• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackerone employee fired for using position to steal bug bounties

HackerOne employee fired for using position to steal bug bounties

You are here: Home / General Cyber Security News / HackerOne employee fired for using position to steal bug bounties
July 4, 2022

Vulnerability coordination platform HackerOne has announced the firing of an staff uncovered to have employed their situation to obtain the vulnerability knowledge of customers, and to market copy details back again to them for financial attain.

HackerOne offers a platform by which white hat hackers can anonymously submit vulnerability reports on businesses and also facilitates the secure transfer of bounties in return for the details. The company describes itself as the “global leader” in attack resistance administration (ARM).

It was identified this 7 days that an worker had improperly accessed HackerOne methods involving April 4 and June 23, thieving user-submitted vulnerability details to move the facts together to the influenced clients by themselves and get the bounty.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Fears have been elevated by a shopper on June 22, when a submitter of vulnerability information utilized threatening language and delivered info with exceptional similarity to a disclosure they experienced beforehand acquired through HackerOne.

Relying on a neighborhood of in excess of a million hackers to post stories can guide to ‘bug collisions’ or duplicates, exactly where two or extra hackers can explore the very same vulnerability close to the exact time as each individual other. In this occasion, on the other hand, the business states that it was delivered with evidence that solid doubt on simple coincidence getting behind this crossover of data.

24 several hours following the purchaser idea, HackerOne had recognized an staff suspected of currently being behind the incident and removed their system entry. This was achievable since only just one employee’s accessibility log showed that they experienced seen all the disclosures that even more customers had discovered as currently being re-submitted by the risk actor.

Subsequent an interview, their employment was terminated, and legal referral has not however been ruled out by the company. 

In a report, HackerOne main info security officer Chris Evans and main technology officer Alex Rice explained the steps as a “serious incident.”

“Insider threats are one particular of the most insidious in cybersecurity, and we stand all set to do every thing in our electrical power to cut down the probability of such incidents in the long term.”

The organization states that they have created all clients that they know interacted with the menace actor mindful of the incident, but even more stressed that any shopper who was contacted by person ‘rzlr’ ought to make contact with them instantly at [email protected].


Some areas of this report are sourced from:
www.itpro.co.uk

Previous Post: «latest lockbit ransomware strain 'strikingly similar' to blackmatter Latest LockBit ransomware strain ‘strikingly similar’ to BlackMatter
Next Post: Schneider Electric to exit Russia schneider electric to exit russia»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.