended up accessed by the malicious party alongside with the time of accessibility, although emphasizing it uncovered no proof of vulnerability data obtaining been misused or other buyer data accessed.

On major of that, the corporation famous it aims to carry out more logging mechanisms to increase incident reaction, isolate details to cut down the “blast radius,” and improve processes in location to recognize anomalous access and proactively detect insider threats.

Discovered this post exciting? Abide by THN on Fb, Twitter  and LinkedIn to read much more exceptional information we post.


Some parts of this report are sourced from:
thehackernews.com

Previous Post: «what is the eu’s digital operational resilience act (dora)? What is the EU’s Digital Operational Resilience Act (DORA)?
Next Post: Universities are fighting a cyber security war on multiple fronts universities are fighting a cyber security war on multiple fronts»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.