Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

A Disney Worker Downloaded an AI Tool. It Led To a Hack That Ruined His Life. (dailymail.co.uk) 94

A Disney employee's download of an AI image generation tool from GitHub led to a massive data breach in July 2024, exposing over 44 million internal Slack messages. The software contained infostealer malware that compromised Matthew Van Andel's computer [non-paywalled source] for five months, giving hackers access to his 1Password manager.

The attackers used the stolen credentials to access Disney's corporate systems, publishing sensitive information including customer data, employee passport numbers, and revenue figures from Disney's theme parks and streaming services. The breach also devastated Van Andel personally. Hackers exposed his Social Security number, financial login details, and even credentials for his home's Ring cameras. Shortly after the incident, Disney fired Van Andel following a forensic analysis of his work computer, citing misconduct he denies. Security researchers believe the attacker, who identified as part of a Russia-based hacktivist group called Nullbulge, is likely an American individual.

A Disney Worker Downloaded an AI Tool. It Led To a Hack That Ruined His Life.

Comments Filter:
  • by Anonymous Coward on Wednesday February 26, 2025 @12:39PM (#65196737)

    Article is missing what would have perhaps been the most helpful information, namely what this AI thing from GitHub actually is so that the rest of us could check to see if we have ever used it and might be compromised.

  • by ArsenneLupin ( 766289 ) on Wednesday February 26, 2025 @12:40PM (#65196739)
    ... basically just the title. Anybody has a link with the full story?
  • by kwelch007 ( 197081 ) on Wednesday February 26, 2025 @12:41PM (#65196741) Homepage

    A whole lot more than just some lost passwords went wrong here.

  • Corporate security (Score:4, Interesting)

    by fluffernutter ( 1411889 ) on Wednesday February 26, 2025 @12:53PM (#65196773)
    What were the security guidelines for Disney employees? Were they told not to install anything that wasn't explicitly cleared by Disney or were they allowed to use their workstation as a playground?
    • by radarskiy ( 2874255 ) on Wednesday February 26, 2025 @01:42PM (#65196933)

      "told not to install "

      Disney is large enough that their IT should have the tools to *prohibit* installation.

      • by GoTeam ( 5042081 )

        "told not to install "

        Disney is large enough that their IT should have the tools to *prohibit* installation.

        It probably has something to do with the amount of control given to this "imagineer" for him to do his job. He probably had elevated permissions in their environment. That's enough to get you blocked from all but the lowest jobs in his chosen profession going forward.

        • by tlhIngan ( 30335 )

          It probably has something to do with the amount of control given to this "imagineer" for him to do his job. He probably had elevated permissions in their environment. That's enough to get you blocked from all but the lowest jobs in his chosen profession going forward.

          You don't need elevated permissions for things like that. You can do a lot of things without admin on Windows these days. Things like installing software can be left to the IT team to work out if and when to install it for the user. I would pr

        • You merely want control, power over your users. Because if that weren't the case, you would know that nowadays it is much more important for the user to simply know what he is doing (or learn how to) than to trust some "miracle antivirus" or to put so many prohibitions that the user can literally only look at the computer and not be able to do any work on that computer.
      • by IWantMoreSpamPlease ( 571972 ) on Wednesday February 26, 2025 @02:13PM (#65197069) Homepage Journal

        That Mickey Mouse operation? Doubt it ;-)

      • by dmomo ( 256005 )

        And at a higher level, if those prohibitions were bypassed, maliciously or innocently, the data that was accessed was not secure. One employees computer shouldn't have this much power over company data and infrastructure. The real failure is up the chain. This is a CTO-level failure.

    • by msauve ( 701917 ) on Wednesday February 26, 2025 @01:56PM (#65196985)
      The malware was installed on a home (not work) computer, which appears to have never been connected to a Disney network.

      The problem was:

      The hacker gained access to 1Password, a password-manager that Van Andel used to store passwords and other sensitive information, as well as âoesession cookies,â digital files stored on his computer that allowed him to access online resources including Disneyâ(TM)s Slack channel.

      How and why Disney credentials were in his personal 1Password is not explained.

      • i.e. no MFA or other type of access control
        • No MFA and also allowed full VPN access from an unmanaged (non-corporate) computer.

          CIO/CISO should be fired too.

        • He very likely did not have MFA on his 1Password account.
          He could very well have had MFA on every single other account he used, but if they had access to 1Password, and his MFA credentials were stored in 1Password (which is definitely a thing that it does, so it can auto-enter the TOTP code for you) then it was game over.

          • Re: (Score:3, Interesting)

            by SuperKendall ( 25149 )

            He very likely did not have MFA on his 1Password account.

            The article (or at least an article I read) said exactly that - the malware had a key logger, he logged into his non MFA 1Password, and boom!

            It even cautioned people explicitly to set up MFA on 1password, which does seem like a great idea for a master password store, although obviously more annoying in day to day use which is why most people do not do it!

            • by PhunkySchtuff ( 208108 ) <kaiNO@SPAMautomatica.com.au> on Wednesday February 26, 2025 @04:14PM (#65197389) Homepage

              They must have then had some more malware on his computer to gather other information - with 1Password, when you first set up your account, you're given what they call an Emergency Kit, which is a PDF that has a secret key on it. This key is not held anywhere with 1Password, you have the only copy of it.
              You can not log in to a 1Password account with just the email and password, nor can you perform a password reset with just these credentials.

              In order to log in to 1Password from a new device, you must have the secret key, which is long and unguessable like: A3- FSHJNM- 7T85AC-VC83W-7NTCN-457SS-BA3H1

              So, either they had a full RAT on his PC or he had his Emergency Kit saved as a PDF somewhere on his PC and they were able to find the file.

            • You would think an engineer would know better. You would also think the IT department of such a large organization would require MFA and some other security features that are readily available.

              Of course, if you export all the jobs to the cheapest bidder, you get what you pay for.

      • They were allowing him to connect from his personal machine, obviously.

        Whatever else is true about this story, that was a gross failure on Disney's part.

        No form of BYOD is a good idea, and it never was. Work should be done on work computers only. It's cheaper to send a computer home with employees who need one than to have your network compromised.

    • by gweihir ( 88907 )

      This is a large enterprise. Hence it is certain that there was an explicit prohibition on what he did as part of his employment contract. Which he signed.

    • by alta ( 1263 )

      This doesn't surprise me and it scares me to death at the same time. Our administrators are usually the type to want to play around with new toys. And obviously they get privs that are dangerous. We DO a good job at not letting users log in to their machines it their admin or domain admin accounts. And we vault their admin accounts and do daily rotates. But STILL, I know of a way to get to the keys to the kingdom without a single MFA. I have a feeling others do too. We also don't like being told we c

      • Exactly, there should be a corporate password repo and a personal one. The corporate one should never be used on a personal computer.
      • by Bongo ( 13261 )

        I don't know the details in this case, but generally, any admin tasks which affect important corporate servers, should be done on separate laptops which are dedicated to that and never used for anything else. No email, web browsing, none.

        The idea that we have to make every corporate device super secure and safe and totally locked down, regardless of its purpose is a foolish endeavour, because it's generally impossible, and hugely distracting from simply focusing on on what matters.

    • Yeah, no kidding. Why would they not have application allow listing enabled? How are users able to just run arbitrary executables downloaded from the Internet? Crazy that no security layer flagged this activity at all.

    • by dmomo ( 256005 )

      Further, why isn't this being described as a failure higher up the chain?
      Why should an employee have the power to cause this much destruction, even if the result of an error?
      If your company can crumble because of a single lower-level employee, you have issues with your security landscape.

    • Were they told not to install anything that wasn't explicitly cleared by Disney or were they allowed to use their workstation as a playground.

      In the many, many companies for which I have worked not a single one has said I can download and install whatever I want on their computers. That is when I had a dozen coworkers or thousands of workers. I can surmise a large corporation like Disney explicitly state these rules.

  • Ruined his life, really? Sounds like a minor inconvenience and a great opportunity to sue your employer for wrongful dismissal. He may have won the jackpot.

    • Re:Perspective (Score:4, Interesting)

      by gweihir ( 88907 ) on Wednesday February 26, 2025 @01:58PM (#65196989)

      Hahaha, no. Prohibition to download and install software yourself is typically part of your employment contract. If anything, Disney could sue him for all the damage done and he would have to pay. Likely the only reason they are not doing that is because they would not recover a lot and it would be bad for their public image.

      Seriously, how clueless do you have to be to make a statement like you just did?

      • Prohibition to download and install software yourself is typically part of your employment contract.

        On your own computer at home?

        • by gweihir ( 88907 )

          If you have work credentials stored on it (which you exceptionally likely were not allowed to), yes. Stop trying to find an angle. This guy messed up big time.

      • ... Disney could sue him for all the damage done and he would have to pay. Likely the only reason they are not doing that is because they would not recover a lot and it would be bad for their public image ...

        Their public image kinda took a shit when they tried to EULA the guy out of a lawsuit over the death of his wife in a Disney-controlled restaurant. I'm thinking it's more likely they don't want to get the suing ball rolling, lest some of their partners, employees, etc. that had data leaked start looking at their IT security practices with that Looney-Tunes-wolf kind of interest.

    • by GoTeam ( 5042081 )

      Ruined his life, really? Sounds like a minor inconvenience and a great opportunity to sue your employer for wrongful dismissal. He may have won the jackpot.

      That would be assuming he is innocent. If it really was a "forensic analysis of his work computer" that turned up the evidence of his wrongdoing, I don't think he has a jackpot waiting for him...

    • by bws111 ( 1216812 )

      Having your SSN and financial details exposed is a 'minor inconvenience'? No.

  • by redmid17 ( 1217076 ) on Wednesday February 26, 2025 @01:25PM (#65196881)
    Loses his job and life in process of doing idiot things. News at 11
  • That's what the article is going for, anyway. They want readers to feel like AI is fundamentally insecure, when that's not what happened here.

    • I'm honestly surprised they published an article that was critical of AI. We get ten AI cheerleading articles a day. This one doesn't fit the narrative.

  • How stupid do you have to be? These guy downloaded unauthorized software from an external source, doubtless without permission to do so, and then messed it up.

    He is lucky to just have gotten fired.

    • by ack154 ( 591432 )

      You may have already read it in a couple of the replies above, but this wasn't his work computer. It was a personal computer at home. So not really much "unauthorized" about that or "permission" required. They got in through his then compromised 1Password account where he had apparently stored Disney credentials. Of course, should he have been storing work account info in a (assumed) non-work password manager? Don't know what Disney's policy is there.

      • by gweihir ( 88907 )

        If he uses his private computer to store work credentials (which exceptionally likely was explicitly forbidden), and then does not protect it adequately, that is not better. That is _worse_. It simply adds another violation of his work contract on top.

  • that compromised Matthew Van Andel's computer [non-paywalled source]

    The non-paywalled source displays only the first two lines of the article with no javascript, and a paywall with it.

    Fuck your paywall-only article.

  • Those attacks are what worries me, because no matter what security I have, be it a PW manager, FDE, encrypted drives, a decent AV condom, running macOS as a balance between app availability and privacy, and such, all it takes is one thing like this to completely compromise everything.

    Maybe we need to see about better containerization somehow, perhaps move towards the QubesOS model? That, or block the channels that infostealer malware works on, perhaps prompting the user, just in case this is something legi

  • by Zontar_Thing_From_Ve ( 949321 ) on Wednesday February 26, 2025 @04:55PM (#65197491)
    The article says Matthew Van Andel lost over $200,000 in bonuses. What the hell exactly was his job at Disney? A few years ago I was working for a Fortune 500 company and you'd have to be at least 2 levels above my manager - and I was a drone, not in management - to have a salary around that kind of money, let alone get those kind of bonuses. The article makes it sound like he was just some kind of average joe programmer, but he was a very highly salaried employee to have bonuses of over $200,000. Were they paying him a million or more a year in his job? What the hell exactly was he doing? He seems to have no internet history besides this report. There's no Linkedin profile for him that I could find. Does this make sense? Is it all bs and lies to get money for some kind of GoFundMe scam?
    • by alcmena ( 312085 ) on Wednesday February 26, 2025 @06:03PM (#65197627)
      As a former Disney person, I can say that level of bonus is quite possible. The way it works is via Long Term Incentive (LTI) plans. Typically they grant fairly large amounts of stock, but it vests over several years so you only get any if you stick around. That stock also rides the roller coaster of the market, so $120k in stock can become $60k if the stock halves, or $240k if it doubles. Since the LTI's are issued every year, to get $200k, that he lost, it would only need to be about $50k per year, that vests over 4 years each, assuming no movement in the stock price. That's not out of line with other large companies that work with technology. Basically, what he's complaining about is that all the "promised" stock evaporated when he got fired, even though that would have taken years for him to actually get the amount.
    • by mjwx ( 966435 )

      The article says Matthew Van Andel lost over $200,000 in bonuses.

      Erm... so he lost money he didn't actually have.

      Something about counting chickens here, if he made any purchases or investments counting on that money he has no-one to blame but himself.

  • Force them to "open source"...
  • That raise the question: when can we trust code from github?
    • You can't "trust" code from anywhere, ever. At least with open source, however, you're given the opportunity to review the code yourself. But no responsible organization should ever be trusting code from a third party.
      • But no responsible organization should ever be trusting code from a third party.

        Do you mean no responsible organization should run Windows or MacOSX?

  • by bloodhawk ( 813939 ) on Wednesday February 26, 2025 @08:35PM (#65197865)
    Lots of failures here from both Disney and the employee. For start what sort of moron uses a password manager for critical accounts.
  • I never need to give mine to employers. What are the reasons Disney's employee passport numbers could be found?

Let's organize this thing and take all the fun out of it.

Working...