DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Desperate to get through to executives, some cybersecurity vendors are resorting to lies and blackmail

Posted on March 18, 2019 by Dissent

This is one of those articles that we all need to read and think about. Kate Fazzini reports:

The cybersecurity vendor marketplace is growing so crowded that some companies have been resorting to extreme tactics to get security executives on the phone to pitch their products, including lying about security emergencies and threatening to expose insignificant breaches to the media.

[…]

For instance, all four executives said vendors tried to draw their attention to potentially exposed data on Amazon and Microsoft Azure cloud servers. None of this data included any current material information.

[…]

Two of the executives also said vendors used questionable tactics just to get through to their phone. Vendors have called in to report “emergency” incidents, then once they got past the company’s gatekeepers, turned the “alert” into a sales pitch. They have also lied to administrative staff about their reasons for calling, characterizing their call as a matter of grave security importance, only to present a sales pitch once they’d worked their way up to the right executive.

Read more on CNBC.

As someone who attempts to make notifications every week and who is never calling with a sales pitch because I don’t sell anything, what these unethical vendors are doing concerns me greatly as it makes it harder for companies to trust that callers calling to notify them have good intentions.

But how do we deal with this..? Ideas, folks?


Related:

  • Paying cyberattackers is wrong, right? Should Taos County's incident be an exception?
  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine
  • Legal Silence and Chilling Effects: Injunctions Against the Press in Cybersecurity
  • Suspected XSS Forum Admin Arrested in Ukraine
  • Two more entities have folded after ransomware attacks
Category: Commentaries and AnalysesOf Note

Post navigation

← Here’s What It’s Like to Accidentally Expose the Data of 230M People
Boxes of documents including possible personal tax information showed up at a Marshall Co. recycling center, investigation underway →

2 thoughts on “Desperate to get through to executives, some cybersecurity vendors are resorting to lies and blackmail”

  1. Korinne Jackman says:
    March 19, 2019 at 9:41 am

    I’m using this article as a basis for an ethics paper and found your query while doing background research. When I read the article, the first 3 things that came to mind are:

    1. what are the statutory requirements for each organization to report a breach in the regions in which they do business?

    2. anyone using those blackmail-like tactics (do this or I’ll turn the media against you) should be reported to the FBI. Period.

    3. wouldn’t a better way to head this off be for the PR departments of these companies, in conjunction with the IT departments, to put out a statement that a vulnerability was detected and corrected, and that this is part of an ongoing effort to monitor their systems and protect all data, whether it was confidential or not? It could also be included that a cybersecurity vendor (unnamed) tried to use that information as leverage to secure a meeting and was reported to the FBI. It seems to me that this would be a much better way of handling the situation and discouraging this type of behavior. Get ahead of the news, own the narrative, and then put the warning out to other sleezy organizations that you can’t be bullied into a meeting.

    The industry must be trusted in order for us to be able to influence and educate the organizations we are attempting to help. There are crooks and liars in every business. The goal is to pull the rug out from under them so they have no secure footing. Maybe the best way to make the first connection is to not attempt to get to the head. If the goal is to just warn of a vulnerability and leave it at that, then maybe contacting the department directly responsible and giving them the information is enough. We can’t put out all the fires in the world. We can only let them know where the fire is. The rest is up to them.

  2. Dissent says:
    March 19, 2019 at 9:51 am

    Part of the problem is that some vendors will claim that they made no such extortion or high-pressured demand and the entity is just trying to deflect the spotlight from their failure to the vendor. And in some cases, they’ll be right.

    There are plenty of legit whitehats/researchers who get met with hostility and accusations when they really are just trying to notify an entity. Hell, I’ve been accused a bunch of times of conspiring with hackers or trying to extort just because I try to alert entities that they’ve been hacked and I’ve been sent data, etc…

    I do like the idea of naming and shaming sleazy vendors or “researchers,” even if the FBI isn’t contacted, but that, too, is still risky.

    As to your other suggestion: I never ask for the CEO of a firm, but because I get a lot of run-around and extension-chasing, I do often ask for the CISO or Chief Privacy Officer — desperately trying to get someone who will appreciate the seriousness of what I’m trying to alert them to.

    Just some food for thought for you from the trenches of notification.

    I hope you’ll share your ethics paper when it’s done. I’d love ot read it!

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hackers post stolen St. Paul data online as efforts to reset city employee passwords surge forward
  • Justice Department Announces Coordinated Disruption Actions Against BlackSuit (Royal) Ransomware Operations
  • NL: Hackers breach cancer screening data of almost 500,000 women
  • Violent Crypto Crimes Surge in 2025 Amid Massive Data Leaks
  • Why Ransomware Attacks Are Decreasing in 2025
  • KR: Yes24, the largest Internet bookstore in Korea, suffered its second ransomware attack in two months
  • Korea wins world’s top hacking contest for 4th consecutive year
  • 7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
  • Connex Credit Union notifies 172,000 members of hacking incident
  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks (CORRECTED)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Navigating Privacy Gaps and New Legal Requirements for Companies Processing Genetic Data
  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.