Bitcoin Forum
September 28, 2024, 05:12:59 PM *
News: Latest Bitcoin Core release: 27.1 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Hacker Double-Spends...On A Starbucks Card!  (Read 840 times)
Nxtblg (OP)
Legendary
*
Offline Offline

Activity: 924
Merit: 1000



View Profile WWW
May 25, 2015, 03:36:22 PM
 #1

And here's the reception he got:

Quote from: Dan Goodin
Researcher who exploits bug in Starbucks gift cards gets rebuke, not love

Plenty of poor manners to go around in fraudulent $1.70 purchase.


A security researcher said he found a way to game Starbucks gift cards to generate unlimited amounts of money on them. Both he and the coffee chain are grumbling after he used a fraudulent card to make a purchase, then repaid the amount and reported the vulnerability.

Egor Homakov of the Sakurity security consultancy found a weakness known as a race condition in the section of the Starbucks website responsible for checking balances and transferring money to gift cards. To test if an exploit would work in the real world, the researcher bought three $5 cards. After a fair amount of experimentation, he managed to transfer the $5 balance from card A to card B, not just once as one would expect, but twice. As a result, Homakov now had a total balance of $20, a net—and fraudulent—gain of $5.

The researcher went on to visit a downtown San Francisco Starbucks location to make sure his attack would actually work. He used the two cards to make a $16.70 cent purchase. He went on to deposit an additional $10 from his credit card "to make sure the US justice system will not put us in jail over $1.70," he explained in a blog post. Here's where hurt feelings—and arguably an overreaction on the part of both parties—entered into the story. Homakov wrote:...

http://arstechnica.com/security/2015/05/researcher-who-exploits-bug-in-starbucks-gift-cards-gets-rebuke-not-love/



Looks like someone's in need of a blockchain...and some good manners.








██████████████████████████████████████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████████▄▄▄███████████████████████
███████████████████████████████████████████████████████████████████████▀▀▀████████████████████████
██████████████████████████████████████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████████████████████████████████████████





...INTRODUCING WAVES........
...ULTIMATE ASSET/CUSTOM TOKEN BLOCKCHAIN PLATFORM...






acharias
Full Member
***
Offline Offline

Activity: 209
Merit: 250


View Profile
May 25, 2015, 05:03:50 PM
 #2

And here's the reception he got:

Quote from: Dan Goodin
Researcher who exploits bug in Starbucks gift cards gets rebuke, not love

Plenty of poor manners to go around in fraudulent $1.70 purchase.


A security researcher said he found a way to game Starbucks gift cards to generate unlimited amounts of money on them. Both he and the coffee chain are grumbling after he used a fraudulent card to make a purchase, then repaid the amount and reported the vulnerability.

Egor Homakov of the Sakurity security consultancy found a weakness known as a race condition in the section of the Starbucks website responsible for checking balances and transferring money to gift cards. To test if an exploit would work in the real world, the researcher bought three $5 cards. After a fair amount of experimentation, he managed to transfer the $5 balance from card A to card B, not just once as one would expect, but twice. As a result, Homakov now had a total balance of $20, a net—and fraudulent—gain of $5.

The researcher went on to visit a downtown San Francisco Starbucks location to make sure his attack would actually work. He used the two cards to make a $16.70 cent purchase. He went on to deposit an additional $10 from his credit card "to make sure the US justice system will not put us in jail over $1.70," he explained in a blog post. Here's where hurt feelings—and arguably an overreaction on the part of both parties—entered into the story. Homakov wrote:...

http://arstechnica.com/security/2015/05/researcher-who-exploits-bug-in-starbucks-gift-cards-gets-rebuke-not-love/



Looks like someone's in need of a blockchain...and some good manners.





Very sad for it  Cry
NorrisK
Legendary
*
Offline Offline

Activity: 1946
Merit: 1007



View Profile
May 25, 2015, 05:24:34 PM
 #3

Did he only disclose it to starbucks and give them a chance to fix it before he went public with it? Otherwise I don't think he was being smart..
Zer0Sum
Legendary
*
Offline Offline

Activity: 1588
Merit: 1000


View Profile
May 25, 2015, 05:40:16 PM
 #4


Truly an idiot. Being an egghead does not place you above the law.

He's probably the only person that would bother to "exploit" a Starbucks card for $1.70...
Maybe he should break into his neighbor's house and "penetration test" his pooch.
Spoetnik
Legendary
*
Offline Offline

Activity: 1540
Merit: 1011


FUD Philanthropist™


View Profile
May 25, 2015, 07:46:00 PM
 #5

funny but not surprising.. I bet he cloned the card then used it maybe hmmm ?
not sure how this is related to Altcoins but it's interesting news though Smiley

FUD first & ask questions later™
Mt.Gox Support
VIP
Sr. Member
*
Offline Offline

Activity: 308
Merit: 250



View Profile
May 25, 2015, 09:01:55 PM
 #6

Poor guy... he'll never see the light of day.

Mt.Gox : The Leading International Bitcoin Exchange.
Mt.Gox Merchant Solutions : https://mtgox.com/merchant
tss
Hero Member
*****
Offline Offline

Activity: 742
Merit: 500


View Profile
May 26, 2015, 03:46:42 AM
 #7

Poor guy... he'll never see the light of day.

and yet "you" are still out there...
Nxtblg (OP)
Legendary
*
Offline Offline

Activity: 924
Merit: 1000



View Profile WWW
May 27, 2015, 05:18:29 PM
 #8

funny but not surprising.. I bet he cloned the card then used it maybe hmmm ?
not sure how this is related to Altcoins but it's interesting news though Smiley

I posted it to show a contrast - and to show that centralized system are not immune to double spends, regardless of what we might think.

Here's the contrast: Double-spend a ---coin? You wreck it, send it to the zombie pages of Coinmarketcap, get congratulated in this forum. Double-spend a corporate e-card? Get threated with legal action.

I wonder if that ethical hacker picked up some of his tricks in these parts. Had he done it to an altcoin, in exactly the way that he did it "to" Starbucks, he would have gotten a nice bounty and profuse thanks from the dev(s). He certainly wouldn't have been threatened with legal action!






██████████████████████████████████████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████████▄▄▄███████████████████████
███████████████████████████████████████████████████████████████████████▀▀▀████████████████████████
██████████████████████████████████████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████████████████████████████████████████





...INTRODUCING WAVES........
...ULTIMATE ASSET/CUSTOM TOKEN BLOCKCHAIN PLATFORM...






emelac
Full Member
***
Offline Offline

Activity: 184
Merit: 100



View Profile
May 27, 2015, 08:55:09 PM
 #9

It's normally good practice for security researchers to alert the company with the vulnerable system before going public. If he'd done that their attitude might have been different.
G2M
Sr. Member
****
Offline Offline

Activity: 280
Merit: 250


Activity: 616


View Profile
May 27, 2015, 09:01:27 PM
 #10


Truly an idiot. Being an egghead does not place you above the law.

He's probably the only person that would bother to "exploit" a Starbucks card for $1.70...
Maybe he should break into his neighbor's house and "penetration test" his pooch.


Nah, likely the source of hate came from employees knowingly exploiting this.

Getting the news to place any sort of blame on the guy that called them out would be a way to slide the above thought.

Wind picked up: F4BC1F4BC0A2A1C4

banditryandloot goin2mars kbm keyboard-mash theusualstuff

probably a few more that don't matter for much.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!