zlacker

[parent] [thread] 90 comments
1. throwa+(OP)[view] [source] 2025-11-13 10:08:35
I love this part (no trolling from me):

    > We are sorry. We regret that this incident has caused worry for our partners and people. We have begun the process to identify and contact those impacted and are working closely with law enforcement and the relevant regulators. We are fully committed to maintaining your trust.
I know there will by a bunch of cynics who say that an LLM or a PR crisis team wrote this post... but if they did, hats off. It is powerful and moving. This guys really falls on his sword / takes it on the chin.
replies(7): >>M4v3R+b >>sigmoi+G >>blitza+ad >>mannan+9f >>udev40+9k >>tippa1+vn >>Animat+s82
2. M4v3R+b[view] [source] 2025-11-13 10:09:50
>>throwa+(OP)
Words are cheap, but "We are sorry." is a surprisingly rare thing for a company to say (they will usually sugarcoat it, shift blame, add qualifiers, use weasel words, etc.), so it's refreshing to hear that.
replies(1): >>sunaoo+O1
3. sigmoi+G[view] [source] 2025-11-13 10:14:32
>>throwa+(OP)
I'll never not think of that South Park scene where they mocked BP's "We're so sorry" statement whenever I see one of those. I don't care if you're sorry or if you realize how much you betrayed your customers. Tell me how you investigated the root causes of the incident and how the results will prevent this scenario from ever happening again. Like, how many other deprecated third party systems were identified handling a significant portion of your customer data after this hack? Who declined to allocate the necessary budget to keep systems updated? That's the only way I will even consider giving some trust back. If you really want to apologise, start handing out cash or whatever to the people you betrayed. But mere words like these are absolutely meaningless in today's world. People are right to dismiss them.
replies(10): >>YetAno+L3 >>jacque+O4 >>pembro+e6 >>josfre+cb >>ema+hg >>bargai+ho >>gosub1+5v >>saulpw+YU >>renewi+091 >>strong+pO2
◧◩
4. sunaoo+O1[view] [source] [discussion] 2025-11-13 10:22:53
>>M4v3R+b
This is a classic example of a fake apology: "We regret that this incident has caused worry for our partners and people" they are not really "sorry" that data was stolen but only "regret" that their partners are worried. No word on how they will prevent this in the future and how it even happened. Instead it gets downplayed ("legacy third-party","less than 25% were affected" (which is a huge number), no word on what data exactly).
replies(6): >>kolibe+c4 >>dcmint+u6 >>contra+f7 >>berkes+x7 >>udev40+Qk >>darkwa+nm
◧◩
5. YetAno+L3[view] [source] [discussion] 2025-11-13 10:36:36
>>sigmoi+G
Right. Transparency doesn't mean telling about the attack that already happened. It means telling us about their issues and ways this could happen again. And they didn't even mention the investment amount for the security labs.
◧◩◪
6. kolibe+c4[view] [source] [discussion] 2025-11-13 10:39:58
>>sunaoo+O1
How would the apology need to be worded so that it does not get interpreted as a fake apology?

In terms of "downplaying" it seems like they are pretty concrete in sharing the blast radius. If less than 25% of users were affected, how else should they phrase this? They do say that this was data used for onboarding merchants that was on a system that was used in the past and is no longer used.

I am as annoyed by companies sugar coating responses, but here the response sounds refreshingly concrete and more genuine than most.

replies(4): >>action+w4 >>throwa+0g >>esskay+0m >>hitarp+Su
◧◩◪◨
7. action+w4[view] [source] [discussion] 2025-11-13 10:43:16
>>kolibe+c4
"Up to 25% of users were affected." "As many as 25% of users were affected."

"A quarter of user accounts were affected. We have calculated that to be 7% of our customers."

◧◩
8. jacque+O4[view] [source] [discussion] 2025-11-13 10:45:05
>>sigmoi+G
I wouldn't be so quick. Everybody gets hacked, sooner or later. Whether they'll own up to it or not is what makes the difference and I've seen far, far worse than this response by Checkout.com, it seems to be one of the better responses to such an event that I've seen to date.

> Like, how many other deprecated third party systems were identified handling a significant portion of your customer data after this hack?

The problem with that is that you'll never know. Because you'd have to audit each and every service provider and I think only Ebay does that. And they're not exactly a paragon of virtue either.

> Who declined to allocate the necessary budget to keep systems updated?

See: prevention paradox. Until this sinks in it will happen over and over again.

> But mere words like these are absolutely meaningless in today's world. People are right to dismiss them.

Again, yes, but: they are at least attempting to use the right words. Now they need to follow them up with the right actions.

replies(7): >>sharke+X6 >>BoredP+h7 >>benchl+xd >>kbrkbr+Kd >>miohta+rs >>adrian+hZ >>throwa+Im2
◧◩
9. pembro+e6[view] [source] [discussion] 2025-11-13 10:57:34
>>sigmoi+G
In attacks on software systems specifically though, I always find this aggressive stance toward the victimized business odd, especially when otherwise reasonable security standards have been met. You simply cannot plug all holes.

As AI tools accelerate hacking capabilities, at what point do we seriously start going after the attackers across borders and stop blaming the victimized businesses?

We solved this in the past. Let’s say you ran a brick-and-mortar business, and even though you secured your sensitive customer paperwork in a locked safe (which most probably didn’t), someone broke into the building and cracked the safe with industrial-grade drilling equipment.

You would rightly focus your ire and efforts on the perpetrators, and not say ”gahhh what an evil dumb business, you didn’t think to install a safe of at least 1 meter thick titanium to protect against industrial grade drilling!????”

If we want to have nice things going forward, the solution is going to have to involve much more aggressive cybercrime enforcement globally. If 100,000 North Koreans landed on the shores of Los Angeles and began looting en masse, the solution would not be to have everybody build medieval stone fortresses around their homes.

◧◩◪
10. dcmint+u6[view] [source] [discussion] 2025-11-13 10:59:23
>>sunaoo+O1
This was our mistake, and we take full responsibility.

That preceding line makes it, to me, a real apology. They admit fault.

◧◩◪
11. sharke+X6[view] [source] [discussion] 2025-11-13 11:03:19
>>jacque+O4
Well said, ideally action comes first and then these actions can be communicated.

But in the real world, you have words ie. commitment before actions and a conclusion.

Best of luck to them.

◧◩◪
12. contra+f7[view] [source] [discussion] 2025-11-13 11:06:35
>>sunaoo+O1
Seems a bit harsh to leave out the rest of the apology and only focus on the part that is not much of an apology.
◧◩◪
13. BoredP+h7[view] [source] [discussion] 2025-11-13 11:06:48
>>jacque+O4
There are millions of companies even century or decade old ones without a hacking incident with data extraction. The whole everyone gets hacked is copium for a lack of security standards or here the lack of deprecation and having unmantained systems online with legacy client data. Announcing it proudly would be concerning if I had business with them. It's not even a lack of competence... it's a lack of hygiene.
replies(1): >>bragr+49
◧◩◪
14. berkes+x7[view] [source] [discussion] 2025-11-13 11:08:39
>>sunaoo+O1
I always presume the "We are sorry" opens up to financial compensation, whereas the "we regret that you are worried" does not.

In my country, this debate is being held WRT the atrocities my country committed in its (former) colonies, and towards enslaved humans¹. Our king and prime minister never truly "apologized". Because, I kid you not, the government fears that this opens up possibilities for financial reparation or compensation and the government doesn't want to pay this. They basically searched for the words that sound as close to apologies as possible, but aren't words that require one to act on the apologies.

¹ I'm talking about The Netherlands. Where such atrocities were committed as close as one and a half generations ago still (1949) (https://www.maastrichtuniversity.nl/blog/2022/10/how-do-dutc...) but mostly during what is still called "The Golden Age".

replies(1): >>mrguyo+Gq1
◧◩◪◨
15. bragr+49[view] [source] [discussion] 2025-11-13 11:19:50
>>BoredP+h7
>There are millions of companies even century or decade old ones without a hacking incident with data extraction.

Name five.

replies(2): >>Retric+Eb >>udev40+fk
◧◩
16. josfre+cb[view] [source] [discussion] 2025-11-13 11:37:29
>>sigmoi+G
No trolling on my side, I think having people who think just like you is a triumph for humanity. As we approach times far darker and manipulation takes smarter shapes, a cynical mind is worth many trophies.
◧◩◪◨⬒
17. Retric+Eb[view] [source] [discussion] 2025-11-13 11:42:28
>>bragr+49
The pedantic answer is to point to a bunch of shell companies without any electronic presence. However in terms of actual businesses there’s decent odds the closest dry cleaners, independent restaurant, car wash, etc has not had its data extracted by a hacking incident.

Having a minimal attack surface and not being actively targeted is a meaningful advantage here.

replies(1): >>bragr+Rt1
18. blitza+ad[view] [source] 2025-11-13 11:54:37
>>throwa+(OP)
> We are fully committed to maintaining your trust.

We are fully committed to rebuilding your trust.

◧◩◪
19. benchl+xd[view] [source] [discussion] 2025-11-13 11:57:10
>>jacque+O4
> Everybody gets hacked, sooner or later.

Right! But, wouldn't a more appropriate approach be to mitigate the damage from being hacked as much as possible in the first place? Perhaps this starts by simplifying bloated systems, reducing data collection to data that which is only absolutely legally necessary for KYC and financial transactions in whatever respective country(ies) the service operates in, hammer-testing databases for old tricks that seem to have been forgotten about in a landscape of hacks with ever-increasingly complexity, etc.

Maybe it's the dad in me, years of telling me son to not apologize, but to avoid the behavior that causes the problem in the first place. Bad things happen, and we all screw up from time to time, that is a fact of life, but a little forethought and consideration about the best or safest way to do a thing is a great way to shrink the blast area of any surprise bombs that go off.

replies(4): >>ummonk+bj >>markdo+Dj >>iwontb+ff1 >>halfca+SC2
◧◩◪
20. kbrkbr+Kd[view] [source] [discussion] 2025-11-13 11:58:11
>>jacque+O4
I like your stance.

We also have to remember that we have collectively decided to use Windows and AD, QA tested software etc (some examples) over correct software, hardened by default settings etc.

21. mannan+9f[view] [source] 2025-11-13 12:09:10
>>throwa+(OP)
I like you like this. For me it’s close but fails in the word selection in the last sentence: “maintaining” trust is not what I would say their job is at this point, it’s “restoring” it.

One places the company at the center as the important point of reference, avoiding some responsibility. The other places the customer at the center, taking responsibility.

◧◩◪◨
22. throwa+0g[view] [source] [discussion] 2025-11-13 12:15:55
>>kolibe+c4
> How would the apology need to be worded so that it does not get interpreted as a fake apology?

"We regret that we neglected our security to such degree that it has caused this incident."

It's very simple. Don't be sorry I feel bad, be sorry you did bad.

replies(1): >>kolibe+jk
◧◩
23. ema+hg[view] [source] [discussion] 2025-11-13 12:17:56
>>sigmoi+G
> prevent this scenario from ever happening again.

Every additional nine of not getting hacked takes effort. Getting to 100% takes infinite effort i.e. is impossible. Trying to achieve the impossible will make you spin on the spot chasing ever more obscure solutions.

As soon as you understand a potential solution enough to implement it you also understand that it cannot achieve the impossible. If you keep insisting on achieving the impossible you have to abandon this potential solution and pin your hope on something you don't understand yet. And so the cycle repeats.

It is good to hold people accountable but only demand the impossible from those you want to go crazy.

◧◩◪◨
24. ummonk+bj[view] [source] [discussion] 2025-11-13 12:39:49
>>benchl+xd
I don’t see how any of what you’re suggesting would have prevented this hack though (which involved an old storage account that hadn’t been used since 2020 getting hacked).
replies(1): >>benchl+8t
◧◩◪◨
25. markdo+Dj[view] [source] [discussion] 2025-11-13 12:44:21
>>benchl+xd
> Maybe it's the dad in me, years of telling me son to not apologize, but to avoid the behavior that causes the problem in the first place.

What an odd thing to teach a child. If you've wronged someone, avoiding the behavior in future is something that'll help you, but does sweet fuck all for the person you just wronged. They still deserve an apology.

replies(3): >>james_+Mm >>timcob+bn >>benchl+3s
26. udev40+9k[view] [source] 2025-11-13 12:47:08
>>throwa+(OP)
Since when did owning up to a data breach become such a noteworthy event? Less than 25% sounds more like exactly 25% of impacted customers
◧◩◪◨⬒
27. udev40+fk[view] [source] [discussion] 2025-11-13 12:48:07
>>bragr+49
There are definitely companies who have never been breached and it's not that hard. Defense in depth is all you need
replies(1): >>Realit+fC
◧◩◪◨⬒
28. kolibe+jk[view] [source] [discussion] 2025-11-13 12:48:10
>>throwa+0g
They stated clearly in the article:

> This was our mistake, and we take full responsibility.

I wonder how much of the negative sentiment about this is from a knee jerk reaction and careless reading vs. thoughtful commentary.

replies(1): >>throwa+cP2
◧◩◪
29. udev40+Qk[view] [source] [discussion] 2025-11-13 12:51:03
>>sunaoo+O1
Agreed. It's just a classic way to manipulate the viewers. They just wanted to sound edgy for not paying a ransom, which is definitely a good thing. Never pay these crooks but you left a legacy system online without any protections? That's serious
◧◩◪◨
30. esskay+0m[view] [source] [discussion] 2025-11-13 12:58:43
>>kolibe+c4
IMO something like:

We are truly sorry for the impact this has no doubt caused on our customers and partners businesses. This clearly should never have happened, and we take full responsibility.

Whilst we can never put into words how deeply sorry we are, we will work tirelessly to make this right with each and every one of you, starting with a full account of what transpired, and the steps we are going to be taking immediately to ensure nothing like this can ever happen again.

We want to work directly with you to help minimise the impact on you, and will be reaching out to every customer directly to help understand their immediate needs. If that means helping you migrate away to another platform, then so be it - we will assist in any way we can. Trust should be earn't, and we completely understand that in this instance your trust in us has understandably been shaken.

replies(1): >>Anthon+Bs2
◧◩◪
31. darkwa+nm[view] [source] [discussion] 2025-11-13 13:00:53
>>sunaoo+O1
> No word on how they will prevent this in the future and how it even happened.

Because these things take time, while you need to disclose that something happened as fast as possible to your customers (in the EU, you are mandated by the GDPR, for instance).

◧◩◪◨⬒
32. james_+Mm[view] [source] [discussion] 2025-11-13 13:03:40
>>markdo+Dj
Not a weird thing to teach a child.

It’s 5-why’s style root cause analysis, which will build a person that causes less harm to others.

I am willing to believe that the same parent also teaches when and why it is sometimes right to apologize.

replies(1): >>benchl+Lr
◧◩◪◨⬒
33. timcob+bn[view] [source] [discussion] 2025-11-13 13:05:02
>>markdo+Dj
I think people this approach is overcompensating for over-apologizing (or, similarly, over thanking, both in excess are off-putting). I have a child who just says "sorry" and doesn't actually care about changing the underlying behavior.

But yes, even if you try to make a healthy balance, there are still plenty of times when an apology are appropriate and will go a long way, for the giver and receiver, in my opinion anyway.

34. tippa1+vn[view] [source] 2025-11-13 13:07:24
>>throwa+(OP)
Refreshing to not see "due to an abundance of caution". Kudos to the response in general, they pretty much ticked all boxes.
◧◩
35. bargai+ho[view] [source] [discussion] 2025-11-13 13:12:42
>>sigmoi+G
The intent of the South Park sketch was to lampoon that BP were (/are) willingly doing awful things and then give corpo apology statements when caught.

Here, Checkout has been the victim of a crime, just as much as their impacted customers. It’s a loss for everyone involved except the perpetrators. Using words like “betrayed” as if Checkout wilfully mislead its customers, is a heavy accusation to level.

At a point, all you can do is apologise, offer compensation if possible, and plot out how you’re going to prevent it going forward.

replies(1): >>ImPost+zu
◧◩◪◨⬒⬓
36. benchl+Lr[view] [source] [discussion] 2025-11-13 13:35:56
>>james_+Mm
Thanks, this is where I was coming from. I suppose I could have made that more clear in my original comment. The idea behind my style of parenting is self-reflecting and our ability to analyze the impact of our choices before we make them.

But of course, apologizing when you have definitely wronged a person is important, too. I didn't mean to come off as teaching my kid to never apologize, just think before you act. But you get the idea.

replies(1): >>ryandr+c71
◧◩◪◨⬒
37. benchl+3s[view] [source] [discussion] 2025-11-13 13:37:13
>>markdo+Dj
Sorry, I should have worded that as "stop apologizing so much, especially when you keep making the same mistake/error/disruption/etc."

I did not mean to come off as teaching my kid to never apologize.

replies(1): >>skeete+FL
◧◩◪
38. miohta+rs[view] [source] [discussion] 2025-11-13 13:40:06
>>jacque+O4
Not everyone gets hacked. Companies not hacked include e.g.

- Google

- Amazon

- Meta

replies(13): >>ceejay+St >>lr4444+ju >>sigmoi+lu >>dragon+Iu >>xvecto+tw >>ckozlo+1z >>Aarons+BG >>skeete+1M >>red-ir+4N >>alt227+vO >>jacque+BS >>Thorre+oW >>edm0nd+7z1
◧◩◪◨⬒
39. benchl+8t[view] [source] [discussion] 2025-11-13 13:43:53
>>ummonk+bj
You don't see how preventative maintenance such as implementing a policy to remove old accounts after N days could have prevented this? Preventative maintenance is part of the forethought that should take place about the best or safest way to do a thing. This is something that could be easily learned by looking an problems others have had in the past.

As a controls tech, I provide a lot of documentation and teach to our customers about how to deploy, operate and maintain a machine for best possible results with lowest risk to production or human safety. Some clients follow my instruction, some do not. Guess which ones end up getting billed most for my time after they've implemented a product we make.

Too often, we want to just do without thinking. This often causes us to overlook critical points of failure.

replies(2): >>ChrisM+5Q >>bix6+DZ
◧◩◪◨
40. ceejay+St[view] [source] [discussion] 2025-11-13 13:48:20
>>miohta+rs
Meta once misconfigured the web servers and exposed the source. https://techcrunch.com/2007/08/11/facebook-source-code-leake...
◧◩◪◨
41. lr4444+ju[view] [source] [discussion] 2025-11-13 13:50:40
>>miohta+rs
... that we know of. Perhaps some of those "outages" were compromised systems.
replies(1): >>red-ir+iN
◧◩◪◨
42. sigmoi+lu[view] [source] [discussion] 2025-11-13 13:50:43
>>miohta+rs
The relevant difference here is that these companies have actual security standards on the level that you would only find in the FAA or similar organisations were lives are in danger. For every incident in Google cloud for example, they don't just apologise, but they state exactly what happened and how they responded (down to the minute) and you can read up exactly how they plan to prevent this from happening again: https://status.cloud.google.com/incidents/ow5i3PPK96RduMcb1S...

This is what incident handling by a trustworthy provider looks like.

◧◩◪
43. ImPost+zu[view] [source] [discussion] 2025-11-13 13:52:15
>>bargai+ho
> At a point, all you can do is apologise, offer compensation if possible, and plot out how you’re going to prevent it going forward.

I totally agree – You've covered the 3 most important things to do here: Apologize; make it right; sufficiently explain in detail to customers how you'll prevent recurrences.

After reading the post, I see the 1st of 3. To their credit, most companies don't get that far, so thanks, Checkout.com. Now keep going, 2 tasks left to do and be totally transparent about.

◧◩◪◨
44. dragon+Iu[view] [source] [discussion] 2025-11-13 13:53:23
>>miohta+rs
Google just got hacked in June:

https://cloud.google.com/blog/topics/threat-intelligence/voi...

https://www.forbes.com/sites/daveywinder/2025/08/09/google-c...

replies(1): >>NBJack+hx
◧◩◪◨
45. hitarp+Su[view] [source] [discussion] 2025-11-13 13:54:31
>>kolibe+c4
an effective apology establishes accountability, demonstrates reflection on what caused the problem, and commits to concrete changes to prevent it from reoccurring
◧◩
46. gosub1+5v[view] [source] [discussion] 2025-11-13 13:56:22
>>sigmoi+G
What you request is for them to divulge internal details of their architecture that could lead to additional compromise as well as admission of fault that could make it easier for them to be sued. All for some intangible moral notion. No business leader would ever do those things.
◧◩◪◨
47. xvecto+tw[view] [source] [discussion] 2025-11-13 14:06:38
>>miohta+rs
They also have plenty of domestic and foreign intelligence agents literally working with sensitive systems at the company.
◧◩◪◨⬒
48. NBJack+hx[view] [source] [discussion] 2025-11-13 14:11:07
>>dragon+Iu
That was a Salesforce instance with largely public data, rather than something owned and operated by Google itself. It's a bit like saying you stole from me, but instead of my apartment you broke into my off-site storage with Uhaul. Technically correct, but different implications on the integrity of my apartment security.
replies(1): >>scottb+NJ
◧◩◪◨
49. ckozlo+1z[view] [source] [discussion] 2025-11-13 14:18:52
>>miohta+rs
Amazonian here. My views are my own; I do not represent my company/corporate.

That said...

We do our very best. But I don't know anyone here who would say "it can never happen". Security is never an absolute. The best processes and technology will lower the likelihood and impact towards 0, but never to 0. Viewed from that angle, it's not if Amazon will be hacked, it's when and to what extent. It is my sincere hope that if we have an incident, we rise up to the moment with transparency and humility. I believe that's what most of us are looking for during and after an incident has occurred.

To our customers: Do your best, but have a plan for what you're going to do when it happens. Incidents like this one here from checkout.com can show examples of some positive actions that can be taken.

replies(1): >>jacque+ET
◧◩◪◨⬒⬓
50. Realit+fC[view] [source] [discussion] 2025-11-13 14:38:05
>>udev40+fk
Isn't defense in depth's whole point that some of your defenses will get breached?
replies(1): >>BoredP+zF
◧◩◪◨⬒⬓⬔
51. BoredP+zF[view] [source] [discussion] 2025-11-13 14:54:23
>>Realit+fC
Take the OP. What defenses were breached? An old abandoned system running unmantained in the background with old user data still attached. There is no excuse.
◧◩◪◨
52. Aarons+BG[view] [source] [discussion] 2025-11-13 14:58:39
>>miohta+rs
Google got hacked back in 2010, lookup Operation Aurora. It wasn't a full own, but it shows that even the big guys can get hacked.
◧◩◪◨⬒⬓
53. scottb+NJ[view] [source] [discussion] 2025-11-13 15:15:22
>>NBJack+hx
It was a social engineering attack that leveraged the device OAuth flow, where the device gaining access to the resource server (in this case the Salesforce API) is separate from the device that grants the authorization.

The hackers called employees/contractors at Google (& lots of other large companies) with user access to the company's Salesforce instance and tricked them into authorizing API access for the hackers' machine.

It's the same as loading Apple TV on your Roku despite not having a subscription and then calling your neighbor who does have an account and tricking them into entering the 5 digit code at link.apple.com

Continuing with your analogy, they didn't break into the off-site storage unit so much as they tricked someone into giving them a key.

There's no security vulnerability in Google/Salesforce or your apartment/storage per se, but a lapse in security training for employees/contractors can be the functional equivalent to a zero-day vulnerability.

replies(1): >>Thorre+7V
◧◩◪◨⬒⬓
54. skeete+FL[view] [source] [discussion] 2025-11-13 15:23:58
>>benchl+3s
"Sorry - this is my fault" is such an effective response, if followed up with "how do we make this right?" or "stop this from happening again?"
◧◩◪◨
55. skeete+1M[view] [source] [discussion] 2025-11-13 15:26:01
>>miohta+rs
fair or not, if their customers get hacked it's still on them to mitigate and reduce the damage. Ex: cloud providers that provide billing alerts but not hard cut-offs are not doing a good job.
◧◩◪◨
56. red-ir+4N[view] [source] [discussion] 2025-11-13 15:30:51
>>miohta+rs
Nah.

The Chinese got into gmail (Google) essentially on a whim to get David Petraeus' emails to his mistress. Ended his career, basically.

I'd bet my hat that all 3 are definitely penetrated and have been off and on for a while -- they just don't disclose it.

source: in security at big orgs

replies(2): >>Thorre+PX >>thauma+fe1
◧◩◪◨⬒
57. red-ir+iN[view] [source] [discussion] 2025-11-13 15:31:59
>>lr4444+ju
"shit it's compromised. pull the plug ASAP"
◧◩◪◨
58. alt227+vO[view] [source] [discussion] 2025-11-13 15:37:24
>>miohta+rs
Didnt Edward Snowden release documents that the NSA had fully compromised googles internal systems?
replies(1): >>edm0nd+nA1
◧◩◪◨⬒⬓
59. ChrisM+5Q[view] [source] [discussion] 2025-11-13 15:44:20
>>benchl+8t
For the app I maintain, we have a policy of deleting inactive accounts, after a year. We delete approved signups that have not been “consummated,” after thirty days.

Even so, we still need to keep an eye out. A couple of days ago, an old account (not quite a year), started spewing connection requests to all the app users. It had been a legit account, so I have to assume it was pwned. We deleted it quickly.

A lot of our monitoring is done manually, and carefully. We have extremely strict privacy rules, and that actually makes security monitoring a bit more difficult.

replies(1): >>jacque+gS
◧◩◪◨⬒⬓⬔
60. jacque+gS[view] [source] [discussion] 2025-11-13 15:53:26
>>ChrisM+5Q
These are excellent practices.

Such data is a liability, not an asset and if you dispose of it as soon as you reasonably can that's good. If this is a communications service consider saving a hash of the ID and refusing new sign ups with that same ID because if the data gets deleted then someone could re-sign up with someone else's old account. But if you keep a copy of the hash around you can check if an account has ever existed and refuse registration if that's the case.

replies(1): >>ChrisM+1s1
◧◩◪◨
61. jacque+BS[view] [source] [discussion] 2025-11-13 15:54:22
>>miohta+rs
Everybody includes Google, Amazon and Meta.

They too will get hacked, if it hasn't happened already.

◧◩◪◨⬒
62. jacque+ET[view] [source] [discussion] 2025-11-13 15:58:03
>>ckozlo+1z
> But I don't know anyone here who would say "it can never happen". Security is never an absolute.

Exactly. I think it is great for people like you to inject some more realistic expectations into discussions like these.

An entity like Amazon is not - in the longer term - going to escape fate, but they have more budget and (usually) much better internal practices which rule out the kind of thing that would bring down a lesser org. But in the end it is all about the budget, as long as Amazon's budget is significantly larger than the attackers they will probably manage to stay ahead. But if they ever get complacent or start economizing on security then the odds change very rapidly. Your very realistic stance is one of the reasons it hasn't happened yet, you are acutely aware you are in spite of all of your efforts still at risk.

Blast radius reduction by removing data you no longer need (and that includes the marketing department, who more often than not are the real culprit) is a good first step towards more realistic expectations for any org.

◧◩
63. saulpw+YU[view] [source] [discussion] 2025-11-13 16:04:45
>>sigmoi+G
They are donating the entire ransom amount to two universities for security research. I don't care about the words themselves, but assuming they're not outright lying about this, that meant a lot to me. They are putting their (corporate!) money where their mouth is.
◧◩◪◨⬒⬓⬔
64. Thorre+7V[view] [source] [discussion] 2025-11-13 16:05:07
>>scottb+NJ
There's no vulnerability per se, but I think the Salesforce UI is pretty confusing in this case. It looks like a login page, but actually if you fill it in, you're granting an attacker access.

Disclosure: I work at Google, but don't have much knowledge about this case.

◧◩◪◨
65. Thorre+oW[view] [source] [discussion] 2025-11-13 16:11:24
>>miohta+rs
Facebook was hacked in 2013. Attacker used a Java browser exploit to take over employees' computers:

https://www.reuters.com/article/technology/exclusive-apple-m...

Facebook was also hacked in 2018. A vulnerability in the website allowed attackers to steal the API keys for 50 million accounts:

>>18094823

◧◩◪◨⬒
66. Thorre+PX[view] [source] [discussion] 2025-11-13 16:17:57
>>red-ir+4N
Do you have a source that the Google hack was related to David Petraeus? This page doesn't mention it[1]. Does the timeline line up? Google was hacked in 2009[2]. The Petraeus stuff seems to have happened later.

Disclosure: I work at Google but have no internal knowledge about whether Petraeus was related to Operation Aurora.

[1] https://en.wikipedia.org/wiki/Petraeus_scandal

[2] https://en.wikipedia.org/wiki/Operation_Aurora

◧◩◪
67. adrian+hZ[view] [source] [discussion] 2025-11-13 16:24:20
>>jacque+O4
The prevention paradox only really applies when the bad event has significant costs. It seems to me that getting hacked has at worst mild consequences. Cisco for example is still doing well despite numerous embarrassing backdoors.
◧◩◪◨⬒⬓
68. bix6+DZ[view] [source] [discussion] 2025-11-13 16:26:35
>>benchl+8t
> I provide a lot of documentation

> Some clients follow my instruction, some do not.

So you’re telling me you design a non-foolproof system?!? Why isn’t it fully automated to prevent any potential pitfalls?

◧◩◪◨⬒⬓⬔
69. ryandr+c71[view] [source] [discussion] 2025-11-13 17:01:51
>>benchl+Lr
Yea, plus, anyone with kids knows that a lot of them just treat "sorry" as some sort of magic spell that you casually invoke right after you mess up, and then continue on with your ways. I teach my kid to both apologize and then consider corrective action, too.
◧◩
70. renewi+091[view] [source] [discussion] 2025-11-13 17:08:55
>>sigmoi+G
Haha, yes, this is entirely what I expected. I was actually pleasantly surprised by the GP because internet commentators always find a reason that some statement is imperfect.

Indeed, an apology is bad and no apology is also bad. In fact, all things are bad. Haha! Absolutely prime.

◧◩◪◨⬒
71. thauma+fe1[view] [source] [discussion] 2025-11-13 17:29:48
>>red-ir+4N
> I'd bet my hat that all 3 are definitely penetrated and have been off and on for a while -- they just don't disclose it.

Considering the number of Chinese nationals who work for them at various levels... of course they're all penetrated. How could that possibly fail to be true?

◧◩◪◨
72. iwontb+ff1[view] [source] [discussion] 2025-11-13 17:34:17
>>benchl+xd
lmao you taught your son to not apologize and if he can help it not do anything that gets him caught. maybe this is how we get politicians that never admit they were wrong and weasel out of everything
◧◩◪◨
73. mrguyo+Gq1[view] [source] [discussion] 2025-11-13 18:23:12
>>berkes+x7
If you are unwilling to say "We are sorry" because "that opens you up to lawsuits" then you are not sorry.

Letting business concerns trump human empathy is exactly the damn problem and exactly why these companies still deserve immense ire no matter how they word their "We don't want to admit fault but we want you to think we care" press release. This is also true of something like the Dutch crown or the USA having tons of people being extremely upset at the suggestion of teaching kids what the US has actually done in it's history.

replies(1): >>berkes+BI3
◧◩◪◨⬒⬓⬔⧯
74. ChrisM+1s1[view] [source] [discussion] 2025-11-13 18:29:58
>>jacque+gS
It would violate our privacy policy.

It's important that "delete all my information" also deletes everything after the user logs in for the first time.

Also, I'm not sure that Apple would allow it. They insist that deletion remove all traces of the user. As far as I know, there's no legal mandate to retain anything, and the nature of our demographic, means that folks could be hurt badly by leaks.

So we retain as little information as possible -even if that makes it more difficult for us to adminster, and destroy everything, when we delete.

replies(1): >>jacque+IJ1
◧◩◪◨⬒⬓
75. bragr+Rt1[view] [source] [discussion] 2025-11-13 18:39:26
>>Retric+Eb
>there’s decent odds the closest dry cleaners, independent restaurant, car wash, etc has not had its data extracted by a hacking incident.

And there's also a decent chance they have. Did we not just have a years long spate of ransomware targeting small businesses?

replies(1): >>Retric+vY1
◧◩◪◨
76. edm0nd+7z1[view] [source] [discussion] 2025-11-13 19:00:50
>>miohta+rs
You are joking right?

All of these companies have been hacked by nation states like Russia and China.

◧◩◪◨⬒
77. edm0nd+nA1[view] [source] [discussion] 2025-11-13 19:06:21
>>alt227+vO
Yup. The NSA has every single major US tech company tapped at their server level and are harvesting all their data. Issues them NSLs and there is zero way these companies can refuse the taps.
◧◩◪◨⬒⬓⬔⧯▣
78. jacque+IJ1[view] [source] [discussion] 2025-11-13 19:55:08
>>ChrisM+1s1
I think you misunderstood my comment and/or fail to properly appreciate the subtle points of what I suggest you keep.

The risk you have here is one of account re-use, and the method I'm suggesting allows you to close that hole in your armor which could in turn be used to impersonate people whose accounts have been removed at their request. This is comparable to not being able to re-use a phone number once it is returned to the pool (and these are usually re-allocated after a while because they are a scarce resource, which ordinary user ids are not).

replies(1): >>ChrisM+JM1
◧◩◪◨⬒⬓⬔⧯▣▦
79. ChrisM+JM1[view] [source] [discussion] 2025-11-13 20:10:11
>>jacque+IJ1
> I think you misunderstood my comment and/or fail to properly appreciate the subtle points of what I suggest you keep.

Nah, but I understand the error. Not a big deal.

We. Just. Plain. Don't. Keep. Any. Data. Not. Immediately. Relevant. To. The. App.

Any bad actor can easily register a throwaway, and there's no way to prevent that, without storing some seriously dangerous data, so we don't even try.

It hasn't been an issue. The incident that I mentioned, is the only one we've ever had, and I nuked it in five minutes. Even if a baddie gets in, they won't be able to do much, because we store so little data. This person would have found all those connections to be next to useless, even if I hadn't stopped them.

I'm a really cynical bastard, and I have spent my entire adult life, rubbing elbows with some of the nastiest folks on Earth. I have a fairly good handle on "thinking like a baddie."

It's very important that people who may even be somewhat inimical to our community, be allowed to register accounts. It's a way of accessing extremely important resources.

◧◩◪◨⬒⬓⬔
80. Retric+vY1[view] [source] [discussion] 2025-11-13 21:11:35
>>bragr+Rt1
Most ransomeware isn’t exfiltrating data. For small business you can automate the ‘pay to unencrypt your HDD’ model easy without care for what’s on the disk.
81. Animat+s82[view] [source] 2025-11-13 22:02:43
>>throwa+(OP)
The hard line:

"We will pay $500,000 to anyone who can provide information leading to the arrest and conviction of the perpetrators. If the perpetrators can be clearly identified but are not in a country which extradites to or from the United States, we will pay $500,000 for their heads."

replies(1): >>gpm+kx2
◧◩◪
82. throwa+Im2[view] [source] [discussion] 2025-11-13 23:32:33
>>jacque+O4
I like this post. No matter how/when/where/why someone apologizes for a mistake on the Internet, there will always be an "Armchair Quarterback" (on HN) that says: "Oh, that's not a _real_ apology; if I were CEO/CTO/CIO, I would do X/Y/Z to prevent this issue." It feels like a version of "No True Scotsman".

<rolls eyes>

I feel like most of these people will never be senior managers at a tech company because they will "go broke" trying to prevent every last mistake, instead of creating a beautiful product that customers are desperate to buy! My father once said to me as a young person: "Don't insure yourself 'to death' (bankruptcy)." To say: You need to take some risk in life as a person, especially in business. To be clear: I am not advocating that business people be lazy about computer security. Rather, there is a reasonable limit to their efforts.

You wrote:

    > Everybody gets hacked, sooner or later.
I mostly agree. However, I do not understand how GMail is not hacked more often. Literally, I have not changed my Google password in ~10 years, and my GMail is still untouched. (Falls on sword...) How do they do it? Honestly: No trolling with my question! Does Google get hacked but they keep it a secret? They must be the target of near-constant "nation state"-level hacking programmes.
replies(2): >>lmz+Po2 >>rixed+0L2
◧◩◪◨
83. lmz+Po2[view] [source] [discussion] 2025-11-13 23:50:50
>>throwa+Im2
> Literally, I have not changed my Google password in ~10 years, and my GMail is still untouched.

The flip side of this is how many people are wrongly locked out of their gmail. I bet there's quite a few of them that failed to satisfy whatever filters Google put in place.

◧◩◪◨⬒
84. Anthon+Bs2[view] [source] [discussion] 2025-11-14 00:26:05
>>esskay+0m
Upvoted because that seemed like a genuine apology other than this phrase

> Whilst we can never put into words how deeply sorry we are

To my European ears that comes across as hyperbolic and insincere but maybe it’s fine for an American audience. These things are very culture-dependent.

◧◩
85. gpm+kx2[view] [source] [discussion] 2025-11-14 01:15:17
>>Animat+s82
You're not allowed to sponsor the murder of people in other countries just because they won't extradite to your country. If you did this from within the US, the federal government and probably whatever state you live in would rightfully consider this murder for hire.

Your recourse within US law is to petition the government to do something about it. Negotiate extradition. Go to war. Etc.

replies(1): >>blitza+Pa3
◧◩◪◨
86. halfca+SC2[view] [source] [discussion] 2025-11-14 02:16:12
>>benchl+xd
> a little forethought and consideration about the best or safest way to do a thing is a great way to shrink the blast area of any surprise bombs that go off

I don’t think I agree with this at all. Screwing up is, by far, the most impactful thing that can minimize the future blast radius.

Common sense, wisdom, and pain cannot be communicated very well. Much more effective if experienced. Like trying to explain “white as snow” to someone who’s never seen snow. You might say “white as coconut” but that doesn’t help them know about snow. Understanding this opens up a lot more grace and patience with kids.

Most often when we tell our kids, ”you know better”, it’s not true. We know better, only because we screwed it up 100 times before and felt the pain.

No amount of “think about the consequences of your actions” is going to prevent them from slipping on the ice, when they’ve never walked on the ice before.

◧◩◪◨
87. rixed+0L2[view] [source] [discussion] 2025-11-14 03:46:20
>>throwa+Im2
> How do they do it?

To begin with, they have a culture of not following "industry standards".

(For the reason that the industry never had this scale yet)

◧◩
88. strong+pO2[view] [source] [discussion] 2025-11-14 04:21:39
>>sigmoi+G
Can't please everybody all the time, so best to focus on the majority.
◧◩◪◨⬒⬓
89. throwa+cP2[view] [source] [discussion] 2025-11-14 04:35:08
>>kolibe+jk
the quote was "We regret that this incident has caused worry for our partners and people"
◧◩◪
90. blitza+Pa3[view] [source] [discussion] 2025-11-14 09:10:39
>>gpm+kx2
> Your recourse within US law is to petition the government to do something about it

Hey donnie, these guys are "Venezuelan drug trafficers"

◧◩◪◨⬒
91. berkes+BI3[view] [source] [discussion] 2025-11-14 14:53:55
>>mrguyo+Gq1
> If you are unwilling to say "We are sorry" because "that opens you up to lawsuits" then you are not sorry.

Exactly my point, but much better worded. Thanks.

[go to top]