Mass. transit authority flaw disclosure: A student speaks up
Debate rekindled over when flaws should be publicly disclosed
CSO - Zack Anderson was one of three MIT students who caused a stir over the summer when they decided to disclose flaws they discovered in the Massachusetts transit authority's "Charlie Card" fare system.
Anderson, Russell "RJ" Ryan and Alessandro Chiesa planned to show off their findings (PDF) at the Defcon hacker conference in August, prompting the Massachusetts Bay Transportation Authority (MBTA) to seek a temporary gag order until the problems could be fixed.
A U.S. district court judge eventually dissolved the gag order, but the incident rekindled debate over whether flaws should be publicly disclosed before the affected vendor has a chance to fix them.
In this Q&A, Anderson explains the surprise he and his peers felt over the MBTA's response, why he thinks the flaw exposure was necessary and what the lesson is for future researchers.
What was the main motivation for hacking into the MBTA's ticketing system? It started as a class project. We wanted to do a security analysis of an important system which, if the security were compromised, could lead to a number of issues. We settled on subway-fare-collection systems and saw that the system integrator that makes Boston's fare-collection system also makes collection systems around the world. We figured that if we were to find vulnerabilities in the Boston system they might well apply to others.
Were you surprised by how easily you were able to punch through the system? Yeah. What was most surprising, though, was the fact that they already have a lot of infrastructure in place to build a much more secure system, but they don't have the software to leverage that hardware.
Were you and your fellow students surprised by the resistance you ran into with the MBTA after you announced your discovery? Absolutely. We did contact the MBTA and said we wanted to sit down with them, go over what we had found and recommend some ways to fix it so they could go back to the integrator and say 'this is what we'd like done.' We thought that would go well, since we were out to help them. What happened instead was a lot of animosity from the start. The funny thing is that we eventually did sit down with them and everything was fine. The person we sat down with thanked us and was mad at the system integrator for making a flawed system that the MBTA had spent millions of dollars on.
So the pushback came from someone above the person you met with? Yeah, and I think there was also a lack of communication within the organization. We probably should have spoken directly with the person at the top rather than leaving it be with the person they ended up sending out. That might have helped us to avert some issues. Given our relationship with the person we spoke to from the MBTA and the lawsuit that followed a few days later, it's clear that something was lost in translation within the organization.
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel... All Cybercrime and Hacking White Papers | Webcasts