[Chapter-delegates] Internet Society Data Leaked
Winthrop Yu
w.yu at gmx.net
Thu Feb 17 00:33:04 PST 2022
On 17 Feb 2022 10:13 am, Joly MacFie wrote:
> While I concur with concerns about the transparency, I will just say
> that there is a difference between a breach and a detected vulnerability, so
> let's not get ahead of ourselves.
>
If the vulnerability were unexploited that distinction may hold. If, as reported
by 3rd parties, there is ISOC member data out there, then clearly there was a
breach. In any case, i believe notification requirements apply, here in our
jurisdiction if not in yours.
> What does seem odd is the length of time between the discovery and the reaction.
>
ISOC HQ told us to expect more information (clarification, details, etc.), we
waited patiently as is proper. Should chapters have done otherwise -- speak now
or forever hold your peace? :)
WYn
> On Wed, Feb 16, 2022 at 7:35 PM Winthrop Yu via Chapter-delegates
> <chapter-delegates at elists.isoc.org> wrote:
>
> Olivier, we don't need press releases or "updates".
>
> At the very least, we need:
>
> a) a clear, comprehensive yet concise official statement from ISOC HQ
> regarding the breach.
>
> b) including whether ISOC HQ has notified *all* its global members (which
> would include the individual members of chapters).
>
> That above is a bare minimum. Then we will have to check that against any
> obligations the chapter itself may have under local law. And we may
> subsequently need further clarification / statements from ISOC HQ.
>
> WYn
>
>
> On 17 Feb 2022 1:45 am, Olivier MJ Crépin-Leblond via Chapter-delegates wrote:
>> Am I the only one in Chapter Delegates mailing list who received and read
>> the email from Christine Saegesser explaining the problem with MemberNova
>> and referring to:
>>
>> "As we noted in our prior email, after we learned of the issue, we
>> launched an investigation. The investigation is continuing, and we will
>> provide more details when we have more information to share. Going
>> forward, updates will be posted at updates.internetsociety.org
>> <http://updates.internetsociety.org>, and we encourage you to check
>> there for additional information. The membership password to access
>> this website is ISOC-AMS-Updates (case sensitive)."
>>
>> Or is the problem that there does not appear to have been any updates
>> since 21st January 2021?
>>
>> Kindest regards,
>>
>> Olivier
>>
>>
>> On 16/02/2022 14:54, Veni Markovski via Chapter-delegates wrote:
>>> +1 to the request for more clarity; our members need to be informed, and
>>> I don't want to share on social media a link to an article on some
>>> website. There should be something at isoc.org <http://isoc.org>, and in
>>> the news section there's only one press release from 2022 - on February 4.
>>>
>>> Also, it's not a good thing to find out from a publication about some of
>>> the details (I assume not all of them)...
>>>
>>> v/
>>>
>>> On 2/16/22 04:19, Roland Turner via Chapter-delegates wrote:
>>>> Andrew,
>>>>
>>>> Could we have a little more clarity on this please? Chapter members in
>>>> multiple jurisdictions may have notification obligations arising from this.
>>>>
>>>>
>>>> The Jan 21 <https://updates.internetsociety.org/> update states:
>>>>> Fortunately, we have still not seen any instances of malicious access
>>>>> to member data as a result of this issue.
>>>>
>>>> This appears a little unclear to me on two important fronts:
>>>>
>>>> *"have not seen"*
>>>>
>>>> An adversarial read of this is the rather horrifying idea that access
>>>> logging was not turned on, so you (and MemberNet) haven't the faintest
>>>> idea whether there were any unauthorised accesses, which would
>>>> certainly allow you say that you hadn't seen any unauthorised accesses
>>>> but wouldn't mean that there weren't any, even at a reasonable level of
>>>> confidence. Hopefully this is not the case!
>>>>
>>>> *"malicious access"*
>>>>
>>>> The relevant question is not whether any accesses could be described as
>>>> malicious, but simply whether they were unauthorised. An adversarial
>>>> read of this is that there were unauthorised accesses, but because you
>>>> don't have much information about the unauthorised accessers you not in
>>>> a position to say that they were acting maliciously, however this would
>>>> tell us nothing about whether there had been unauthorised access.
>>>> Again, hopefully this is not the case!
>>>>
>>>>
>>>> To address both concerns, are you able to confirm that:
>>>>
>>>> 1. access logging was turned on and the logs were successfully secured;
>>>> 2. the logs appear to be complete (in this case "appear to" is fine;
>>>> the requirement is simply that there are no unexplained gaps); and
>>>> 3. all logged accesses are authorised (i.e. because they were made by
>>>> the application server, not random external IP addresses)
>>>>
>>>> ?
>>>>
>>>>
>>>> - Roland
>>>>
>>>>
>>>> --------------------------------------------------------------------------------
>>>>
>>>> On 16/2/22 15:41, Hank Nussbacher via Chapter-delegates wrote:
>>>>> In case you missed it:
>>>>>
>>>>> https://www.infosecurity-magazine.com/news/internet-society-data-leaked/
>>>>>
>>>>>
>>>>> Regards,
>>>>>
>>>>> Hank
>>>>>
>>>>> _______________________________________________
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://elists.isoc.org/mailman/private/chapter-delegates/attachments/20220217/d364679f/attachment.htm>
More information about the Chapter-delegates
mailing list