DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Here’s a tip for some Crime Stoppers in Canada: you’ve been hacked (UPDATED)

Posted on April 12, 2015 by Dissent

April 14: See update and possible correction at the bottom of this post concerning the storage and encryption of tips.

TeaMp0isoN claims that one of the sites they recently “audited” was the web site of Waterloo Crime Stoppers. In a zine about what they describe as a 0day SQLi attack, TeaMp0isoN writes that they found an unprotected ftp directory, the intranet can be accessed simply by logging in, credentials are stored unencrypted, and all of the members have privileges to upload to the ftp_uploads directory. Login credentials (usernames/clear-text passwords) were dumped in the zine.

To explain the significance of what they found, TeaMp0isoN writes:

Now you may be wondering, what is so insecure about this? well good question. If you go to the drop box tab you’ll notice that there is no restriction of what type of file you can upload and anything that you do upload will be on the public FTP Directory. You can access this directory by navigating to http://waterloocrimestoppers.com/ftp_uploads/ (don’t worry it’s public). Now let’s assume we have friends outside our little circle (we don’t) and let’s pretend our friend is a black hat, we will call him Niles

What followed was some examples of how to exploit the above.

The Crime Stoppers site in question was designed by Pixweaver. Further investigation by TeaMp0isoN revealed that other sites designed by Pixweaver also had the same vulnerability, and TeaMp0isoN similarly attacked the Peel Crime Stoppers and Ontario Crime Stoppers sites. As with waterloocrimestoppers.ca, they dumped some of the login credentials and described what they found. The zine has a number of links to other pastes where more data dumps from these three Crime Stopper chapters can be found.

But from my perspective as a privacy advocate, perhaps the most troubling revelations in the zine involve the inclusion of citizen-submitted “anonymous tips.”

As this site did when reporting on the breach involving the NYC Public Advocate, because sensitive information has been dumped, DataBreaches.net is not linking to any of the pastes, but I’m redacting one of the entries to provide readers with a sense of how sensitive some of the material is:

Tuesday, November 26 2013

Name [Redacted by DataBreaches.net] Address [Redacted by DataBreaches.net] Province Postal Code Phone Email [Redacted by DataBreaches.net]

Comments: I dont know where to send this information. I didnt use my real name. But used my real email adress. I have information on a known drug dealer in bowmanville ontario. his name is [First and Last Names Redacted by DataBreaches.net] his girlfriend is [First and Last Names Redacted by DataBreaches.net].
I dont know there adress but a friend of a friend knows them and thwy have guns and drugs in there house mariguana . These people need to be taken off the street . I have attached pictures of [Name Redacted by DataBreaches.net]. He threatened a feiend of a friend to take her life if she ever went to the police. [Name Redacted by DataBreaches.net]’s parents number is [Phone Number Redacted by DataBreaches.net] .
please help .
they are apparently moving to toronto very soon
they have crazy amounts of drugs and money in there house

Can you imagine discovering that your “anonymous” tip has now been publicly revealed and that if the drug dealer googles himself, he’ll see that you reported him?

And while we’re on the topic of “anonymous” tips that may not be anonymous any more, I’d note that although the Crime Stoppers web sites assure tipsters that information submitted through their secure site will be encrypted and forwarded to the head office, it seems that any encryption is only during transmission and does not necessarily apply to storage of the tips.

So… would you feel comfortable submitting a tip if you knew that your tip was being stored in clear text? How many tipsters read the whole privacy policy?

After discovering that this hack had first been announced on Twitter on April 7, DataBreaches.net e-mailed all three compromised Crime Stoppers chapters last night to alert them that they had been hacked in case they did not know already. They were provided with a link to the zine paste and asked to acknowledge the breach alert. None of the three individuals to whom the email alert was sent has responded as of the time of this publication.

Attempts to call the Crime Stoppers number for Canada resulted in a “Due to technical difficulties, your call cannot go through” message.  How ironic is it that this site cannot manage to submit a tip to Crime Stoppers and be sure that they got it?

Earlier today, DataBreaches.net sent an email to the Ontario Police to suggest they call Crime Stoppers to alert them.

Perhaps none of them have responded because they know already. Then again, perhaps they don’t know.

Pixweaver was also sent a courtesy notification with more detailed information about the method of the attack and how to test client sites for the vulnerability. Both those pieces of information were provided by TeaMp0isoN in their zine.

This post will be updated if or when anyone ever responds.

Updated April 14, 2015: Thanks to the help of a Canadian reader who reached someone in IT in another Crime Stoppers chapter who then called the affected chapter(s), and thanks to OpenCERT Canada who also reached out to the affected chapters after I contacted them and told them of the difficulty in getting a response to the hack, the Ontario Chapter of Crime Stoppers responded to my original breach alert email to them. This afternoon, Dave Foster, President of Ontario Crime Stoppers wrote:

I would like to acknowledge the breach of the above noted web sites as you have indicated. Although these sites are important to the Crime Stopper
program, they serve only as posting site for media features and associated
events. The integrity of any tips submitted are completely protected as
they are hosted on a separate encrypted and secured database independent of these sites. We will however make every effort to improve the security of
these posting sites to avoid this happening in the future. We have engaged
security specialists to assist us with this issue.

Thank you,

Note his claim that the integrity of any tips are completely protected and encrypted on a separate server. That seems to contradict the fact that several tips were in the hacked database the hackers dumped online. So I asked Mr. Foster how that happened. Is it the case that some people used another (and non-secure) form on the web site to submit a tip instead of using the Public Engine System form which encrypts the tip? That might explain why there were so few tips in the dumped data, but it’s purely speculative.

DataBreaches.net has received no response to that follow-up inquiry by the time of this publication.

And since the data dump is still available online where anyone can acquire it, I wonder whether they will notify those whose personal information was exposed.

I’ll let someone else ask them that question.


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Hungarian police arrest suspect in cyberattacks on independent media
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
Category: HackMiscellaneousNon-U.S.Of Note

Post navigation

← NY: Oceanside gym owner gets prison time for using members’ credit card info
FireEye claims discovery of 10-year hack campaign by China →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • Cyberattacks Paralyze Major Russian Restaurant Chains
  • France Travail: At least 340,000 job seekers victims of new hack
  • Legal Silence and Chilling Effects: Injunctions Against the Press in Cybersecurity
  • #StopRansomware: Interlock
  • Suspected XSS Forum Admin Arrested in Ukraine
  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Hungarian police arrest suspect in cyberattacks on independent media

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling
  • Meta investors, Zuckerberg reach settlement to end $8 billion trial over Facebook privacy violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.