Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Researcher Says Starbucks Threatened Him Over Gift Card Exploit

A security researcher said he found a way to generate unlimited amounts of money on Starbucks gift cards. The coffee company doesn’t seem to be pleased with the way the expert tested his findings.

Starbucks gift cards can be managed by creating an account on starbucks.com. Users can check their balances and transfer funds from one card to another using these accounts.

A security researcher said he found a way to generate unlimited amounts of money on Starbucks gift cards. The coffee company doesn’t seem to be pleased with the way the expert tested his findings.

Starbucks gift cards can be managed by creating an account on starbucks.com. Users can check their balances and transfer funds from one card to another using these accounts.

Russian researcher Egor Homakov of Sakurity identified a race condition vulnerability in the Starbucks website that allowed him to transfer a certain amount of money from one card to another twice by using two different browsers with different session cookies.

The expert acquired three $5 Starbucks gift cards to conduct tests. He exploited the security bug to make two simultaneous $5 transfers from one card to another, which resulted in the recipient card having a $15 balance.

To ensure that the money he obtained using the exploit was real, Homakov used the $5 and the $15 cards to make a purchase at Starbucks. The researcher then deposited $10 from his credit card to avoid legal problems.

Once he made sure that the exploit worked, Homakov attempted to report his findings to Starbucks by sending an email to informationSecurityServices (at) starbucks.com. He sent an email on March 23, but didn’t get a reply until April 29.

“After trying really hard to find anyone who cares, I managed to get this bug fixed in like 10 days,” Homakov explained in a blog post.

Starbucks addressed the vulnerability, but the researcher says the company wasn’t too happy with the way he tested his findings.

Advertisement. Scroll to continue reading.

“The unpleasant part is a guy from Starbucks calling me with nothing like ‘thanks’ but mentioning ‘fraud’ and ‘malicious actions’ instead. Sweet!” Homakov said.

According to the researcher, a malicious actor could have exploited the vulnerability to generate credit on Starbucks gift cards purchased around the world, and then sell them online for Bitcoin at a discount.

“It would easily make me a couple of millions of dollars unless Starbucks actually tracks gift card balances. I don’t know for sure, it’s just a wild guess that this bug could be pretty profitable,” Homakov explained.

Some agree with Homakov’s methods, arguing that he didn’t have malicious intentions and he didn’t cause any damage. Others, however, believe he could have reported his findings without actually using the illegally reloaded card.

The researcher claims he hasn’t violated any Starbucks policy and defended his actions by saying that the coffee giant might have attempted to downplay the seriousness of the issue if he had not demonstrated its impact.

Responsible disclosure controversy

The disclosure and live testing of security vulnerabilities has been a highly controversial topic over the past years. A perfect example is the case of Andrew Auernheimer, also known as “weev,” who was sentenced to prison for obtaining the details of 120,000 AT&T customers while trying to demonstrate the existence of a bug. Auernheimer was released in April 2014 after an appeals court overturned the conviction.

More recently, a researcher named Chris Roberts was questioned by the FBI after the posted a tweet about hacking an airplane. Roberts said he dedicated much of his time to improving aviation security, but authorities claim the researcher actually hijacked an aircraft mid-flight.

HackerOne’s Chief Policy Officer, Katie Moussouris, noted in a blog post last week that current legislation should be revised since it discourages security research by blurring the line between defense and crime.

“It is high time for security research to be protected under the law. The hackers with the skills to break into software and networks, who choose to come forward with their knowledge and share their findings, should be legally exempt from criminal prosecution under laws designed to punish crime,” said Moussouris.

Cybercriminals target Starbucks customers

News broke earlier this month that Starbucks’ mobile application might have been hacked. Many customers who had their Starbucks cards connected to their payment cards through the Starbucks mobile app complained that someone had stolen their money.

Starbucks denied being breached and pointed out that the fraudsters are likely counting on the fact that many users utilize the same username and password combination for multiple online services. The most likely scenario is that the attackers obtain the credentials through phishing attacks or by hacking other websites, and use the stolen data to access Starbucks accounts.

It’s likely that the fraudsters have stolen a lot of money from Starbucks customers since the auto-reload feature, which many people have enabled, ensures that gift cards are reloaded automatically with a certain amount of money when their balance reaches zero.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.