Incident: Hola VPN Service Exposed for Insecure Practices and Misuse.

Published Date: 2015-06-01

Postmortem Analysis
Timeline 1. The software failure incident involving Hola VPN occurred in June 2015 as per the article published on June 1, 2015 [36733].
System 1. Hola VPN service 2. Luminati secondary business 3. Hola Chrome extension and Firefox add-on [36733]
Responsible Organization 1. A group of coders and security researchers [36733]
Impacted Organization 1. Users of the Hola VPN service [36733]
Software Causes 1. Hola's VPN service operated like a poorly secured botnet, allowing third parties to execute code on a user's system, track them online, and potentially take over their entire computer without their knowledge [36733]. 2. Hola's secondary business, Luminati, on-sold users' bandwidth for profit, leading to privacy and security concerns [36733]. 3. Hola did not transparently disclose the risks and consequences of participating in its peer-to-peer network, leading to user confusion and potential exploitation [36733].
Non-software Causes 1. Hola's business model of on-selling users' bandwidth through a secondary business known as Luminati for profit [36733]. 2. Lack of transparency and disclosure by Hola regarding how their VPN service operates and the potential consequences for users [36733]. 3. Allegations of Hola operating like a poorly secured botnet, allowing third parties to execute code on users' systems and potentially take over their entire computers [36733].
Impacts 1. Users' bandwidth was being on-sold without their knowledge, potentially exposing them to legal consequences and security risks [36733]. 2. Hola's VPN service was found to have vulnerabilities that could allow third parties to execute code on users' systems, track them online, and potentially take over their entire computers [36733]. 3. Hola's secondary business, Luminati, was on-selling users' bandwidth for profit without clear transparency or control over how it was being used [36733]. 4. Hola faced accusations of operating like a poorly secured botnet, impacting its reputation and trust among users [36733].
Preventions 1. Implementing thorough security testing and audits of the VPN service to identify and address vulnerabilities before they are exploited [36733]. 2. Providing clear and transparent information to users about how their data and resources are being used within the peer-to-peer network [36733]. 3. Ensuring proper user consent and opt-in mechanisms for participating in any secondary business activities related to the service [36733].
Fixes 1. Implementing robust security measures to address the vulnerabilities in the Hola VPN service that allowed third parties to execute code on users' systems and take over their computers [36733]. 2. Transparently disclosing the risks and implications of participating in a peer-to-peer network like Hola's VPN service to users, ensuring they fully understand the potential consequences [36733]. 3. Ceasing the practice of on-selling users' bandwidth through a secondary business like Luminati to prevent unauthorized usage of users' resources and potential legal issues [36733]. 4. Enhancing communication with users by providing clear and detailed information about the nature of the service, how it operates, and the potential risks involved, to build trust and ensure informed decision-making [36733].
References 1. The group of coders and security researchers who claimed Hola's VPN service is insecure and on-selling users' bandwidth [Article 36733] 2. Adios, Hola! website where the group of researchers posted their findings and allegations [Article 36733] 3. Chat logs showing Luminati sales staff offering "pay as you go" access to Hola users' bandwidth [Article 36733] 4. Hola's website updates and statements, including the blog post by company CEO Ofer Vilenski [Article 36733]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization (a) The software failure incident related to Hola's VPN service and the allegations of insecure practices, including on-selling users' bandwidth and opening up their devices, has happened within the same organization. The incident involved Hola offering a VPN service that operates like a poorly secured botnet, allowing third parties to execute code on users' systems and potentially take over their entire computers [36733]. (b) The software failure incident involving Hola's VPN service and the security vulnerabilities has not been explicitly mentioned to have occurred at other organizations or with their products and services in the provided article.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the case of Hola VPN service. The group of coders and security researchers claimed that Hola operates like a poorly secured botnet, allowing other people to browse the web through users' internet connections. This design flaw exposes users to potential risks such as having their devices opened up, being tracked online, and even having their entire computer taken over without their knowledge [36733]. (b) The software failure incident related to the operation phase is highlighted by the fact that Hola was accused of on-selling users' bandwidth through a secondary business called Luminati. This operation introduced contributing factors where users' bandwidth was being sold for profit without their explicit consent or knowledge, potentially leading to misuse of their resources by third parties [36733].
Boundary (Internal/External) within_system (a) within_system: The software failure incident related to Hola VPN can be categorized as within_system. The failure was primarily due to how the Hola VPN service operated as a peer-to-peer network, allowing other users to browse the web through a user's internet connection without their knowledge. This design flaw led to vulnerabilities that allowed third parties to execute code on a user's system, track them online, and potentially take over their entire computer [36733]. The issues stemmed from how the software was designed and operated internally, leading to security and privacy concerns for users.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case is primarily attributed to non-human actions. The incident involved the VPN service Hola, which was accused by a group of coders and security researchers of operating like a poorly secured botnet. The researchers claimed that Hola's VPN service allowed third parties to execute code on a user's system, track them online, and potentially take over their entire computer without their knowledge. Additionally, Hola was accused of on-selling users' bandwidth through a secondary business called Luminati, which raised concerns about the misuse of users' resources without their explicit consent [36733]. These issues were related to the design and operation of the software service rather than direct human actions. (b) While the software failure incident was primarily due to non-human actions, there were also human actions involved in the response to the allegations. Following the accusations, Hola updated its website to clarify its business model and how users could participate in the network. The company's CEO, Ofer Vilenski, denied the accusations of operating a botnet, acknowledged vulnerabilities in the service, and emphasized the need to be transparent with customers about how the peer-to-peer network functions. Hola made changes to its site and product installation flows to ensure that users understood they were sharing their resources with others in exchange for the free service [36733]. These human actions were aimed at addressing the issues raised and improving transparency around the service.
Dimension (Hardware/Software) software (a) The software failure incident related to hardware: - The software failure incident with Hola VPN was not directly attributed to hardware issues but rather to the design and operation of the software itself [36733]. (b) The software failure incident related to software: - The software failure incident with Hola VPN was primarily due to vulnerabilities and design flaws in the software, allowing third parties to execute code on users' systems, track them online, and potentially take over their entire computers [36733].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident related to the Hola VPN service can be categorized as malicious. The incident involved allegations that Hola was operating like a poorly secured botnet, allowing third parties to execute code on users' systems, track them online, and potentially take over their entire computers without their knowledge [36733]. Additionally, Hola was accused of on-selling users' bandwidth through a secondary business called Luminati, without the users' full understanding or consent, for up to $20 per GB [36733]. These actions were considered harmful and exploitative, indicating malicious intent behind the software failure incident.
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident was related to poor_decisions. The incident involved Hola, a VPN service, being accused by a group of coders and security researchers of operating like a poorly secured botnet, on-selling users' bandwidth, and opening up their devices to third parties without users' knowledge [36733]. The company was criticized for not being transparent about its service, vulnerabilities, and the consequences of participating in its peer-to-peer network. Despite updates to its website and software, the allegations raised significant concerns about the company's practices and the potential risks to users' privacy and security.
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the case of Hola VPN service. The group of coders and security researchers highlighted that Hola operates like a poorly secured botnet, allowing third parties to execute code on a user's system, track them online, and potentially take over their entire computer without their knowledge [36733]. This indicates a significant lack of professional competence in the design and implementation of the VPN service, leading to serious security vulnerabilities. (b) The software failure incident related to accidental factors is also present in the case of Hola VPN service. The company CEO, Ofer Vilenski, admitted to making mistakes and stated that they assumed users understood they were sharing their bandwidth with the community network in return for the free service. However, it was not clear to all users, leading to misunderstandings and potential security risks [36733]. This accidental oversight in communication and transparency contributed to the software failure incident.
Duration temporary The software failure incident related to the Hola VPN service can be categorized as a temporary failure. The incident involved vulnerabilities in the service that allowed third parties to execute code on users' systems, track them online, and potentially take over their entire computers without their knowledge [36733]. The company behind Hola faced allegations of operating like a poorly secured botnet and on-selling users' bandwidth through a secondary business called Luminati [36733]. However, following the allegations, Hola updated its website to clarify its business model and address the security issues, indicating a temporary nature of the failure [36733].
Behaviour crash, omission, value, other (a) crash: The software failure incident related to Hola VPN can be categorized as a crash. The incident involved vulnerabilities in Hola's VPN service that allowed third parties to execute code on a user's system, track them online, and potentially take over the entire computer without the user's knowledge. This type of failure can lead to the system losing its state and not performing its intended functions as expected, which aligns with the definition of a crash in software failure incidents [36733]. (b) omission: The incident can also be linked to omission as the software failed to disclose transparently the way it operated, particularly in terms of users' bandwidth being on-sold to a secondary business called Luminati. Users were not fully informed about how their resources were being shared and utilized, indicating an omission in the system's intended functions [36733]. (c) timing: There is no specific information in the article to suggest that the software failure incident was related to timing issues where the system performed its intended functions but at the wrong time. (d) value: The software failure incident can be associated with a value failure as the system was performing its intended functions incorrectly by allowing vulnerabilities that could be exploited by third parties to compromise users' devices and potentially take control of their computers [36733]. (e) byzantine: The incident does not align with a byzantine failure where the system behaves erroneously with inconsistent responses and interactions. The main issue here was the lack of transparency and potential security risks associated with the way Hola's VPN service operated. (f) other: The other behavior exhibited in this software failure incident could be categorized as a security breach. The vulnerabilities in Hola's VPN service allowed for unauthorized access and potential exploitation of users' devices, which is a critical security concern beyond just a typical software failure [36733].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving Hola VPN service had significant consequences related to property. The group of researchers claimed that Hola was on-selling users' bandwidth through a secondary business called Luminati for up to $20 per GB without the users' knowledge. This unauthorized use of users' resources for financial gain highlights the impact on people's property in terms of data and potentially monetary loss [36733].
Domain information The software failure incident reported in the article is related to the industry of information (a). The incident involves a Virtual Private Network (VPN) service called Hola, which allows users to circumvent online geoblocks and access geo-blocked content [Article 36733]. The failure in this case pertains to the security vulnerabilities in Hola's system, where users' bandwidth was being on-sold without their knowledge, potentially exposing them to legal consequences and security risks.

Sources

Back to List