Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/14/2019
12:30 PM
50%
50%

GitHub Named in Capital One Breach Lawsuit

A new lawsuit says that GitHub bears responsibility for the Capital One breach because it actively encourages hacking and stored stolen data.

The fallout from the Capital One data breach continues, with a recent class-action lawsuit naming the financial giant — and GitHub, the online data repository that has become central to many companies' agile and devops coding efforts.

The lawsuit, filed in US District Court for the Northern District of California, claims that GitHub (now owned by Microsoft) "actively encourages" hackers,  and that this active encouragement means that it has a higher responsibility than most repositories to scan uploaded files for dangerous or illicit data.

According to the lawsuit, files containing information on the methods used in the breach were uploaded to the site in April, but not removed until July, when GitHub was alerted by Capital One.

In a statement to Dark Reading, GitHub said, "GitHub promptly investigates content, once it's reported to us, and removes anything that violates our Terms of Service. The file posted on GitHub in this incident did not contain any Social Security numbers, bank account information, or any other reportedly stolen personal information. We received a request from Capital One to remove content containing information about the methods used to steal the data, which we took down promptly after receiving their request."

The suit is depending on a standard of "morally culpable," as opposed to "legally culpable," which is a commonly used legal standard. 

For more, read here and here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
tdsan
50%
50%
tdsan,
User Rank: Ninja
8/14/2019 | 3:56:57 PM
Wow, then they need to involve Google, MS, Apple and AWS as well

The lawsuit, filed in US District Court for the Northern District of California, claims that GitHub (now owned by Microsoft) "actively encourages" hackers,  and that this active encouragement means that it has a higher responsibility than most repositories to scan uploaded files for dangerous or illicit data.

This lawsuit is almost laughable, anything that is deemed positive can be turned negative. Github is a repository for developers to come up with code and sharing that code with other organizations to address problems in the wild, I think this is more of a company trying to divert blame as opposed to facing the facts and being accountable for their actions. This says alot about CapitalOne - the organization - who has been blindsided by someone whom they dealt with in the recent past; but it also sheds light on their lack of oversight and attention to detail (this says a lot about the organization as a whole).

I am looking forward to hearing more about the lawsuit and interested in hearing what the judge says in the hearing, this should be interesting.

T

 
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
US Counterintelligence Director & Fmr. Europol Leader Talk Election Security
Kelly Sheridan, Staff Editor, Dark Reading,  10/16/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26895
PUBLISHED: 2020-10-21
Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver,...
CVE-2020-26896
PUBLISHED: 2020-10-21
Prior to 0.11.0-beta, LND (Lightning Network Daemon) had a vulnerability in its invoice database. While claiming on-chain a received HTLC output, it didn't verify that the corresponding outgoing off-chain HTLC was already settled before releasing the preimage. In the case of a hash-and-amount collis...
CVE-2020-5790
PUBLISHED: 2020-10-20
Cross-site request forgery in Nagios XI 5.7.3 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.
CVE-2020-5791
PUBLISHED: 2020-10-20
Improper neutralization of special elements used in an OS command in Nagios XI 5.7.3 allows a remote, authenticated admin user to execute operating system commands with the privileges of the apache user.
CVE-2020-5792
PUBLISHED: 2020-10-20
Improper neutralization of argument delimiters in a command in Nagios XI 5.7.3 allows a remote, authenticated admin user to write to arbitrary files and ultimately execute code with the privileges of the apache user.