Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

A Disney Worker Downloaded an AI Tool. It Led To a Hack That Ruined His Life. (dailymail.co.uk) 53

A Disney employee's download of an AI image generation tool from GitHub led to a massive data breach in July 2024, exposing over 44 million internal Slack messages. The software contained infostealer malware that compromised Matthew Van Andel's computer [non-paywalled source] for five months, giving hackers access to his 1Password manager.

The attackers used the stolen credentials to access Disney's corporate systems, publishing sensitive information including customer data, employee passport numbers, and revenue figures from Disney's theme parks and streaming services. The breach also devastated Van Andel personally. Hackers exposed his Social Security number, financial login details, and even credentials for his home's Ring cameras. Shortly after the incident, Disney fired Van Andel following a forensic analysis of his work computer, citing misconduct he denies. Security researchers believe the attacker, who identified as part of a Russia-based hacktivist group called Nullbulge, is likely an American individual.

A Disney Worker Downloaded an AI Tool. It Led To a Hack That Ruined His Life.

Comments Filter:
  • by Anonymous Coward on Wednesday February 26, 2025 @12:39PM (#65196737)

    Article is missing what would have perhaps been the most helpful information, namely what this AI thing from GitHub actually is so that the rest of us could check to see if we have ever used it and might be compromised.

  • by ArsenneLupin ( 766289 ) on Wednesday February 26, 2025 @12:40PM (#65196739)
    ... basically just the title. Anybody has a link with the full story?
  • by kwelch007 ( 197081 ) on Wednesday February 26, 2025 @12:41PM (#65196741) Homepage

    A whole lot more than just some lost passwords went wrong here.

  • Corporate security (Score:4, Interesting)

    by fluffernutter ( 1411889 ) on Wednesday February 26, 2025 @12:53PM (#65196773)
    What were the security guidelines for Disney employees? Were they told not to install anything that wasn't explicitly cleared by Disney or were they allowed to use their workstation as a playground?
    • by radarskiy ( 2874255 ) on Wednesday February 26, 2025 @01:42PM (#65196933)

      "told not to install "

      Disney is large enough that their IT should have the tools to *prohibit* installation.

      • by GoTeam ( 5042081 )

        "told not to install "

        Disney is large enough that their IT should have the tools to *prohibit* installation.

        It probably has something to do with the amount of control given to this "imagineer" for him to do his job. He probably had elevated permissions in their environment. That's enough to get you blocked from all but the lowest jobs in his chosen profession going forward.

      • by IWantMoreSpamPlease ( 571972 ) on Wednesday February 26, 2025 @02:13PM (#65197069) Homepage Journal

        That Mickey Mouse operation? Doubt it ;-)

      • by dmomo ( 256005 )

        And at a higher level, if those prohibitions were bypassed, maliciously or innocently, the data that was accessed was not secure. One employees computer shouldn't have this much power over company data and infrastructure. The real failure is up the chain. This is a CTO-level failure.

    • by msauve ( 701917 ) on Wednesday February 26, 2025 @01:56PM (#65196985)
      The malware was installed on a home (not work) computer, which appears to have never been connected to a Disney network.

      The problem was:

      The hacker gained access to 1Password, a password-manager that Van Andel used to store passwords and other sensitive information, as well as âoesession cookies,â digital files stored on his computer that allowed him to access online resources including Disneyâ(TM)s Slack channel.

      How and why Disney credentials were in his personal 1Password is not explained.

      • i.e. no MFA or other type of access control
        • No MFA and also allowed full VPN access from an unmanaged (non-corporate) computer.

          CIO/CISO should be fired too.

        • He very likely did not have MFA on his 1Password account.
          He could very well have had MFA on every single other account he used, but if they had access to 1Password, and his MFA credentials were stored in 1Password (which is definitely a thing that it does, so it can auto-enter the TOTP code for you) then it was game over.

          • He very likely did not have MFA on his 1Password account.

            The article (or at least an article I read) said exactly that - the malware had a key logger, he logged into his non MFA 1Password, and boom!

            It even cautioned people explicitly to set up MFA on 1password, which does seem like a great idea for a master password store, although obviously more annoying in day to day use which is why most people do not do it!

            • They must have then had some more malware on his computer to gather other information - with 1Password, when you first set up your account, you're given what they call an Emergency Kit, which is a PDF that has a secret key on it. This key is not held anywhere with 1Password, you have the only copy of it.
              You can not log in to a 1Password account with just the email and password, nor can you perform a password reset with just these credentials.

              In order to log in to 1Password from a new device, you must have t

    • by gweihir ( 88907 )

      This is a large enterprise. Hence it is certain that there was an explicit prohibition on what he did as part of his employment contract. Which he signed.

    • by alta ( 1263 )

      This doesn't surprise me and it scares me to death at the same time. Our administrators are usually the type to want to play around with new toys. And obviously they get privs that are dangerous. We DO a good job at not letting users log in to their machines it their admin or domain admin accounts. And we vault their admin accounts and do daily rotates. But STILL, I know of a way to get to the keys to the kingdom without a single MFA. I have a feeling others do too. We also don't like being told we c

    • Yeah, no kidding. Why would they not have application allow listing enabled? How are users able to just run arbitrary executables downloaded from the Internet? Crazy that no security layer flagged this activity at all.

    • by dmomo ( 256005 )

      Further, why isn't this being described as a failure higher up the chain?
      Why should an employee have the power to cause this much destruction, even if the result of an error?
      If your company can crumble because of a single lower-level employee, you have issues with your security landscape.

    • Were they told not to install anything that wasn't explicitly cleared by Disney or were they allowed to use their workstation as a playground.

      In the many, many companies for which I have worked not a single one has said I can download and install whatever I want on their computers. That is when I had a dozen coworkers or thousands of workers. I can surmise a large corporation like Disney explicitly state these rules.

  • Ruined his life, really? Sounds like a minor inconvenience and a great opportunity to sue your employer for wrongful dismissal. He may have won the jackpot.

    • Re:Perspective (Score:4, Interesting)

      by gweihir ( 88907 ) on Wednesday February 26, 2025 @01:58PM (#65196989)

      Hahaha, no. Prohibition to download and install software yourself is typically part of your employment contract. If anything, Disney could sue him for all the damage done and he would have to pay. Likely the only reason they are not doing that is because they would not recover a lot and it would be bad for their public image.

      Seriously, how clueless do you have to be to make a statement like you just did?

      • Prohibition to download and install software yourself is typically part of your employment contract.

        On your own computer at home?

    • by GoTeam ( 5042081 )

      Ruined his life, really? Sounds like a minor inconvenience and a great opportunity to sue your employer for wrongful dismissal. He may have won the jackpot.

      That would be assuming he is innocent. If it really was a "forensic analysis of his work computer" that turned up the evidence of his wrongdoing, I don't think he has a jackpot waiting for him...

  • by redmid17 ( 1217076 ) on Wednesday February 26, 2025 @01:25PM (#65196881)
    Loses his job and life in process of doing idiot things. News at 11
  • That's what the article is going for, anyway. They want readers to feel like AI is fundamentally insecure, when that's not what happened here.

  • How stupid do you have to be? These guy downloaded unauthorized software from an external source, doubtless without permission to do so, and then messed it up.

    He is lucky to just have gotten fired.

    • by ack154 ( 591432 )

      You may have already read it in a couple of the replies above, but this wasn't his work computer. It was a personal computer at home. So not really much "unauthorized" about that or "permission" required. They got in through his then compromised 1Password account where he had apparently stored Disney credentials. Of course, should he have been storing work account info in a (assumed) non-work password manager? Don't know what Disney's policy is there.

  • that compromised Matthew Van Andel's computer [non-paywalled source]

    The non-paywalled source displays only the first two lines of the article with no javascript, and a paywall with it.

    Fuck your paywall-only article.

  • Those attacks are what worries me, because no matter what security I have, be it a PW manager, FDE, encrypted drives, a decent AV condom, running macOS as a balance between app availability and privacy, and such, all it takes is one thing like this to completely compromise everything.

    Maybe we need to see about better containerization somehow, perhaps move towards the QubesOS model? That, or block the channels that infostealer malware works on, perhaps prompting the user, just in case this is something legi

[Crash programs] fail because they are based on the theory that, with nine women pregnant, you can get a baby a month. -- Wernher von Braun

Working...