Jump to content

DJI resorts to threatening security researcher after the researcher uncovered glaring security issues involving customer data

AlTech

A security researcher wanted to try and find bugs for DJI after DJI launched a bug bounty program this year.

 

Said security researcher found security errors after trying to probe DJI's system.

 

He then followed this up and found glaring security issues involving customer data.

 

The researcher attempted to inform DJI of the issues and DJI gave the researcher a choice: $30,000 and the report he was working on would never be published OR $0 and he could be sued under the Computer Fraud and Abuse Act.

 

He chose the latter and walked away from $30,000 USD after being threatened for finding glaring security issues.

 

 

The researcher has published their report online.

 

Quote

DJI, the Chinese company that manufactures the popular Phantom brand of consumer quadcopter drones, was informed in September that developers had left the private keys for both the "wildcard" certificate for all the company's Web domains and the keys to cloud storage accounts on Amazon Web Services exposed publicly in code posted to GitHub. Using the data, researcher Kevin Finisterre was able to access flight log data and images uploaded by DJI customers, including photos of government IDs, drivers licenses, and passports. Some of the data included flight logs from accounts associated with government and military domains.

Finisterre found the security error after beginning to probe DJI's systems under DJI's bug bounty program, which was announced in August. But as Finisterre worked to document the bug with the company, he got increasing pushback—including a threat of charges under the Computer Fraud and Abuse Act (CFAA). DJI refused to offer any protection against legal action in the company's "final offer" for the data. So Finisterre dropped out of the program and published his findings publicly yesterday, along with a narrative entitled, "Why I walked away from $30,000 of DJI bounty money."

 

So yeah, DJI PR really screwed up. There's not a ton of ways a company could possibly recover from something like this.

 

Oh and DJI had the balls to call him a Hacker in their corporate communications.

 

Source: https://arstechnica.co.uk/information-technology/2017/11/dji-left-private-keys-for-ssl-cloud-storage-in-public-view-and-exposed-customers/

Judge a product on its own merits AND the company that made it.

How to setup MSI Afterburner OSD | How to make your AMD Radeon GPU more efficient with Radeon Chill | (Probably) Why LMG Merch shipping to the EU is expensive

Oneplus 6 (Early 2023 to present) | HP Envy 15" x360 R7 5700U (Mid 2021 to present) | Steam Deck (Late 2022 to present)

 

Mid 2023 AlTech Desktop Refresh - AMD R7 5800X (Mid 2023), XFX Radeon RX 6700XT MBA (Mid 2021), MSI X370 Gaming Pro Carbon (Early 2018), 32GB DDR4-3200 (16GB x2) (Mid 2022

Noctua NH-D15 (Early 2021), Corsair MP510 1.92TB NVMe SSD (Mid 2020), beQuiet Pure Wings 2 140mm x2 & 120mm x1 (Mid 2023),

Link to comment
Share on other sites

Link to post
Share on other sites

talk about screwing up... they could have done this so nicely, giving him the money, fixing the flaws and not haveing it exposed untill they could have fixed it but nope...

I spent $2500 on building my PC and all i do with it is play no games atm & watch anime at 1080p(finally) watch YT and write essays...  nothing, it just sits there collecting dust...

Builds:

The Toaster Project! Northern Bee!

 

The original LAN PC build log! (Old, dead and replaced by The Toaster Project & 5.0)

Spoiler

"Here is some advice that might have gotten lost somewhere along the way in your life. 

 

#1. Treat others as you would like to be treated.

#2. It's best to keep your mouth shut; and appear to be stupid, rather than open it and remove all doubt.

#3. There is nothing "wrong" with being wrong. Learning from a mistake can be more valuable than not making one in the first place.

 

Follow these simple rules in life, and I promise you, things magically get easier. " - MageTank 31-10-2016

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

China man, it's literally a different world over there.

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

They managed to leave their private keys in open source code??

It is worryingly impressive for a tech company to manage to publish their keys which are meant to be store on a separate device.

DJI probably wanted the researcher to keep quiet not only because of the bad PR but to also give them time to blacklist the certificates and issue new ones because as soon as the researcher would publish their findings everyone would be able to find the keys even if DJI pushed a commit over them.

Link to comment
Share on other sites

Link to post
Share on other sites

Don't you just love it when companies are so unable to accept the fact their systems are vulnerable, that they decide to sue the ones telling them about it.

This sort of behaviors will only encourage security researchers to sell information on vulnerability to the highest bidder instead.

CPU: AMD Ryzen 3700x / GPU: Asus Radeon RX 6750XT OC 12GB / RAM: Corsair Vengeance LPX 2x8GB DDR4-3200
MOBO: MSI B450m Gaming Plus / NVME: Corsair MP510 240GB / Case: TT Core v21 / PSU: Seasonic 750W / OS: Win 10 Pro

Link to comment
Share on other sites

Link to post
Share on other sites

On 11/19/2017 at 5:35 AM, ScratchCat said:

They managed to leave their private keys in open source code??

It is worryingly impressive for a tech company to manage to publish their keys which are meant to be store on a separate device.

DJI probably wanted the researcher to keep quiet not only because of the bad PR but to also give them time to blacklist the certificates and issue new ones because as soon as the researcher would publish their findings everyone would be able to find the keys even if DJI pushed a commit over them.

Except the typical way to handle this is for the paper to just not be published for a certain length of time, so the company has time to fix the issue, usually a month or two.

 

You don't tell a researcher to publish it "never!"

Link to comment
Share on other sites

Link to post
Share on other sites

On 11/20/2017 at 10:48 AM, Sniperfox47 said:

Except the typical way to handle this is for the paper to just not be published for a certain length of time, so the company has time to fix the issue, usually a month or two.

 

You don't tell a researcher to publish it "never!"

Indeed - usually there's either a pre-arranged time for a bug bounty program (3 months, eg).

 

Or you simply negotiate a timing when presenting the details:

 

"Hey DJI, I found this major vulnerability!"

-Hacker guy

 

"Thanks my Dude, we need 45 days to fix it, then you can publish the full report. In the mean time, here's your $30,000 reward - we cool?"

-DJI

 

"We cool, man"

-Hacker guy

 

---

That is how it SHOULD have happened.

For Sale: Meraki Bundle

 

iPhone Xr 128 GB Product Red - HP Spectre x360 13" (i5 - 8 GB RAM - 256 GB SSD) - HP ZBook 15v G5 15" (i7-8850H - 16 GB RAM - 512 GB SSD - NVIDIA Quadro P600)

 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×