zlacker

[return to "Checkout.com hacked, refuses ransom payment, donates to security labs"]
1. prodig+47[view] [source] 2025-11-13 10:24:20
>>Strang+(OP)
If i was a customer id be pissed off, but this is as good as a response you can have to an incident like this.

- timely response

- initial disclosure by company and not third party

- actual expression of shame and remorse

- a decent explanation of target/scope

i could imagine being cyclical about the statement, but look at other companies who have gotten breached in the past. very few of them do well on all points

◧◩
2. embedd+ei[view] [source] 2025-11-13 11:54:38
>>prodig+47
> - timely response

Timely in what way? Seems they didn't discover the hack themselves, didn't discover it until the hackers themselves reached out last week, and today we're seeing them acknowledging it. I'm not sure anything here could be described as "timely".

◧◩◪
3. prodig+Do[view] [source] 2025-11-13 12:44:09
>>embedd+ei
I have been doing a self Have I Been Pwned audit and, reading many company blog posts, and it wasn't uncommon to see disclosure months after incidents.
◧◩◪◨
4. embedd+Ep[view] [source] 2025-11-13 12:50:13
>>prodig+Do
Yeah, that sucks, and I wouldn't call those "timely" either. Is your point that "timely" is relative and depends on what others are doing? Personally, "slow" is slow regardless of how slow others are, but clearly some would feel differently, that's OK too.
◧◩◪◨⬒
5. dpolon+6p1[view] [source] 2025-11-13 17:53:55
>>embedd+Ep
"Timely" is relative, right? If I build a house in a week, that was done in a timely fashion, as it was done faster than average,

If i build a house of cards in a week, that took way longer than the average house of cards, and it would not be fair to call it "timely".

In a world where most companies report breaches months after the fact, yes, I think "last week we found out about it and we're now confirming it" is fair. You need to work with Law Enforcement, you need to confirm the validity of the data and the hacker's claims, and that they data they are ransoming is all they actually took. You need to check the severity of the data they took. Was it user/passes? Was there any trademarked processes, IP, sensitive info? You need to ensure the threat actor is removed from your environment, and the hole they got in with is closed.

If you choose to pay the ransom, you may need to work even closer with LE to ensure you don't get flagged for aiding and funding criminals.

With them choosing not to pay, I'm sure they need to clear that with legal still. Finance needs to be on board. Can you actually call it a charitable donation for a tax write-off if its under this sort of duress? (And I'd assume there's other sort's of questions a SysAdmin can't be expected to come up with examples for)

While ALL of this is happening, you can't announce your actions. You can't put our a PR until you know for sure you were compromised, what the scope was, and that any persistence has been removed.

[go to top]