Marc Andreessen, co-founder and general partner of Andreessen Horowitz, speaks during the TechCrunch Disrupt San Francisco 2016 Summit in San Francisco, California, U.S., on Tuesday, Sept. 13, 2016.

Researcher finds flaw in a16z website that exposed some company data

Marc Andreessen, co-founder and general partner of Andreessen Horowitz, speaks during the TechCrunch Disrupt San Francisco 2016 Summit in San Francisco, California, U.S., on Tuesday, Sept. 13, 2016.

Image Credits: David Paul Morris/Bloomberg / Getty Images

At the end of June, a security researcher found a vulnerability in a web app used by a16z, one of the most powerful and influential Silicon Valley venture capital firms, which exposed some data about the firm’s portfolio companies. The bug has since been fixed. 

On June 30, a security researcher who goes by xyzeva wrote on X that she was looking for someone from a16z to reach out, hinting that she had found a security issue.

“Get in touch, now. its bad. security related,” she wrote.

When reached by TechCrunch, xyzeva said that she found “a really simple bug” that “basically gave access to everything” on a16z portfolio portal. More specifically, she said that she found exposed API keys on the site portfolio.a16z.com. xyzeva said that the information she was able to see included: emails, passwords, and “company details and employees.” Also, she added, she could have sent emails as a16z and access previously sent emails from the company’s account with Mailgun, an email delivery service. 

In a statement to TechCrunch, Bryan Green, the chief information security officer at a16z, confirmed that the company fixed the bug on the same day xyzeva wrote the post and got in touch with the company, but said that the issue didn’t affect any sensitive data. 

“On June 30th, a16z addressed a misconfiguration in a web app that is used for the specific use case of updating publicly available information on our website such as company logos and social media profiles. The issue was resolved quickly and no sensitive data was compromised,” said Green. “We remain committed to collaborating with the security community on ethical disclosures and will continue to do so through responsible means.”

In a text conversation seen by TechCrunch, where xyzeva inquired about a bug bounty program — a way for security researchers to get rewarded for their findings — a company employee told her that the firm doesn’t provide one. “However, after we complete the analysis I’m very happy to try to set something up specifically for you in this case,” the employee said. 

Days later, however, the employee told xyzeva that “unfortunately, there are a couple of things getting in the way,” according to another text exchange seen by TechCrunch. 

“First, there’s the disclosure method. Posting that there was a serious issue publicly meant that potential attackers likely scanning our sites to search for the issue, which increased risk for us unnecessarily and is outside the norm of how vulnerability disclosures are performed,” said the employee. “Second, the follow-up post that incorrectly described ‘full access to basically everything’ and promised a write-up didn’t signal the best intentions to the team. If any of this is being misunderstood, please let me know.”

It’s not uncommon for security researchers to disclose their findings when the vulnerability or issue is fixed and no longer at risk.

As of this writing, the portal where xyzeva found the issue is not available. “This application is being deprecated,” read a message on the site. 

Over the years, a16z has invested in several well-known companies like Airbnb, Coinbase, Instacart, Lyft, and Slack, among many others. The firm’s founders Marc Andreesen and Ben Horowitz have recently said that they are supporting Donald Trump in the upcoming presidential elections. 

Wikipedia's mobile website finally gets a dark mode

Wikipedia

Image Credits: Wikipedia

Half a decade ago, a ton of apps started to implement a dark mode. This included YouTube, Twitter, Facebook, Hulu and WhatsApp. Apple and Google began offering a systemwide dark theme for their mobile operating systems in 2018. Wikipedia has finally caught up and has started implementing dark mode for its website in 2024.

If you visited the Wikipedia website on mobile in July, you might have seen a pop-up indicating that dark mode is ready for prime time. Here is how you can turn it on mobile:

Go to Wikipedia’s site.Tap on the hamburger menu on the top.Tap on Settings.Under the Color section, select “Dark” as the option.

Wikipedia says under the Colors tab that this is an experimental implementation, and you might experience some issues in dark mode.

What the Wikipedia website looks like in dark mode on the mobile web.
Image Credits: Screenshot by TechCrunch

In August 2024, Wikipedia finally rolled out dark mode to the desktop site. Here is how you can turn it on:

Go to Wikipedia’s site.Click on the appearance menu, which has a specs icon.Select the “Dark” options under the “Color” section.

What the Appearance menu looks like on Wikipedia’s desktop site. Image Credits: Screenshot by TechCrunch

This story originally published July 12 and was updated August 8 with more information.

Wikipedia's mobile website finally gets a dark mode

Wikipedia

Image Credits: Wikipedia

Half a decade ago, a ton of apps started to implement a dark mode. This included YouTube, Twitter, Facebook, Hulu and WhatsApp. Apple and Google began offering a systemwide dark theme for their mobile operating systems in 2018. Wikipedia has finally caught up and has started implementing dark mode for its mobile website in 2024.

If you visited the Wikipedia website on mobile this week, you might have seen a pop-up indicating that dark mode is ready for prime time. Here is how you can turn it on:

Go to Wikipedia’s site.Tap on the hamburger menu on the top.Tap on Settings.Under the Color section, select “Dark” as the option.

Wikipedia says under the Colors tab that this is an experimental implementation, and you might experience some issues in dark mode.

What the Wikipedia website looks like in dark mode on the mobile web.
Image Credits: Screenshot by TechCrunch

Currently, dark mode is only available on mobile websites. However, a Reddit user said that people using the site via desktop might see this option sometime this month. We’ll update the story when the dark mode option becomes available on Wikipedia’s desktop site as well.

Researcher finds flaw in a16z website that exposed some company data

Marc Andreessen, co-founder and general partner of Andreessen Horowitz, speaks during the TechCrunch Disrupt San Francisco 2016 Summit in San Francisco, California, U.S., on Tuesday, Sept. 13, 2016.

Image Credits: David Paul Morris/Bloomberg / Getty Images

At the end of June, a security researcher found a vulnerability in a web app used by a16z, one of the most powerful and influential Silicon Valley venture capital firms, which exposed some data about the firm’s portfolio companies. The bug has since been fixed. 

On June 30, a security researcher who goes by xyzeva wrote on X that she was looking for someone from a16z to reach out, hinting that she had found a security issue.

“Get in touch, now. its bad. security related,” she wrote.

When reached by TechCrunch, xyzeva said that she found “a really simple bug” that “basically gave access to everything” on a16z portfolio portal. More specifically, she said that she found exposed API keys on the site portfolio.a16z.com. xyzeva said that the information she was able to see included: emails, passwords, and “company details and employees.” Also, she added, she could have sent emails as a16z and access previously sent emails from the company’s account with Mailgun, an email delivery service. 

In a statement to TechCrunch, Bryan Green, the chief information security officer at a16z, confirmed that the company fixed the bug on the same day xyzeva wrote the post and got in touch with the company, but said that the issue didn’t affect any sensitive data. 

“On June 30th, a16z addressed a misconfiguration in a web app that is used for the specific use case of updating publicly available information on our website such as company logos and social media profiles. The issue was resolved quickly and no sensitive data was compromised,” said Green. “We remain committed to collaborating with the security community on ethical disclosures and will continue to do so through responsible means.”

In a text conversation seen by TechCrunch, where xyzeva inquired about a bug bounty program — a way for security researchers to get rewarded for their findings — a company employee told her that the firm doesn’t provide one. “However, after we complete the analysis I’m very happy to try to set something up specifically for you in this case,” the employee said. 

Days later, however, the employee told xyzeva that “unfortunately, there are a couple of things getting in the way,” according to another text exchange seen by TechCrunch. 

“First, there’s the disclosure method. Posting that there was a serious issue publicly meant that potential attackers likely scanning our sites to search for the issue, which increased risk for us unnecessarily and is outside the norm of how vulnerability disclosures are performed,” said the employee. “Second, the follow-up post that incorrectly described ‘full access to basically everything’ and promised a write-up didn’t signal the best intentions to the team. If any of this is being misunderstood, please let me know.”

It’s not uncommon for security researchers to disclose their findings when the vulnerability or issue is fixed and no longer at risk.

As of this writing, the portal where xyzeva found the issue is not available. “This application is being deprecated,” read a message on the site. 

Over the years, a16z has invested in several well-known companies like Airbnb, Coinbase, Instacart, Lyft, and Slack, among many others. The firm’s founders Marc Andreesen and Ben Horowitz have recently said that they are supporting Donald Trump in the upcoming presidential elections. 

A Rajasthan voter standing in queue

Indian state government fixes website bugs that exposed residents' sensitive documents

A Rajasthan voter standing in queue

Image Credits: CHANDAN KHANNA/AFP / Getty Images

An Indian state government has fixed security issues impacting its website that exposed the sensitive documents and personal information of millions of residents.

The bugs existed on the Rajasthan government website related to Jan Aadhaar, a state program to provide a single identifier to families and individuals in the state to access welfare schemes. The bugs exposed the copies of Aadhaar cards, birth and marriage certificates, electricity bills and income statements related to registrants, as well as personal information such as their date of birth, gender and father’s name.

Security researcher Viktor Markopoulos, working for cybersecurity company CloudDefense.ai, found the bugs in the Jan Aadhaar portal in December and asked TechCrunch for help in disclosing to the authorities.

The bugs were fixed last week through an intervention by the Indian Computer Emergency Response Team, or CERT-In.

One of the bugs allowed anyone to access personal documents and information with knowledge of a registrant’s phone number.

The other bug allowed the return of sensitive data because the server was not properly checking the validity of one-time passwords, the researcher explained.

TechCrunch reached out to the Rajasthan government’s Jan Aadhaar Authority on December 22 and followed up a week later, but did not receive a response. TechCrunch subsequently shared the details of the bug with CERT-In, which confirmed on Thursday that the bugs had been fixed.

“This is to inform you that we have received a response from the concerned authority that the reported vulnerability has been fixed,” the agency told TechCrunch. The researcher also confirmed the fix.

TechCrunch reached out again to the Rajasthan government for comment ahead of publication, but we have not heard back.

The state’s Jan Aadhaar portal, which launched in 2019, says it has more than 78 million individual registrants and 20 million families. The portal aims to offer “One Number, One Card, One Identity” to residents in the northern state of Rajasthan for accessing state government welfare schemes. This contrasts with the regular Aadhaar card, available for enrollment to eligible individuals across India and provided by the central government-backed Unique Identification Authority, or UIDAI.

Indian state government fixes website bug that revealed Aadhaar numbers and fingerprints

a patient at a GP practice in Mountmellick, prepares to receive her second dose of the Moderna vaccine from an Army officer with the Irish Defence Forces, at the GP vaccination clinic in the Midlands Park Hotel, Portlaoise

A bug in an Irish government website that exposed COVID-19 vaccination records took 2 years to publicly disclose

a patient at a GP practice in Mountmellick, prepares to receive her second dose of the Moderna vaccine from an Army officer with the Irish Defence Forces, at the GP vaccination clinic in the Midlands Park Hotel, Portlaoise

Image Credits: Brian Lawless / PA Images / Getty Images

Two years ago, the Irish government fixed a vulnerability in its national COVID-19 vaccination portal that exposed the vaccination records of around a million residents. But details of the vulnerability weren’t revealed until this week after attempts to coordinate public disclosure with the government agency stalled and ended.

Security researcher Aaron Costello said he discovered the vulnerability in the COVID-19 vaccination portal run by the Irish Health Service Executive (HSE) in December 2021, a year after mass vaccinations against COVID-19 began in Ireland.

Costello, who has deep expertise in securing Salesforce systems, now works as a principal security engineer at AppOmni, a security startup with a commercial interest in securing cloud systems.

In a blog post shared with TechCrunch ahead of its publication, Costello said the vulnerability in the vaccination portal — built on Salesforce’s health cloud — meant that any member of the public registering with the HSE vaccination portal could have accessed the health information of another registered user.

Costello said the vaccine administration records of over a million Irish residents were accessible to anyone else, including full names, vaccination details (including reasons for administering or refusals to take vaccines), and the type of vaccination, among other types of data. He also found internal HSE documents were accessible to any user through the portal.

“Thankfully, the ability to see everyone’s vaccination administration details was not immediately obvious to regular users who were using the portal as intended,” Costello wrote.

The good news is that nobody other than Costello discovered the bug, and the HSE kept detailed access logs that show there was “no unauthorised accessing or viewing of this data,” per a statement given to TechCrunch.

“We remediated the misconfiguration on the day we were alerted to it,” said HSE spokesperson Elizabeth Fraser in a statement to TechCrunch when asked about the vulnerability.

“The data accessed by this individual was insufficient to identify any person without additional data fields being exposed and, in these circumstances, it was determined that a Personal Data Breach report to the Data Protection Commission was not required,” said the HSE spokesperson.

Ireland is subject to strict data protection laws under the European Union’s GDPR regulation, which governs data protection and privacy rights across the EU.

Costello’s public disclosure marks more than two years since first reporting the vulnerability. His blog post included a multi-year timeline revealing a back-and-forth between various government departments that were unwilling to take claim to public disclosure. He was ultimately told that the government would not publicly disclose the bug as though it never existed.

Organizations are not obligated, even under GDPR, to disclose vulnerabilities that have not resulted in a mass theft or access of sensitive data and that fall outside of the legal requirements of an actual data breach. That said, security is often built off the knowledge of others, especially those who have experienced security incidents themselves. Sharing that knowledge could help prevent similar exposures at other organizations that might otherwise go unaware. This is why security researchers tend to lean toward public disclosure to prevent a repeat of mistakes from yesteryear.