DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

“Computer hacker steals sensitive information from 20,000 Christchurch hot pools customers” — NO. That’s NOT what happened.

Posted on September 7, 2022 by Dissent

There is a highly misleading news report on Stuff today. Permit DataBreaches to set the record straight by quoting some statements from the news story and responding.

Liz McDonald reports:

Personal information about as many as 20,000 members of the public has been stolen in a data breach at Christchurch City Council’s He Puna Taimoana hot pools.

It wasn’t “stolen.” It was found exposed and leaking.

“We were notified of the breach by a third party who had been contacted by an individual claiming to have accessed and downloaded certain files stored on the He Puna Taimoana cloud server,” Cox said in the email.

This is partially true. DataBreaches is the third party who contacted them. DataBreaches contacted He Puna Taimoana at the researcher’s request. The researcher’s attempt to call He Puna Taomoana to alert them to their data leak had not reached a live person, and they wanted to ensure the alert was received. As many whitehat researchers have done, and as they have also done before, they turned to DataBreaches to request assistance in making responsible disclosure.

“At this stage, we have reason to believe that the third party who accessed and illegally downloaded files stored on the He Puna Taimoana cloud server is a ‘white hat hacker,’ being an individual who exploits computer systems or networks to identify vulnerabilities in order to encourage improvement or enhancement to the security of those systems or networks.

If there is no password protection on a database or “keep out” banner of any kind, the data are public and can be freely downloaded by anyone with internet access anywhere in the world. This researcher wasn’t “hacking.” He was researching and found exposed data.

At this stage, we have no reason to believe the information has been further disclosed by the third-party actor other than to the third party who has informed us of the breach.

The whitehat researcher destroyed any data that had been downloaded after the entity acknowledged notification and secured the blob. Sean Rainey, Manager Official Information and Privacy Officer, Official Information Team, Christchurch City Council, was informed of this in follow-up correspondence in August.

The privacy commissioner has been notified, he said.

Yes, the privacy commissioner’s office was notified — by DataBreaches — after He Puna Taimoana hot pools did not respond to this site’s first email attempt to alert them to the exposed data.

Here is the text of the first email sent to them, with URLs now redacted:

Hello.

I’m a journalist in the U.S. who reports on data breaches and data leaks.

A researcher contacted me after he tried to call you and got a message on your phone saying you couldn’t take the call.

The researcher found that you are exposing customer data and images because you have a storage azure blob that is not secured properly.
You should contact your IT professional immediately and give them the following information:

The unsecured azure blob is at: <url removed from this post>

Here are just a few files that the researcher showed me as proof of exposure: <urls removed from this post>

The researcher says you had more than 20,000 exposed files in that blob when they checked it yesterday and there were even more today.

I would encourage you to immediately go secure that blob so that you protect customer personal information.

Regards,

[Sigblock]

The council was also informed that links to the exposed data had also appeared on GrayHatWarfare, and that the council should contact them to see if they had any relevant logs and if they would remove any links.

Does this sound like a researcher who “stole” data or someone the public needs to be concerned about it?

DataBreaches had no intention of reporting on this leak but felt compelled to defend the unnamed researcher’s honor which has been impugned by any suggestion that they hacked or stole data. The researcher went out of their way to notify the council. They sought no reward or bounty or even thanks. They were just engaging in ethical research and disclosure. They don’t deserve to be accused of stealing data.

The council should have disclosed this incident by saying, “We screwed up and didn’t lock down all the files we had with your personal information. We’re sorry for that and embarrassed. Thankfully, a kind and ethical researcher discovered our mistake, and when they couldn’t reach us to alert us, they asked a journalist they trusted to make the notification. The researcher and their employer destroyed all the data they had downloaded.”

That would certainly be a different news story than the one Stuff was given, but it would be more accurate.

Category: ExposureGovernment SectorNon-U.S.

Post navigation

← PA: Ringgold student data leak revealed
BianLian hits a community services organization for adults with serious disabilities →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.