As of April, 2021, disclose.io has created a crowd-sourced version of this list on GitHub. We strongly encourage you to watch that project and open an issue or pull request if you are aware of any threats not on this list. As of May 27, 2021, this page on Attrition Errata is considered FIN and will no longer be updated.
It has been clear for years that businesses have dropped ethics in favor of profit. Protecting the bottom line is usually more important than doing the right
thing, even if it means providing a better product to their customers. Companies fear negative publicity, especially if said publicity challenges the security of their
products. It doesn't matter that just about every company and product ships with numerous vulnerabilities, and adding security is a band-aid solution
rather than an integral part of the development life cycle. Rather than work with researchers who are frequently providing what would otherwise be high-dollar
specialized consulting for free, some companies opt to go take the muddy road and pursue legal action against the researchers. This action is one of desperation
and attempts to silence and stifle legitimate research and free speech. Invariably, this ends up being a huge negative PR move, much worse than what
would occur with the publication of said research without the legal murk.
Companies: embrace researchers who are trying to improve the security of your products. Work with them, fix vulnerabilities, and coordinate disclosure. This will go a lot farther toward building customer confidence and help avoid negative publicity. Providing researchers safe harbor for reporting a vulnerability to you is critical to working towards a more secure product and ecosystem.
Researchers: help protect yourself from legal issues. Visit the EFF's Coders' Rights Project. Work with companies and respect their timelines for implementing fixes.
When | Entity making threat | Researcher(s) | Research Topic | Resolution/Status |
2021-03-25 | Apperta Foundation | Rob Dyke | Sensitive Public Info | Dyke discovered that Apperta had sensitive information on their GitHub repo and informed them. Apperta reported Dyke to the Northumbria Police department despite them making the serious error and him being a good citizen. They also revoked the license to the materials published under NHoS, which they funded, after pledging full transparency to other matters in years prior. Summary and more details in BleepingComputer. Dyke has since indicated this ordeal has cost him £10,000. |
2021-03-02 | Xerox | Raphaël Rigo / Airbus Security Lab | Attacking Xerox Multi Function Printers | ![]() |
2020-09-10 | Giggle | Digital Interuption | Giggle App | After attempting to contact the CEO and several Giggle staff to disclosure the vulnerability directly to them, Digital Interuption was blocked each time, and threatened by Giggle users/fans after the CEO insulted them publicly. After disclosing the vulnerability, Giggle threatened the researchers with an unspecified legal threat. |
2019-11-29 | Everspin | Theori | Android App Research | ![]() |
2016-11-17 | Chase Bank | Chad Scira | Web Site Security | ![]() |
2016-12-07 | PwC | ESNC GmbH | PwC ACE Software | ![]() |
2016-06-18 | Nerium International | Steven Jensen | Vulnerability in customer portal | ![]() |
2015-12-23 | Infoba | Henrik Høyer | Vulnerability in Infoba solutions | ![]() |
2015-10-06 | Unspecified | Gianni Gnesa | Surveillance camera vulnerabilities | ![]() |
2015-09-25 | Good Technology | Max Moser, Tobias Ospelt, David Gullasch | XSS in Good for Enterprise administration console | "Vendor provides legal threat against publication of advisory." No further details provided. |
2015-08-13 | FireEye | Felix Wilhelm, ERNW | Finding/reporting vulnerabilities in FireEye products | ![]() |
2015-07-13 | Impero Software | slipstream (@TheWack0lian | Disclosing vulnerabilities in their product | ![]() |
2015-07-07 | Magic Software Argentina | Joaquín Sorianello | Vulnerabilities in MSA Vot.ar Electronic Voting System | ![]() |
2015-05-04 | CyberLock | Mike Davis / IOActive | Vulnerabilities in a product | ![]() |
2015-03-26 | Blue Coat | Raphael Rigo | Security assessment information on Blue Coat ProxySG technology | ![]() |
2014-07-09 | FireEye | Jean-Marie Bourbon | Security flaws in FireEye's Malware Analysis System | ![]() |
2014-01-15 | Covered California | Kristian Erik Hermansen and Matt Ploessel | Security flaws in Covered California website | ![]() |
2014-01-08 | Public Transport Victoria | Joshua Rogers | Security flaws in PTV website | ![]() |
2013-12-16 | ZippyYum | Daniel Wood | Insecure Data Storage in iOS Subway ordering app | ![]() |
2013-07-26 | Volkswagen | Flavio Garcia, University of Birmingham | Security flaws in Volkswagen cars | ![]() |
2013-07-09 | VideoLAN Organization | Secunia | Security flaws in VLC Media Player | After threatening Secunia with legal action, Secunia updates their entry to reflect a vulnerability is 'patched' even though it likely is not, and then changed back to 'unpatched' after even more analysis. Secunia writes an extensive blog on the saga, as has Jean-Baptiste Kempf from VideoLAN. |
2013-06-13 | Zamfoo | Patrick | Security flaws in Zamfoo's products | ![]() |
2013-01-20 | Dawson College / Skytech | Ahmed Al-Khabaz | Security flaws in Skytech's Omnivox portals, used by schools | ![]() |
2012-10-25 | (unknown international utility) | Ralph Langner | Nuclear power plant vulnerabilities (SCADA) | ![]() |
2012-05-28 | E-Soft (UK) | Eric Romang | Video of Metasploit Digital Music Pad SEH overflow exploitation module | ![]() |
2012-01-31 | Smart Grid/Meter Vendor (unspecified) | Don Weber / InGuardians | Smart Grid Meter Security Assessment Tool Release | ![]() |
2011-11-22 | Carrier IQ | Trevor Eckhart | Carrier IQ software logs excessive information | ![]() |
2011-10-13 | First State Superannuation | Patrick Webster | Direct Object Reference vulnerability in FSS website | ![]() |
2011-08-01 | Trans Link Systems | Brenno de Winter | OV Transit Payment System Vulnerabilities | ![]() |
2011-04-27 | Magix AG | Acidgen | Buffer overflow in Music Maker 16 software (version 16.0.2.4) | ![]() |
2011-03-21 | German telecommunications firm (unspecified) | Thomas Roth | Amazon EC2-based password cracking software | ![]() |
2010-08-22 | Indian Police (Mumbai) | Hari Prasad | Vulnerabilities in Electronics Corporation of India (ECIL) Electronic Voting Machines | ![]() |
2010-07-26 | Financial Industry Client (unspecified) | Varun Uppal and Gyan Chawdhary | High-Speed Trading System Hacks | ![]() |
2010-07-15 | Taiwanese Government | Wayne Huang, Armorize Technologies Inc. | The Chinese Cyber Army: An Archaeological Study from 2001 to 2010 | ![]() |
2009-07-18 | RSA | Scott Jarkoff | Navy Federal Credit Union Web Site Flaws | ![]() |
2009-07-17 | Comerica Bank | Lance James | XSS / Phishing vulnerabilities on Comerica site | ![]() |
2009-06-06 | Orange.fr | HackersBlog | Multiple Vulnerabilities [1] [2] | Apparent legal threats, details not published. |
2008-08-13 | Sequoia Voting Systems | Ed Felten | Voting Machine Audit | ![]() |
2008-08-09 | Massachusetts Bay Transit Authority | Zach Anderson, RJ Ryan and Alessandro Chiesa | Electronic Fare Payment (Charlie Card/Charlie Ticket) | ![]() |
2008-07-09 | NXP (formerly Philips Semiconductors) | Radboud University Nijmegen | Mifare Classic Card Chip Security | ![]() |
2007-12-06 | Autonomy Corp., PLC | Secunia | KeyView Vulnerability Research | ![]() |
2007-07-29 | U.S. Customs | Halvar Flake | Security Training Material | ![]() |
2007-04-17 | BeThere (Be Un limited) | Sid Karunaratne | Publishing ISP Router Backdoor Information | ![]() |
2007-02-27 | HID Global | Chris Paget/IOActive | RFID Security Problems | ![]() |
2007-??-?? | TippingPoint Technologies, Inc. | /David Maynor / ErrataSec | Reversing TippingPoint rule set to discover vulnerabilities | ![]() |
2005-07-29 | Cisco Systems, Inc. | Mike Lynn / ISS | Cisco router vulnerabilities | ![]() |
2005-03-25 | Sybase, Inc. | Next-Generation Security Software | Sybase Database vulnerabilities | ![]() |
2003-09-30 | Blackboard Transaction System | Billy Hoffman and Virgil Griffith | Blackboard issued C&D to Interz0ne conference, filed complaint against students | ![]() |
2003-02-05 | Epic Games | Luigi Auriemma / PivX Solutions | Vulnerabilities in Unreal game engine | ![]() |
2002-07-30 | Hewlett-Packard Development Company, L.P. (HP) | SNOsoft | Tru64 Unix OS vulnerability - DMCA based threat | ![]() |
2001-07-16 | Adobe Systems Incorporated | Dmitry Sklyarov & ElcomSoft | Adobe eBook AEBPR Bypass | ![]() |
2001-??-?? | Tegam International Viguard Antivirus | Guillaume Tena (Guillermito) | Vulnerabilities in Viguard Antivirus | ![]() |
2001-04-23 | Secure Digital Music Initiative (SDMI), Recording Industry Association of America (RIAA) and Verance Corporation | Ed Felten | Four Watermark Protection Schemes Bypass - DMCA based threat | ![]() |
2000-08-17 | Motion Picture Association of America (MPAA) & DVD Copy Control Association (DVD CCA) | 2600: The Hacker Quarterly | DVD Encryption Breaking Software (DeCSS) | ![]() |
Notes about this page:
The following incidents are either not confirmed as legal or financial threats, or are confirmed and still cross the line to some degree. They are being included here in the hopes that someone will come forward with additional information or clarification.
When | Company making threat | Researchers | Research Topic | Resolution/Status |
2013-04-30 | Wowza Media Systems | Michal J. | Vulnerabilities in the media server's authentication | ![]() |
2008-10-24 | Charlie Miller | Vulns in T-Mobile Google Phone | ![]() | |
2008-08-01 | Apple | Charles Edge / 318 Inc. | FileVault encryption system weaknesses | ![]() |
2006-12-07 | Oracle Corporation | Argeniss | Week of Oracle Bugs (WoOB) | ![]() |
The following incidents are related to the ones above, but "cross the line". They include incidents where it was not "security research", but rather activity that was considered a crime by current laws (at the time). Instead of following a more ethical approach or going the route of responsible disclosure, the researcher chose to research and disclose the details in a manner that was questionable. While the threat of law suit of such activity is frivilous to most, the companies are being prudent because the researcher in question likely did break laws in the process.
When | Company making threat | Researchers | Research Topic | Resolution/Status |
2010-08-23 | n/a | Hari Prasad, Netindia | Voting Machine vulnerability research | ![]() |
2008-09-12 | Carleton University | Mansour Moufid | Used keylogger to expose student information | ![]() |
2006-04-28 | University of Southern California | Eric McCarty | Database programming error allows disclosure of student SSN and more | ![]() |
2003-08-18 | Tornado Development, Inc. | Bret McDanel | Secure Webmail Session Hijacking discovery | ![]() |
2002-03-18 | Harris County District Court | Stefan Puffer | Insecure wireless network discovery | ![]() |
Over the years, many talks have been cancelled for various reasons. Sometimes, the rumor of legal threats dominate the venue and/or news, but never happened. This table will list such events, to help clarify what happened. As time allows, any case of a security talk being cancelled will be added.
When | Company making request or threat | Researchers | Research Topic | Resolution/Status |
2012-10-19 | Hewlett-Packard | Kurt Grutzmacher | Huawei / H3C router vulnerabilities | Grutzmacher coordinated disclosure via US-CERT in August. Days before Toorcon 2012, HP sent a polite request for him to cancel, saying patches were not ready. Grutzmacher cancelled his talk. Two days later, HP released the patch, casting doubt over their intention behind the request. |
2012-10-10 | (none) | Pirate Bay founders Peter Sunde and Fredrik Neij | Talk titled "Data is Political" | Neij's lawyer advised his client not to travel to a highly visible public conference centered on hacking. Sunde was reportedly too ill to travel. |
2012-07-29 | (unknown) | Sergey Gordeychik / Denis Baranov, Positive Technologies | SCADA vulnerabilities including Siemens | The talk "SCADA Strangelove: How I Learned To Start Worrying And Love The Nuclear Plants" was cancelled a week before the conference and replaced with a different SCADA talk by another person not affiliated with Positive Technologies. No confirmation as to why, speculation is the talk was pulled due to vendor pressure. |
2012-01-31 | Smart Grid Meter Vendor (unnamed) | Don Weber / InGuardians | Smart Grid Vulnerabilities | Was asked to pull talk from ShmooCon 2012, complied. Presented later at BSidesLV 2012. |
2011-08-16 | (none) | Riley Hassel / Shane Macaulay | Google Android Vulnerabilities | BlackHat Briefings Las Vegas 2011 Hassel/Macaulay scheduled to give "Hacking Android for Profit" talk at BlackHat Briefings Las Vegas 2011. Neither presenter showed for their talk. Subsequent articles point out that Google said "The identified bugs are not present in Android", and that the presenters backed out in "fear criminals would use it attack Android phones". In another work, Hassel said "that some of their work may have replicated previously published research, and they wanted to make sure they properly acknowledged that work." |
2011-05-18 | Siemens / Department of Homeland Security (DHS) | Dillon Beresford / NSS Labs | SCADA vulnerabilities | TakeDownCon 2011 talk titled "Chain Reactions - Hacking SCADA" was cancelled by Beresford after concerns from Siemens/DHS were expressed. Beresford said "DHS in no way tried to censor the presentation." |
2010-07-15 | Taiwanese / Chinese agencies (unnamed) | Wayne Huang, Armorize CTO | Analysis of China's government-backed hacking initiatives | Talk pulled from BlackHat Briefings 2010 in Las Vegas, announced by Caleb Sima, Armorize CEO on Twitter. An earlier version of the talk was given to a small conference in Taiwain in 2007. |
2010-06-29 | ATM Vendors (unnamed) | Raoul Chiesa | ATM Vulnerabilities | Initial reports said that Chiesa was threatened by ATM vendors and forced to cancel last minute. according to Chiesa, no threats were made. The talk was cancelled for "logistical issues that day". Some in the industry have classified this as a publicity stunt, to garner more attention for the talk at a subsequent date. |
2009-06-30 | ATM Vendors (unnamed, presumed Triton) | Barnaby Jack / Juniper Networks | ATM Vulnerabilities | BlackHat Briefings Las Vegas 2009 talk cancelled by Juniper after ATM vendor expressed concerns about disclosure before customers were fully protected. Information published at BlackHat 2010. |
2008-07-02 | Apple | Unamed 'Apple Insiders' | Apple Security Response Team | According to Trey Ford, BlackHat general manager, a panel of Apple insiders were to have a panel to discuss "the company's security-response team". When Apple's marketing department heard, the panel was abruptly cancelled. |
Finally, the Electronic Frontier Foundation maintains a Takedown Hall of Shame that is related to this topic.
Copyright 2008-2015 by Attrition.org. Permission is granted to quote, reprint or redistribute provided the text is not altered, and appropriate credit is given.