recommended reading

Threatwatch

Food Ordering Service Zomato Announces Bug Bounty After Breach

Stolen credentials

After 17 million user accounts for the restaurant ordering service Zomato appeared for sale on the dark web, the company decided to work with the hacker and launch a bug bounty program.

“The hacker has been very cooperative with us,” the Zomato blog said. “He/she wanted us to acknowledge security vulnerabilities in our system and work with the ethical hacker community to plug the gaps. His/her key request was that we run a healthy bug bounty program for security researchers.”

The hacker nabbed 17 million user accounts, including names, usernames, user IDs, email addresses and password hashes with salt, which are difficult to convert into plain text. Zomato confirmed the breach May 18 and said no payment information was compromised. Users who reuse passwords should change them, the company said.

Zomato also announced it will begin a bug bounty program with HackerOne “very soon.” Over the last year, HackerOne has set up bug bounties for several federal agencies, including the Defense Department, individual military services and the General Services Administration.

sector

Food and Beverage; Web Services

reported

May 18, 2017

reported by

International Business Times

number affected

17 million

location of breach

Unknown

perpetrators

Individual hacker

location of perpetrators

Unknown

date breach occurred

Unknown

date breach detected

2017/05/18

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.