From Irish news website The Journal:
“Vigilante cybersecurity expert targets Dublin firm”
That’s quite a headline: Vigilantes target an Irish business. But hang on, there’s a cybersecurity angle…
“A DUBLIN-BASED postal service took down its website yesterday, after an alleged security flaw was identified.
“CityPost holds the details of its customers online but a vigilante security researcher told TheJournal.ie that he was able to find a method to hack into the website and find customers’ personal details.”
The “vigilante” in question is Pakistani penetration tester Touseef Gul, who has previously made the headlines for discovering a way to bypass Sucuri’s web application firewall (snaffled up by GoDaddy earlier this year).
Touseef says he didn’t exploit the SQL injection vulnerability to steal any customer data, and merely reported the problem to CityPost.
CityPost characterised the report of a website flaw as a “false alarm”, but “notwithstanding that, in the interest of best practice, we have taken the site down and we will [be] carrying out full stress tests on the site.”
Sure enough, the site remains down today.
I’ll leave it to you, gentle reader, to decide for yourself whether there really was likely to have been a vulnerability on the CityPost website or not.
It’s probably not a good thing for penetration testers to probe the defences of companies and their websites without the permission of the firms themselves, but all Touseef did in this case would have been the equivalent of typing some characters into his browser’s address bar.
That hardly feels like something that should be portrayed in the press as the activities of a “vigilante” who has “targeted” a firm.
Better that someone like Gul should find such a flaw than it be left open for malicious online criminals to exploit.