![]() ![]() ![]() |
|
timmmay: Vodafone might like to retain Kordia Security Services. I've found them excellent.
Or better yet, pay a bug bounty benefiting @DeroyBoy
Please keep this GZ community vibrant by contributing in a constructive & respectful manner.
It would be really good if Vodafone could make a statement on how this happened and what they're doing to make their processes more robust.
As a potential customer I want to see that they're taking this seriously and not just saying "whoopsie, never mind".
alasta:
It would be really good if Vodafone could make a statement on how this happened and what they're doing to make their processes more robust.
As a potential customer I want to see that they're taking this seriously and not just saying "whoopsie, never mind".
More my question would be why wasn't this platform pentested? It should be a part of the release lifecycle for bigger apps.
Michael Murphy | https://murfy.nz
Referral Links: Quic Broadband (use R122101E7CV7Q for free setup)
Are you happy with what you get from Geekzone? Please consider supporting us by subscribing.
Opinions are my own and not the views of my employer.
As I said, performance and security should be in the development team's mind when they implement anything. There should have unit, system, integration and regression tests in every single step of the development lifecycle.
Release managers that authorise deployment without having a check mark against security items shouldn't be release managers.
Wheedle, anyone?
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
freitasm: Vodafone has confirmed this was changed at 3am to prevent this exploit happening.
Thanks to OP for reporting.
In the future it would be good if this kind of thing was passed quietly to a mod who will contact people in the affected companies. This is just to prevent details becoming public before a fix is implemented.
NZ Also has a national CERT where you can report things like this about NZ companies. CERT can then pass along via their contacts to the right people. https://www.cert.govt.nz/
alasta:It would be really good if Vodafone could make a statement on how this happened and what they're doing to make their processes more robust.
As a potential customer I want to see that they're taking this seriously and not just saying "whoopsie, never mind".
This. This could be a serious breach if someone has previously exploited this.
As a VF customer i'd like for them to roll full Incident Response on this and go back through their logs and ensure that no one has exploited this. (And report if someone HAS and what the impact is)
Here's Vodafone's statement:
As soon as we were made aware of this issue our IT team worked hard and fast to remedy it and shortly before 3am they were successful in implementing a solution. This loophole can no longer be exploited. Although customer passwords were unable to be changed, Vodafone takes the privacy of our customers extremely seriously and security breaches of any description are completely unacceptable to us. We will review this to understand what happened. We wish to acknowledge and thank you for the sensible, fast action you took to notify us last night.
To the OP the last sentence is for you too
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
@kyhwana2: NZ Also has a national CERT where you can report things like this about NZ companies. CERT can then pass along via their contacts to the right people. https://www.cert.govt.nz/
I looked at CERT this morning. The wording in their form seems to be more geared to exploits being undertaken, not vulnerabilities. Perhaps add something else?
I then looked at the Privacy Commission website as this would be a privacy act breach but their form is geared to individuals more than reporting large scale data breaches.
So perhaps someone in the security community should look at this?
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
freitasm:
I looked at CERT this morning. The wording in their form seems to be more geared to exploits being undertaken, not vulnerabilities. Perhaps add something else?
I then looked at the Privacy Commission website as this would be a privacy act breach but their form is geared to individuals more than reporting large scale data breaches.
So perhaps someone in the security community should look at this?
You can also report vulnerabilities via them. They have a responsible/co-ordinated disclosure policy/workflow: https://www.cert.govt.nz/it-specialists/guides/reporting-a-vulnerability/cert-nz-coordinated-vulnerability-disclosure-policy
I've reported NZ based vulnerabilities via them in the past and they seem pretty onto it re contacting the right people.
So it seems. Thanks for the direct link. Is this manned 24x7?
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
Thanks again for raising the issue. We take security very seriously and, as mentioned above, overnight our IT team worked to remedy it and were successful in implementing a solution. This loophole can no longer be exploited. To be 100% clear, customer passwords were unable to be changed - security breaches of any description are completely unacceptable to us. We are reviewing this to understand the details.
freitasm:So it seems. Thanks for the direct link. Is this manned 24x7?
The call centre is 7am-7pm, Monday to Friday. Though I think some of the peeps there will keep an ear out whenever they're awake. I know they pulled a long weekend over Wannacry.
(Sadly I ended up going to bed early last night, so I didn't see this post)
Would Vodafone put in a coordinated disclosure policy soon? It seems only the small ISPs are doing it at the moment, would be good to see the big ISPs join in. Or even better a bug bounty.
freitasm:
As I said, performance and security should be in the development team's mind when they implement anything. There should have unit, system, integration and regression tests in every single step of the development lifecycle.
Release managers that authorise deployment without having a check mark against security items shouldn't be release managers.
Security testing can be challenging, particularly automated testing. Tinfoil Security that you recommended a while back is an interesting option.
Sometimes project / release managers will say "we need security testing", business owners will say "no get it live asap".
I have to say well done Vodafone for the extremely timely response. No questions about this. Thanks @MikeHales!
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
|
![]() ![]() ![]() |