Incident: Railway Station Wi-Fi Provider Exposed Traveler Data Due to Unsecured Database.

Published Date: 2020-03-02

Postmortem Analysis
Timeline 1. The software failure incident of the exposed traveller data at UK railway stations happened between 28 November 2019 and 12 February 2020 as mentioned in Article [97490].
System 1. C3UK's database system - The database containing personal contact details and travel information of about 10,000 people was exposed online due to lack of password protection, leading to a potential vulnerability [97490].
Responsible Organization 1. C3UK [97490]
Impacted Organization 1. Travelers who used free wi-fi at UK railway stations, as their email addresses and travel details were exposed online [97490].
Software Causes 1. Lack of password protection on the database containing personal contact details and travel information [97490] 2. Database being searchable by username, potentially allowing tracking of individuals' travel patterns [97490] 3. Exposure of software updates and type of software being used by devices connected to the wi-fi, creating a potential pathway for malware installation [97490]
Non-software Causes 1. Lack of password protection for the exposed database containing personal contact details and dates of birth [97490]. 2. Failure to respond to notifications and follow-up emails from the security researcher regarding the exposed database [97490]. 3. Decision by C3UK not to inform the data regulator, the Information Commissioner's Office (ICO), about the incident [97490].
Impacts 1. Personal contact details and dates of birth of about 10,000 people who used free wi-fi at UK railway stations were exposed online due to the software failure incident [97490]. 2. The database, which was not password protected, contained 146 million records, potentially allowing individuals' regular travel patterns to be tracked by username, posing a privacy risk [97490]. 3. The incident revealed software updates and the type of software being used by devices connected to the wi-fi, creating a secondary pathway for malware installation [97490]. 4. The failure led to a lack of response from the service provider C3UK to the security researcher who discovered the exposed database, indicating a breakdown in communication and incident response [97490]. 5. The incident raised concerns about potential adverse effects on individuals affected by the data exposure, prompting questions about the appropriate steps to protect them and the decision not to inform the data regulator, the Information Commissioner's Office (ICO) [97490].
Preventions 1. Implementing proper access controls and encryption measures to protect sensitive data stored in databases [97490]. 2. Conducting regular security audits and vulnerability assessments to identify and address potential weaknesses in the system [97490]. 3. Responding promptly to security researchers' notifications and taking immediate action to secure exposed databases [97490]. 4. Establishing clear communication channels with relevant authorities such as data protection agencies like the Information Commissioner's Office (ICO) to report incidents and seek guidance on handling data breaches [97490].
Fixes 1. Implement proper security measures such as password protection for databases to prevent unauthorized access [97490]. 2. Regularly monitor and audit databases to ensure they are secure and not exposed online [97490]. 3. Respond promptly to security researchers or individuals who report vulnerabilities and take immediate action to address the issues [97490]. 4. Consider informing the relevant data protection authorities, such as the Information Commissioner's Office (ICO), in case of data incidents to protect affected individuals and take necessary steps [97490].
References 1. Security researcher Jeremiah Fowler from Security Discovery [97490] 2. C3UK, the service provider [97490] 3. Network Rail [97490] 4. Greater Anglia, the train operating company [97490] 5. Information Commissioner's Office (ICO) [97490]

Software Taxonomy of Faults

Category Option Rationale
Recurring unknown (a) The software failure incident having happened again at one_organization: - The article does not mention any previous incidents of a similar nature happening again within the same organization [97490]. (b) The software failure incident having happened again at multiple_organization: - The article does not mention any previous incidents of a similar nature happening again at other organizations [97490].
Phase (Design/Operation) design, operation (a) The software failure incident in the article was related to the design phase. The incident occurred due to a database containing personal contact details and travel information of about 10,000 people being exposed online. The database was found to be unsecured and not password protected, making it vulnerable to unauthorized access [97490]. Additionally, the database revealed software updates and the type of software being used by devices connected to the wi-fi, which could potentially lead to the installation of malware [97490]. (b) The software failure incident in the article was also related to the operation phase. The incident involved the misuse of the system, as the exposed database could be searched by username, allowing individuals' regular travel patterns to be tracked based on their wi-fi logins at various railway stations. This misuse of the system could have adverse effects on the privacy and security of the individuals affected [97490].
Boundary (Internal/External) within_system (a) within_system: The software failure incident in this case was primarily within the system. The incident involved the exposure of sensitive traveler data due to a database containing personal contact details and travel information being left unprotected by the wi-fi service provider C3UK [97490]. The database was accessible online and contained records of individuals' travel patterns, software updates, and the type of software used by devices connected to the wi-fi service. This vulnerability was identified as a low-risk potential vulnerability by C3UK, but it still posed a threat as it could potentially allow for the installation of malware through the software updates and information revealed in the database [97490].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case was primarily due to non-human actions. The incident involved the exposure of traveler data from UK railway stations due to an unsecured database found online by a security researcher. The database, containing personal contact details and dates of birth of about 10,000 people, was not password protected and was accessible on unsecured Amazon web services storage. This vulnerability was identified as a low-risk potential vulnerability, and the database did not contain critical data such as passwords or financial information. The incident was discovered by the security researcher, Jeremiah Fowler, who found the database and alerted the service provider, C3UK, to secure it [97490]. (b) Human actions also played a role in this software failure incident. Despite being informed about the exposed database by the security researcher, C3UK did not respond to the researcher's emails for several days. Additionally, C3UK chose not to inform the data regulator, the Information Commissioner's Office (ICO), about the incident, stating that the data had not been stolen or accessed by any other party. The ICO confirmed that it had not been notified about the incident. However, Network Rail, the organization managing London Bridge station, advised C3UK to consider reporting the vulnerability to the ICO. This delay in response and decision-making by C3UK regarding informing the relevant authorities can be considered as contributing factors introduced by human actions in this software failure incident [97490].
Dimension (Hardware/Software) software (a) The software failure incident in the article was not directly attributed to hardware issues. The incident involved the exposure of traveler data due to a database being found online without password protection, leading to potential vulnerabilities in the system [97490]. (b) The software failure incident in the article was primarily due to contributing factors originating in software. The incident involved the exposure of traveler data due to a database being found online without proper security measures, such as password protection. Additionally, the database revealed software updates and the type of software being used by devices connected to the wi-fi, which could potentially lead to the installation of malware [97490].
Objective (Malicious/Non-malicious) non-malicious (a) The software failure incident in Article 97490 was non-malicious. The incident involved the exposure of traveler data due to a database being found online without password protection, leading to the exposure of personal contact details and travel information of about 10,000 people who used free wi-fi at UK railway stations. The incident was discovered by a security researcher and the database was accessed by the service provider and the security firm, with no information being made publicly available. The incident was identified as a low-risk potential vulnerability, and the data had not been stolen or accessed by any other party [97490].
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident in Article 97490 can be attributed to poor decisions made by the wi-fi service provider C3UK. Despite being informed about the exposed database by researcher Jeremiah Fowler, C3UK chose not to inform the data regulator, the Information Commissioner's Office (ICO), because they believed the data had not been stolen or accessed by any other party. This decision not to report the vulnerability to the ICO was criticized, as organizations are expected to consider contacting affected individuals and taking steps to protect them from potential adverse effects when a data incident occurs [97490].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident in Article 97490 can be attributed to development incompetence. The incident involved the exposure of email addresses and travel details of about 10,000 people who used free wi-fi at UK railway stations due to a database that was not password protected [97490]. Additionally, the database was found online by a security researcher, indicating a lack of proper security measures in place during the development and maintenance of the system. The failure to secure the database properly can be seen as a result of development incompetence. (b) The software failure incident in Article 97490 can also be considered accidental. The exposure of the database containing personal contact details and dates of birth of individuals was not intentional but rather accidental. The incident was discovered by a security researcher who found the database on unsecured Amazon web services storage, indicating that the exposure was not a deliberate act but a result of accidental oversight [97490].
Duration temporary (a) The software failure incident in this case was temporary as it was due to contributing factors introduced by certain circumstances. The incident involved the exposure of traveler data due to an unsecured database found online by a security researcher [97490]. The database was created between 28 November 2019 and 12 February 2020, indicating a specific timeframe for the exposure of the data. Additionally, the incident was addressed promptly once it was brought to the attention of the service provider and the security firm, leading to the closure of the exposed database [97490].
Behaviour other (a) crash: The incident involving the exposure of traveler data at UK railway stations was not described as a crash where the system loses state and does not perform its intended functions. The software failure did not result in a complete system failure. (b) omission: The software failure incident did not involve the system omitting to perform its intended functions at an instance(s). The incident was related to the exposure of sensitive data due to a security vulnerability. (c) timing: The timing of the software failure incident was not a factor in this case. The incident was primarily about the exposure of personal data due to a lack of proper security measures. (d) value: The software failure incident did not involve the system performing its intended functions incorrectly. It was more about the lack of proper security measures leading to data exposure. (e) byzantine: The software failure incident did not exhibit characteristics of a byzantine failure where the system behaves erroneously with inconsistent responses and interactions. The incident was more about a security vulnerability leading to data exposure. (f) other: The behavior of the software failure incident was related to a security vulnerability that allowed the exposure of sensitive traveler data due to a database not being password protected, rather than a specific failure mode like crash, omission, timing, value, or byzantine behavior.

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, non-human, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving the exposure of traveler data at UK railway stations resulted in the exposure of personal contact details, dates of birth, and travel details of about 10,000 people who used the free wi-fi service [97490]. The database containing this information, which was not password protected, was found online by a security researcher and included 146 million records [97490]. Additionally, the database revealed software updates and the type of software being used by devices connected to the wi-fi, potentially creating a pathway for malware installation [97490].
Domain transportation (a) The software failure incident reported in the article is related to the transportation industry. The incident involved the exposure of traveler data of about 10,000 people who used free Wi-Fi at UK railway stations [Article 97490].

Sources

Back to List