John Deere security flaws exposed sensitive customer information: Difference between revisions
mNo edit summary |
m Minor grammar changes Tags: Mobile edit Mobile web edit Visual edit |
||
Line 3: | Line 3: | ||
Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions<ref>https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/</ref> for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.<ref name=":1">[[Louis Rossmann - Video Directory]]: [https://www.youtube.com/watch?v=hqablgjQ02g John Deere security flaw exposed address of every customer & more!]</ref> | Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions<ref>https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/</ref> for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.<ref name=":1">[[Louis Rossmann - Video Directory]]: [https://www.youtube.com/watch?v=hqablgjQ02g John Deere security flaw exposed address of every customer & more!]</ref> | ||
In the immediate aftermath of the incident, John Deere posted a spate job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.<ref>https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/</ref> Also | In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.<ref>https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/</ref> Also, soon after the incident, John Deere wrote, "This week's forecast: one to three inches of nonsense", which can be interpreted as denying that the recent security flaws were severe.<ref name=":2">[[Louis Rossmann - Video Directory]]: [https://www.youtube.com/watch?v=rB_SleNKBus John Deere instigates hackers, gets hacked again]</ref> John Deere addressed it by stating "We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers' sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article."<ref>https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world</ref> However, their claims seem to be not true, because the researcher claims they could access the data.<ref name=":0" /><ref name=":1" /><ref name=":2" /> | ||
Quite a bit later in 2024, John Deere has also partnered up with HackerOne<ref>https://www.hackerone.com/</ref> to enhance collaborative relationships with security researchers.<ref>https://www.deere.com/en/our-company/digital-security/hackerone-program/</ref> | Quite a bit later in 2024, John Deere has also partnered up with HackerOne<ref>https://www.hackerone.com/</ref> to enhance collaborative relationships with security researchers.<ref>https://www.deere.com/en/our-company/digital-security/hackerone-program/</ref> |