www.404media.co
Open in
urlscan Pro
2a04:4e42:200::775
Public Scan
URL:
https://www.404media.co/rabbit-says-breach-not-caused-by-a-breach-is-fault-of-malicious-employee-hacktivists-journalists/
Submission: On September 28 via api from LU — Scanned from DE
Submission: On September 28 via api from LU — Scanned from DE
Form analysis
2 forms found in the DOM<form class="subscribe-form" data-members-form="subscribe">
<input aria-labelledby="footer-subscribe" data-members-email="" type="email" placeholder="Your email" required="">
<button type="submit" title="Subscribe" aria-label="Subscribe">
<i class="icon icon-arrow-right">
<svg class="icon__svg">
<use xlink:href="https://www.404media.co/assets/icons/feather-sprite.svg?v=efd3df6137#arrow-right"></use>
</svg>
</i> </button>
<div class="message message-success">
<div class="message__header">
<div class="message__type">Success</div>
<div class="message__close js-msg-close"><i class="icon icon-x icon--xs">
<svg class="icon__svg">
<use xlink:href="https://www.404media.co/assets/icons/feather-sprite.svg?v=efd3df6137#x"></use>
</svg>
</i></div>
</div>
<div class="message__content"> Great! Check your inbox and click the link to confirm your subscription </div>
</div>
<p data-members-error=""><!-- error message will appear here --></p>
</form>
<form class="outpost-cta-form" data-outpost-members-form="signup"><input data-members-email="" type="email" placeholder="Your email address" required="">
<button class="outpost-cta-submit" type="submit">Subscribe</button>
<div class="outpost-message-success">Great! Check your inbox and click the link.</div>
<div class="outpost-message-error">Sorry, something went wrong. Please try again.</div>
<input data-members-label="" type="hidden" value="Signup_Auto_CTA_Pop_Up"><input data-members-label="" type="hidden" value="Signup_CTA_l8r7a4d5"><input data-members-label="" type="hidden" value="Generic Article CTA Popup">
</form>
Text Content
Listen to the 404 Media Podcast ACCOUNT * Log in * Subscribe NAVIGATION * Home * About * RSS * Support/FAQ * Podcast * FOIA Forum Archive * Merch * Advertise * Thanks * Privacy FOLLOW US Twitter Bluesky Mastodon Instagram TikTok Facebook RSS Sign in Subscribe * About * RSS * Support/FAQ * Podcast * FOIA Forum Archive * Merch * Advertise * Thanks * Privacy Advertisement • Go ad free Sponsored by ActiveFence [WEBINAR] Designing Your AI Safety Tool Stack Join ActiveFence and Frost & Sullivan on October 1st. Join Us Rabbit RABBIT SAYS BREACH 'NOT CAUSED BY A BREACH,' IS FAULT OF MALICIOUS EMPLOYEE, 'HACKTIVISTS,' JOURNALISTS Jason Koebler · Aug 1, 2024 at 12:23 PM The AI assistant company is blaming everything but its own security practices for a June security breach. Image: Rabbit 404 Media is an independent website whose work is written, reported, and owned by human journalists and whose intended audience is real people, not AI scrapers, bots, or a search algorithm. Become a paid subscriber here for access to all of our articles ad-free and bonus content. AI personal assistant device company Rabbit said this week that a June hack of its systems was an “isolated incident [that] was not caused by a breach of our security systems,” but was caused, it said, by an employee who leaked source code to people outside the company who then compromised several of Rabbit’s systems. Rabbit added that a penetration test of its company after the incident has shown that its security systems are “working as intended, despite statements made by some external critics.” “Last month [in June], an employee (who has since been terminated) leaked API keys to a self-proclaimed ‘hacktivist’ group, which wrote an article claiming they had access to our internal source code and some API keys. We immediately revoked and rotated those API keys and moved additional secrets into AWS Secrets Manager,” Rabbit wrote in a blog post. “It’s important to note that this isolated incident was not caused by a breach of our security systems—those API keys were obtained and shared illegally, and we are in communication with authorities for further investigation.” It is good that Rabbit has fixed what was a shockingly bad security design—as we reported at the time, it is not a good security practice to hard code API keys—which are essentially master login tokens to critical services—directly into source code. But the fact that a Rabbit employee leaked this vulnerable source code, which was then exploited, means the exact opposite of what Rabbit says it means: An insider intentionally or unintentionally leaking info to outside parties who then exploit that info is one of the many ways that a company can be hacked, and insider threats or poor personal security from individual employees is an attack vector that we have seen used time and time again to hack companies. For example, Twitter insiders have allegedly collected user data and spied for Saudi Arabia, a former Cash App employee stole records on more than 8 million customers, and a series of social media employees have been caught snooping on users. Poor employee security more broadly has led to recent breaches via a third party cloud provider called Snowflake at Ticketmaster, AT&T, Bausch Health, Nieman Marcus, and many others. In this case, several critical Rabbit API keys were included in the leaked source code, and were used by researchers at the Rabbit jailbreaking collective Rabbitude to send emails from internal Rabbit email addresses used by the AI device to prove that they had access. The researchers told 404 Media at the time that they did not cause more widespread havoc because they were simply trying to expose the flaw, not cause harm. “While yes we didn't steal user data, so the statement that no ‘customer data being leaked’ is, by its most pedantic definition, true, the compromise of us having access to the key happened and had we been malicious we very much could have accessed things we shouldn't have been able to,” Emily, one of Rabbitude's researchers, told 404 Media in June. “The fact that we were responsible in not doing anything with it in no way negates that they were irresponsible in both how they stored their keys in the codebase in the first place and how they (didn't) react to the knowledge that we had had access to the codebase in the second place.” In response to Rabbit’s most recent statements, Emily said “Rabbit's focus on where the leak came from is a misdirect, and serves to miss the main problem here: those keys quite simply shouldn't have been hardcoded into Rabbit's code base to begin with.” “You can't always limit the actions of staff within the company, but as Rabbit themselves acknowledge: that's why segregation and separation of concerns is so important. Separation of keys from the codebase is a basic practice of modern security, and the fact they failed to do this left them open to a whole host of attacks, including employee leaks, that they would otherwise have been far less exposed to,” she added. “These aren't insignificant keys, and this isn't [a] small indie pet project. This is a multi person team, funded with over $60 million in VC funding, and a further $20 million in sales. They have over 100k customers. This type of blatant mishandling of important keys is absolutely inappropriate.” What happened in June is, by any definition, a security breach. But in its investigation into the breach, Rabbit minimized its own mistakes and the potential impact of a breach like this, and said that it had planned on eventually fixing the issues at some point, so it was not that big of a deal, anyway. “We were already in the process of migrating secrets out of code and into AWS Secrets Manager (a tool for storing secrets, like API keys, securely). We prioritized this process for all keys with access to customer personal information and continued to migrate additional keys over time.” Rabbit wrote in its investigation. “We have reviewed our logs and believe the only abuse of those keys was to send defamatory emails to rabbit employees, a small number of journalists who encourage the work of hacktivists, and other members of the hacktivist group.” Rabbit did not refer to 404 Media by name in its investigation, but to be clear, we do not directly “encourage” anyone to break into companies. A source came to us with evidence about a hack that potentially impact Rabbit's entire user base, we verified it, and wrote the news, which is our job and in the public interest. Emily told 404 Media that Rabbitude does not consider itself to be made up of “hacktivists.” “To my knowledge none of the members of rabbitude have ever self-proclaimed rabbitude to be a ‘hacktavist’ group,” she said. “The first use of that term I saw was in Rabbit's own statement, and it appears to be an attempt to discredit the accurate reportings we have provided … The use of the same tactic to put down established journalists is wildly inappropriate.” In its most recent post, Rabbit also said that it had hired a cybersecurity company called Obscurity Labs to perform a penetration test on its systems after the June incident. Rabbit said that “In contrast to what some have suggested, Obscurity Labs’ findings show that, among other findings, no source code for our AI agent was exposed, no sensitive or valuable information was available to an attacker, and authentication tokens that are collected when you log in do not contain the actual username and password being typed.” Doing a penetration test after a security breach is laudable, and a step toward potentially restoring trust with customers. But a penetration test after a breach does not change the fact that a breach happened, and it does not mean Rabbit’s systems were always secure. The Obscurity Labs pentest is worth reading in full; jailbreakers are already noting points where they feel the report is lacking. For example, Obscurity Labs wrote: “Another common security concern we hear is how Rabbit Inc. is storing our session tokens. Rabbit Inc. isn’t directly storing them. Instead, they are using a dedicated secret storage vault designed for this purpose, the testing of which was out of scope for this penetration test. However, our team conducted testing for the potential interaction between the minion and the secrets vault and discovered no attack path to access session tokens.” The jailbreaking community has seized on this language, noting that nothing is ever “out of scope” for a potential hacker. Obscurity Labs has put an update on the post to note “The phrase ‘out of scope’ refers to testing the 3rd-party secret vault used to store session tokens. While Rabbit Inc. authorized us to perform a penetration test on the systems and services they own, they don't have the authority to authorize the testing of 3rd party systems and/or applications. However, the 3rd-party provider is responsible for conducting their own 3PA which is traditionally supplied to their customers when requested.” We don’t know how good Rabbit’s current security is. But its response to this breach, where it denied there was a breach, then admitted there was a breach but blamed it on an employee, suggested incorrectly that journalists “encourage the work of hacktivists,” then later published a statement saying that this incident was not caused by a breach of its security systems when that is what it obviously was does not inspire confidence. 404 Media is an independent website whose work is written, reported, and owned by human journalists and whose intended audience is real people, not AI scrapers, bots, or a search algorithm. Become a paid subscriber here for access to all of our articles ad-free and bonus content. About the author Jason is a cofounder of 404 Media. He was previously the editor-in-chief of Motherboard. He loves the Freedom of Information Act and surfing. More from Jason Koebler MORE LIKE THIS Behind the Blog: Secretive Service and Being Taken Seriously This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss being taken seriously, the Secret Service being secretive, and doing business while doing journalism. Samantha Cole · Sep 27, 2024 AI Avatars Are Doing Job Interviews Now “This HR AI avatar is a perfect demonstration of late stage capitalism,” Jack Ryan, someone who was interviewed by a tool called Fairgo.ai, told 404 Media. Joseph Cox · Sep 27, 2024 Steam Removes Forced Arbitration Clause, Gamers Can Now Sue Valve "The updated Steam Subscriber Agreement (SSA) now provides that any disputes are to go forward in court instead of arbitration." Jason Koebler · Sep 27, 2024 Advertisement • Go ad free Sponsored by Codeword A creative agency that pitches, pushes, and publishes at the speed of the news cycle. Check out our work Sponsored by DeleteMe Protect against doxxing, stalking, spam and scams. Offering 404 Media readers 20% off consumer plans. Learn More Advertisement • Go ad free • Hide Sponsored by Codeword A non-traditional marketing agency for non-traditional brands. Check out our work UNPARALLELED ACCESS TO HIDDEN WORLDS BOTH ONLINE AND IRL. 404 Media is a new independent media company founded by technology journalists Jason Koebler, Emanuel Maiberg, Samantha Cole, and Joseph Cox. * About * RSS * Support/FAQ * Podcast * FOIA Forum Archive * Merch * Advertise * Thanks * Privacy Twitter Bluesky Mastodon Instagram TikTok Facebook RSS Join the newsletter to get the latest updates. Success Great! Check your inbox and click the link to confirm your subscription © 2024 404 Media. Published with Ghost. JOIN OUR FREE NEWSLETTER 404 Media is an independent, journalist-founded tech news site dedicated to bringing you unparalleled access to hidden worlds both online and IRL. Subscribe to our newsletter for updates on our new investigations, articles, and podcasts. Subscribe Great! Check your inbox and click the link. Sorry, something went wrong. Please try again.