Mastercard DNS error went unnoticed for years
Bug bounty platforms and disclosure dynamics
- Many commenters criticize Bugcrowd and HackerOne as serving corporate PR more than security, enabling delay, gaslighting, and silencing of researchers.
- Concern that “platform behavior standards” are being used to police activity off-platform and intimidate researchers.
- Some say they’ve largely given up on “responsible disclosure” programs due to low/no rewards, reclassification as “not a bug,” and heavy process overhead.
- A minority note that some vendor-run programs (e.g., large tech firms) work relatively well and keep researchers in the loop.
Mastercard incident: severity and response
- Strong disagreement with Mastercard’s claim that there was “no risk.”
- Technical arguments that DNS control of the typo domain could have enabled TLS certificate issuance, traffic interception, phishing, and API/gateway impersonation.
- A few point out the company’s statement is likely heavily lawyered and may hinge on narrow definitions of “our systems.”
- Several see the public disclosure, after private attempts, as appropriate and possibly the only way to prompt a fix.
DNS, subdomain takeover, and cloud misconfigurations
- Discussion broadens to dangling DNS and cloud resource problems: domains or subdomains pointing to cloud resources (S3, Azure, Vercel, Heroku, email providers) that have been released and can be re-claimed by attackers.
- Researchers report this class of issue is widespread in large organizations and often dismissed as “out of scope” in bug bounty rules, despite clear exploitability.
- Some argue DNSSEC and better tooling/alerting (e.g., detecting unregistered or lame name servers) would have mitigated or surfaced the error, though DNSSEC adoption is described as low.
Incentives, liability, and legal questions
- Repeated theme: companies prioritize reputation and short-term market perception over honest security communication.
- Suggestions include heavy regulatory fines, third‑party validation authorities, or legal frameworks entitling researchers to compensation, but feasibility and optics (extortion vs. reward) are debated.
- Several note the legal risk to researchers in some jurisdictions pushes them either to silence or to immediate public disclosure, bypassing bug bounty NDAs.
Broader anecdotes and attitudes
- Multiple stories of other banks, postal services, card issuers, and big tech firms ignoring or mishandling reports.
- Frustration that companies may be harsher toward good‑faith researchers than toward their own internal failures.
- Some optimism that individual, competent researchers can still prevent large-scale harm when they act at the right time.