Readit News logoReadit News
thrtythreeforty · 3 years ago
Headline buries the real lede a bit in my opinion; the author has gotten a snapshot of the no-fly list from 2019. Presumably the system under attack processes more up-to-date versions of it regularly.

Corresponding news story: https://www.dailydot.com/debug/no-fly-list-us-tsa-unprotecte...

ryandrake · 3 years ago
I wonder which no-fly list it is. Is it a government no-fly list that would contain suspected international criminals and terrorists, or an airline's private no-fly list that would contain people who cause a ruckus on flights, drunks, anti-maskers, and so on. Maybe one shared between airlines? I would imagine that second list has grown substantially since 2020 given all the craziness airlines have had to deal with since then.
Rhinozz · 3 years ago
The Daily Dot article specifies that it's the United States' (the Terrorist Screening Center's).
asn0 · 3 years ago
> the nofly csv is almost 80mb in size and contains over 1.56 million rows of data. this HAS to be the real deal (we later get confirmation that it is indeed a copy of the nofly list from 2019).
stolen_biscuit · 3 years ago
read the article before speculating? it answers that question
karlkatzke · 3 years ago
Also seems to have gotten a crew list from the CommutAir’s CASS or possibly from other airlines as part of the shared deadheading crew list, which includes crew addresses and employment information.

There were also prod AWS credentials in the files exposed in Jenkins.

racnid · 3 years ago
Basically any air charter service (no matter how small) will have access to the no fly list. It's honestly surprising that it's not up to date online within minutes.
DocTomoe · 3 years ago
If I was the US government, I would add some fake but legitimate-looking IDs in such lists, different ones for every airline I send the list to, so I can identify who leaked the list ex post facto, and come down with God's Wrath on any airline that leaked theirs.

But then, I am not a Bond-esque criminal organization bent for world domination.

shadowgovt · 3 years ago
And as always... Never use production data in the test pipeline.

At the very least, I don't think the company was operating like every random developer should have full-access to the no-fly list, which is what they de-facto gave them when they dumped an old copy into the test pipeline.

birdyrooster · 3 years ago
You can follow their steps to find this data it’s not that hard. Then do whatever you want with it. Shodan isn’t some mythical tool.
NieDzejkob · 3 years ago
They say the access got closed before publication.
INTPenis · 3 years ago
Hah shodan, the title made me think this was about starting a dummy airline and getting the nofly list from the government.
KyeRussell · 3 years ago
Same. Sorely disappointed.
tastysandwich · 3 years ago
As a software engineer even I sometimes can't help romanticising hacking in my imagination. But so many times it turns out to be just like some company left the front gate wide open and the "hacker" walked in and took a look around.

Eg when an airline had a public API where you could get someone's passport number and details just from their boarding pass https://mango.pdf.zone/finding-former-australian-prime-minis...

chaboud · 3 years ago
Private keys checked into code?

Password salts that were identical for the entire set?

"Random" initialization vectors always created from the same prng seed?

Without coders like these, hackers would really have to work for it.

(And, yes, I've encountered all of these in my career.)

Deleted Comment

Maursault · 3 years ago
> Eg when an airline had a public API where you could get someone's passport number and details just from their boarding pass https://mango.pdf.zone/finding-former-australian-prime-minis...

Underneath all the garbage, good story. But Holy Hell, why do bloggers write so terribly and self-indulgently? That's a half hour of my life I'll never get back that shouldn't have been more than 10 minutes. Don't they have Ritalin in Australia? They really should.

vgb2k18 · 3 years ago
Aussie, can confirm. They have Vyvanse, Dexamfetamine, Adderal and Ritalin. I didn't mind reading this one though, was a novel change to see sentences starting without capital letters.
hackmiester · 3 years ago
You could just say you don't prefer the writing style.
c7DJTLrn · 3 years ago
Check this out if you haven't heard of it: https://en.wikipedia.org/wiki/Stuxnet
giza182 · 3 years ago
Ha! Loved the linked story. Thanks for posting.
japanman425 · 3 years ago
Less hacking, more like exploring.
gggggg5 · 3 years ago
Since when are passport numbers supposed to be sensitive information? This isn't something you could use for identity fraud in any normal circumstances.
sverhagen · 3 years ago
Don't all sorts of person-related details come in handy to stage a social engineering hack? Maybe a caller could demonstrate legitimacy by coughing up a passport number. At this point, it may impress me more than someone having found my SSN (_love you for that, Equifax_). Yet, SSN is still by many institutions considered something that should be stored in the vault.
vunicipna · 3 years ago
Interesting hack, but this seems quite the brazen confession to a fair number of computer crimes. If I were the author, I'd be worried about getting arrested and potentially extradited for this. Especially as he deliberately downloaded a load of confidential information after gaining access, and then shared it around. He'd be looking at years in prison for this, in the US.
lom · 3 years ago
The author is already searched by US authorities for other hacks. See their wiki page here: https://en.wikipedia.org/wiki/Maia_arson_crimew#Indictment
helsinki · 3 years ago
She’s already potentially facing US extradition from Switzerland for unrelated computers crimes. No idea why she would publicize this exploit.
derelicta · 3 years ago
Switzerland's federal constitution prohibits extradition of swiss citizens to foreign powers. Now technically, this one amendment can be overriden by a mere act of Parliement, so unless there is a special act I'm not aware of, they are safe.
IceWreck · 3 years ago
She's Swiss and the US already tried to extradite her for posting stuff on git.rip
easrng · 3 years ago
it ran git.rip

Deleted Comment

ohbleek · 3 years ago
I had always assumed that the “no fly” list was a phrase and that it didn’t refer to an actual list, but rather a database with more detailed information than a “can they fly?” Column with a Y/N entry. In pharmacy we have a database we have to access when we suspect there is abuse, fraud, or diversion of controlled substances. The database is regularly updated with current information about prescriptions that were dispensed including location, prescribing physician, etc. I had always assumed the “no fly” list would be something similar. Now that I think about it though, that wouldn’t be efficient or useful at all. It would make sense for it to be much more simple.
mihaaly · 3 years ago
I naively thought a secret list (file) with secret data is not distributed among random developers of random organizations in full but having a private access point where specific persons could be checked for no fly list by those with right for it, audited, with measures to avoid abusing the service. Potentially with training set available for developers separately. There are services where the accuracy of certain data can be validated (i.e. for cars by license plate and other data) so those who query should already possess the data of a particular person when using it and not just browse everyone in the secret list they please.
alexwasserman · 3 years ago
I had a friend with a common Indian name get bounced off a flight and then be unable to book flights after it turned out he shared his name with someone on the no-fly. He had to petition his senator/congress person to get off it. TSA had no easy way to prove innocence. It was very clear the list was just a list of names with no useful or distinguishing unique fields with it.

This was roughly 10 years ago, so things might have changed, but at the time it seemed like federal agencies could easily append to the list, but there was no standard process to get off it. I'd guess there are obvious incentive for agencies to add ("hey look, we've found terrorists", even if nothing was actually done about it), and none to remove people from it.

namdnay · 3 years ago
Network connectivity in airports can be patchy at best, and connectivity from the airport internal network to the internet even worse. All the check-in and boarding systems are designed to be able to work offline (with semi-automatic reconciliation afterwards). You have to query the no-fly list at check-in and boarding, so it's more resilient to have a list that can be loaded airport-side every morning
mulmen · 3 years ago
Why can't the TSA run an onsite cache in a secure IT closet?
twelve40 · 3 years ago
yeah, surprised as well. In finance, there is ofac for people forbidden from moving money, but it's also typically used as a service/db instead of passing around csv files to everyone. Very bizarre.
mrcode007 · 3 years ago
Not sure what service you’re referring to but the file is here:

https://www.treasury.gov/ofac/downloads/sdnlist.txt

mproud · 3 years ago
Could this have been an export given to someone upon request? Or maybe served as backup?
edpichler · 3 years ago
Every company keeps its list or it´s a USA government list?
as_bntd · 3 years ago
I expected to read an article about actually owning an airline in 3 easy steps. :(
zootboy · 3 years ago
Indeed, the de-editorializing of the title made the interpretation more ambiguous. I'd actually prefer the real title ("how to completely own an airline...") or a more clear adjustment ("how to hack an airline...").
mihaaly · 3 years ago
I was disappointed too. I wouldn't know what to do with an airline, I never had one, I wouldn't even know which one I'd like, perhaps Virgin Airlines?, but the thought of having one was exciting still.
jonp888 · 3 years ago
I guess we do need the verb 'pwn' after all :D
interestica · 3 years ago
you're....actually right. I totally misread this headline. There were no context clues to help with the reading.
twelve40 · 3 years ago
I too was at first annoyed by a bit of an overhyping in the title and the overall style as well, until I remembered how it felt when you discovered something yourself, or even just read a good clever report from someone else. You get this rush that this is the coolest craftiest thing in the world.
as_bntd · 3 years ago
You are right! That's how this reads.
kab0b · 3 years ago
I imagine it's something like Richard Bransons How to become a millionaire:

1) Be a billionaire

2) Start an Airline

rsynnott · 3 years ago
I actually expected this to be "buy a bankrupt airline for ~nothing, and, oops, look, it still has a copy of the no fly list", to be honest...
as_bntd · 3 years ago
Yep, that's exactly what I thought on first opening the article.
missedthecue · 3 years ago
For Musk's $44B Twitter bid, he could theoretically have purchased Delta, United, and American airlines.
as_bntd · 3 years ago
3 easy steps :)

1. Create Tesla. 2.

jkingsman · 3 years ago
For those unaware, maia is a pretty prolific hacktivist, and it has been indicted by a grand jury for a variety of USA govt penetrations but has USA proceedings on hold until it's extradited, which it's confident won't happen.

https://en.wikipedia.org/wiki/Maia_arson_crimew

yellow_lead · 3 years ago
so are there any repercussions for hacking US entities from switzerland ? Not that I think there ought to be.
nibbleshifter · 3 years ago
The Swiss tend to make your life vaguely difficult by confiscating your computers every now and then at the request of the US.

You won't be extradited though.

The Swiss could maybe prosecute domestically, but its not (currently) in the public interest to do so.

ericpauley · 3 years ago
This is clearly on the darker side of gray-hat. Hate to be preachy but anyone seeking to emulate this sort of attack-finding should consider their ethical obligations as a computer scientist and follow best practices for responsible disclosure. It appears this was completely ignored here, including sharing stolen sensitive data of normal people with whoever can plead a case.
UniverseHacker · 3 years ago
Am I missing something? It seems Maia didn't share the data at all, and only offers to if someone can demonstrate they will use it responsibly.

Moreover, depending on the contents of the list, this likely offers proof of what is generally suspected, that the no fly list is a form of discrimination and authoritarian overreach, targeting people that haven't been convicted of a crime but are "suspected" due to race, religion, etc. The whole thing is probably unconstitutional/illegal, but it's hard to prove that since it's been secret.

This seems like a clear case of hacktivism- trying to expose an unethical government program for what it is, so that it can be stopped.

lamontcg · 3 years ago
> Maia didn't share the data at all

You literally immediately falsified that assertion:

> and only offers to if someone can demonstrate they will use it responsibly.

And nobody ever lies of course.

toss1 · 3 years ago
>>demonstrate they will use it responsibly.

The problem is to define "demonstrate" and the criteria. Remember the gatekeeper is now an unemployed gal who "know lot's of things about cyber security" according to her main page. Seems likely a competent bad actor could easily impersonate a well-meaning reporter...

Yes, security through obscurity isn't security, but this also seems incredibly irresponsible for any "security researcher". AFAIK, just basic standard good practice is to report the flaws and allow a reasonable interval before publishing, and there seems to be no hint of this.

Modern society really is held together with duct tape, baling twine, and a few pieces of bubble gum...

[EDIT: pronouns]

Pixeleen · 3 years ago
I get the impression that she's/it's doing this from a place of pain and desire to lash out, and "the system" is an easy target for her to fix onto. Not out of any sense of morality.
driverdan · 3 years ago
You have it backwards. Ethical obligations mean unethical things like government blacklists should be leaked in their entirety.
infoseek12 · 3 years ago
And incidentally some of it is entirely illegal but sense she is already facing extradition for a federal indictment - in for a penny, in for a pound.

Deleted Comment

calvinmorrison · 3 years ago
Yeah cause we should totally have a top secret no fly list
ericpauley · 3 years ago
Maybe we should or shouldn't, but the potential victims of this aren't just some greedy corporation. Leaking the no fly list could cause irreparable harm to individuals whose names are on it or even similar, causing discrimination by employers and other organizations.
steve_adams_86 · 3 years ago
Though I don’t like the idea of it, I’m also not certain that I know better than people whose careers are in national defence. I’m not convinced that it’s a black and white thing. There are bad actors out there, and sometimes it’s clearly advantageous to hide information from them, which means hiding it from everyone.

Maybe there are reasons this is short sighted or I’m missing a greater point. I’d be interested to hear ideas in any case.

Deleted Comment

this_steve_j · 3 years ago
Hard agree here, with a qualifier.

Breaking into private S3 buckets because you are bored is not considered an appropriate “Step 1” by the _professional community_ (people who get paid to do this for a living) at large.

Among people who plan to be financially rewarded for their work and also not be in handcuffs, Step 1 is usually to “Get written permission”.

WatchDog · 3 years ago
Seems to making it's prosecutors jobs really easy, by incriminating itself.
ripdog · 3 years ago
Perhaps this is just my autism speaking, but am I the only one who gets completely freaked out by sentences like the above? "It" refers to inanimate objects, things which can't have free will, do crimes, or be prosecuted.

It's almost like you're talking about how a lawnmower decided to run a child over and then incriminate itself by boasting about it on social media. It makes no sense!

I know she picked that pronoun herself, but I really wish she didn't. It just makes communication difficult.

Miner49er · 3 years ago
Maybe I missed it, but what data of normal people was stolen?
Rebelgecko · 3 years ago
>full names, addresses, phone numbers, passport numbers, pilot's license numbers, when their next linecheck is due and much more

Deleted Comment

dclowd9901 · 3 years ago
Hacker is anti-capitalist (cool), so I’m not sure they’re concerned with what hat they’re wearing in the endeavor.

Graciously, though, they’re at least feigning caution with handing out the no-fly list.