Xfinity waited 13 days to patch critical Citrix Bleed 0-day. Now it’s paying the price::Data for almost 36 million customers now in the hands of unknown hackers.

  • ghostpony@infosec.pub
    link
    fedilink
    English
    arrow-up
    83
    ·
    edit-2
    1 year ago

    Hate these stupid fucked up headlines. What “price” are they paying?! They don’t even know how many of their customers were actually affected. They have no idea what happened as they’re incompetent and apathetic about the data they’re so zealously collecting. So what’s this price?

    Corporations have no shame or morals, and as history indicates, there will be zero repercussions for them, and therefore zero consequences.

    • virku@lemmy.world
      link
      fedilink
      English
      arrow-up
      34
      arrow-down
      1
      ·
      1 year ago

      In Europe this would be a hard to explain breach of GDPR. Which could result in some hefty fines. Especially if it is a vulnerability they knew about but chose to wait.

        • kurushimi@lemmyonline.com
          link
          fedilink
          English
          arrow-up
          14
          ·
          edit-2
          1 year ago

          Sure, but given that the poster said “would” the point is to bring additional awareness to how consumer-backing laws with actual teeth can bring about positive change, and perhaps to motivate citizens to support similar legislation and legislators who would write it.

      • plz1@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        3
        ·
        1 year ago

        In the real world, fines are a cost carried to the customer. So even with GDPR, the customer is still the loser in the situation.

          • plz1@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            1 year ago

            So fines come with a requirement that a company can’t raise prices to recoup them?

            • wahming@monyet.cc
              link
              fedilink
              English
              arrow-up
              2
              ·
              1 year ago

              Do you think companies aren’t already pricing their products at the maximum they think the market can bear?

                • wahming@monyet.cc
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  1 year ago

                  Products are already priced at the point that will make them the most profits. That point doesn’t magically change when fines happen.

                • drdiddlybadger@pawb.social
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  1 year ago

                  This thinking was brought up to convince people not to hold companies accountable.

                  Make it cost. And if the company refuses to correct the behavior they shouldn’t be allowed to operate. If there is no cost for bad behavior then said behavior becomes how you do business.

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    48
    arrow-down
    1
    ·
    edit-2
    1 year ago

    Their a last Mile Telco Monopoly. They’re not paying the price for anything. Nobody does business with Comcast who has a choice. All of their customers are captured.

    • NOT_RICK@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 year ago

      Yup, I’m one of those people. I call Verizon every six months asking if they service my location yet.

  • ipkpjersi@lemmy.ml
    link
    fedilink
    English
    arrow-up
    34
    ·
    1 year ago

    It’s not paying the price lol they won’t be held accountable and they know that, it’s the customers paying the price. These headlines are so stupid nothing but ragebait garbage.

  • MummifiedClient5000@feddit.dk
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    1
    ·
    1 year ago

    The representative declined to say why company admins didn’t patch sooner.

    In the corporate world, staying quiet and doing nothing is often safer for your ass than doing something that could cause downtime (such as emergency patching).

  • Kyrgizion@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    1 year ago

    Sooo glad my employer moved away from Citrix in favor of Parallels years ago. Dealing with the Citrix client was a nightmare of epic proportions. Imagine the shitstorm with our clients if something like this were to happen to us.

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    7
    ·
    1 year ago

    This is the best summary I could come up with:


    Comcast waited 13 days to patch its network against a high-severity vulnerability, a lapse that allowed hackers to make off with password data and other sensitive information belonging to 36 million Xfinity customers.

    Exploits disclose session tokens, which the hardware assigns to devices that have already successfully provided login credentials.

    The name Citrix Bleed is an allusion to Heartbleed, a different critical information disclosure zero-day that turned the Internet on its head in 2014.

    That vulnerability, which resided in the OpenSSL code library, came under mass exploitation and allowed the pilfering of passwords, encryption keys, banking credentials, and all kinds of other sensitive information.

    A sweep of the most active ransomware sites didn’t turn up any claims of responsibility for the hack of the Comcast network.

    Comcast is requiring Xfinity customers to reset their passwords to protect against the possibility that attackers can crack the stolen hashes.


    The original article contains 436 words, the summary contains 147 words. Saved 66%. I’m a bot and I’m open source!

  • LemmyIsFantastic@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    1 year ago

    Oh fuck THIRTEEN WHOLE DAYS? That really ain’t that bad. 30 days for a you’d from CVE is quicker than industry standard.