• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackerone employee fired for using position to steal bug bounties

HackerOne employee fired for using position to steal bug bounties

You are here: Home / General Cyber Security News / HackerOne employee fired for using position to steal bug bounties
July 4, 2022

Vulnerability coordination platform HackerOne has announced the firing of an staff uncovered to have employed their situation to obtain the vulnerability knowledge of customers, and to market copy details back again to them for financial attain.

HackerOne offers a platform by which white hat hackers can anonymously submit vulnerability reports on businesses and also facilitates the secure transfer of bounties in return for the details. The company describes itself as the “global leader” in attack resistance administration (ARM).

It was identified this 7 days that an worker had improperly accessed HackerOne methods involving April 4 and June 23, thieving user-submitted vulnerability details to move the facts together to the influenced clients by themselves and get the bounty.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Fears have been elevated by a shopper on June 22, when a submitter of vulnerability information utilized threatening language and delivered info with exceptional similarity to a disclosure they experienced beforehand acquired through HackerOne.

Relying on a neighborhood of in excess of a million hackers to post stories can guide to ‘bug collisions’ or duplicates, exactly where two or extra hackers can explore the very same vulnerability close to the exact time as each individual other. In this occasion, on the other hand, the business states that it was delivered with evidence that solid doubt on simple coincidence getting behind this crossover of data.

24 several hours following the purchaser idea, HackerOne had recognized an staff suspected of currently being behind the incident and removed their system entry. This was achievable since only just one employee’s accessibility log showed that they experienced seen all the disclosures that even more customers had discovered as currently being re-submitted by the risk actor.

Subsequent an interview, their employment was terminated, and legal referral has not however been ruled out by the company. 

In a report, HackerOne main info security officer Chris Evans and main technology officer Alex Rice explained the steps as a “serious incident.”

“Insider threats are one particular of the most insidious in cybersecurity, and we stand all set to do every thing in our electrical power to cut down the probability of such incidents in the long term.”

The organization states that they have created all clients that they know interacted with the menace actor mindful of the incident, but even more stressed that any shopper who was contacted by person ‘rzlr’ ought to make contact with them instantly at [email protected].


Some areas of this report are sourced from:
www.itpro.co.uk

Previous Post: «latest lockbit ransomware strain 'strikingly similar' to blackmatter Latest LockBit ransomware strain ‘strikingly similar’ to BlackMatter
Next Post: Schneider Electric to exit Russia schneider electric to exit russia»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.