Child-Monitoring Company Responds To Notification Of Security Breach By Publicly Disparaging Researcher Who Reported It
from the got-a-full-clip-of-'thank-yous'-with-your-name-on-it dept
“Thanks for letting us know about this! We’ll get it fixed immediately!” said almost no company ever.
uKnowKids is monitoring software parents can install on their children’s cell phones that allows them to track their child’s location, as well as social media activity, text messages and created media. As such, it collects quite a bit of info.
The information on your child collected includes:
- the online profile/screen names, mobile telephone numbers and email addresses associated with the Linked Accounts and the people communicating with the Linked Accounts and devices and in certain situations, the text of the online or mobile phone SMS or MMS conversations themselves;
- the geographic location and time and date associated with a specific geographic location of your Linked Account mobile device;
- your Linked Accounts’ social networking activity and contacts;
- photographs sent, received or uploaded by your Linked Account;
- the websites visited from your Linked Account mobile device; and
- the applications installed on your Linked Account mobile device.
That’s a lot of data, all related to children. This should be kept locked up tight. Unfortunately, it wasn’t.
Chris Vickery, who now blogs about security over on MacKeeper, alerted this site that a misconfigured MongoDB installation exposed over 6.8 million private child text messages, 1.8 million images (many depicting children, according to Chris), and over 1700 in-depth child profiles.
The data reportedly included full names, email addresses, GPS coordinates, dates of birth, and much more, although Chris tells DataBreaches.net that he did not see payment info or parent details exposed.
Vickery did the right thing and notified uKnowKids. The security hole was closed. But the company wasn’t interested in thanking Vickery for his efforts. Instead, as the Office of Inadequate Security notes, the company decided to notify its customers in a rather unusual fashion. A post at the company’s site completely misconstrues the chain of events.
Here’s the BS headline.
And here’s the BS text:
It is with significant personal regret that I share with you the news that uKnow had a private database repeatedly breached by a hacker using two different IP addresses on February 16, 2016 and February 17, 2016.
The hacker claims to be a
“white-hat” hackera “security researcher” or “white hat hacker” or “ethical hacker” which means he tries to obtain unauthorized access into private systems for the benefit of the “public good”. Although we do not approve of his methods because it unnecessarily puts customer data and intellectual property at risk, we appreciate his proactive, quick notification as it was helpful to our team.
The passive aggression continues later in the post.
The first IP address that obtained unauthorized access to uKnow’s private database was 184.108.40.206. We believe this IP address is associated with Mr. Christopher Vickery in Austin, Texas, but we don’t have confirmation of that fact yet.
Mr. Vickery claims to work at a prominent law firm by day and exploit vulnerable technology systems at night. We do not have any additional background information on Mr. Vickery, but we are doing our best to fully identify Mr. Vickery in order to validate his stated “benign” intentions.
The second IP address (220.127.116.11) that accesed uKnow’s private database in an unauthorized manner is reportedly associated with Mr. Vickery’s full-time employer in Austin, Texas. Again, we don’t yet have confirmation on who owns this IP address or the IP address owner’s official connection with Mr. Vickery, but this is the early information we have been able to determine so far.
The post goes on to insinuate that Vickery has some sort of malignant interest in holding onto uKnow’s code.
The database also included uKnow’s proprietary natural language processing engine technology and data including our proprietary algorithms that power uKnow’s technology.
We have repeatedly requested that Mr. Vickery permanently delete any and all copies of uKnow’s intellectual property including iits proprietary customer data, business data, database schemas and field names, trade secrets, curated data dictionaries and algorithms.
After initial resistance, Mr. Vickery claims to have deleted the downloaded database in its entirety. However, he has reportedly retained an uknown number of screenshot copies of uKnow’s intellectual property, and is so far unwilling to permanently delete this information. In an effort to protect our customers and stakeholders, we contine to request the destruction of any and all copies of uKnow’s database including screenshots which are, in fact, copies of uKnow’s database.
It also suggests Vickery’s possession of screenshots might somehow violate COPPA (a law ensuring the privacy of data generated by children) and has apparently reported him to the FTC.
We have contacted the Federal Trade Commission for guidance and to report the breach. uKnow goes to great effort and expense to fully comply with the FTC’s COPPA regulations, and we beleive we are in full compliance at this time.
uKnow’s demand for Mr. Vickery to delete ALL copies of uKnow’s database was obviously driven by our desire to protect our uKnowKids customers, but also to fully comply with COPPA requirements that we do not knowingly allow any third parties access to child data without first having affirmative, verifiable permission from parents. Mr. Vickery obviously did not and does not have authorization to explore, copy, or control this private child data (or uKnow’s intellectual property), and we expect him to comply with our requests immediately.
Nowhere in this long statement questioning Vickery’s intent is there an apology for the breach. There are no unqualified statements of gratitude. Vickery’s history of finding misconfigured databases is well-documented, as is his standard operating procedure of notifying affected companies immediately and destroying any data he obtained while investigating these leaky databases.
Instead of simply fixing the hole and informing affected customers, uKnow decided to publicly disparage the person who alerted it of the issue. It’s responses like these — along with continual abuse of computer security laws — that make security researchers leery of informing affected parties. Informing someone of a security hole shouldn’t be greeted with antagonism and legal threats. But that’s the default operating mode, one that only ensures security holes discovered in the future are less likely to be reported.