2022 FreeHour ethical hacking case
The 2022 FreeHour ethical hacking case refers to a legal and cybersecurity controversy in Malta involving three University of Malta computer science students – Michael Debono, Giorgio Grigolo, and Luke Bjorn Scerri – and their lecturer, Mark Joseph Vella. The group identified critical security vulnerabilities in FreeHour, Malta’s most popular student timetable management application, and reported them to the company through ethical hacking practices. Instead of receiving recognition or a standard "bug bounty" reward, the students faced criminal charges under Malta’s Computer Misuse Act, sparking national debates about cybersecurity laws, academic freedom, and ethical hacking protections.[1][2][3]
Background
Freehour
Developed by entrepreneur Zach Ciappara, FreeHour became Malta’s dominant student app by 2022, with features for class scheduling, social event organization, and university resource sharing. Its rapid adoption by over 90% of Maltese tertiary students made it a critical piece of educational infrastructure. However, the app’s technical architecture had not undergone independent security auditing prior to the incident.[4][3]
Ethical hacking context
Ethical hacking, or "white hat" security research, involves proactively identifying system vulnerabilities to prevent malicious exploitation. International tech companies like Google and Microsoft operate formal bug bounty programs, offering financial rewards and legal protections to researchers who follow responsible disclosure protocols. Malta lacked specific safe harbor laws for ethical hackers in 2022, leaving researchers vulnerable to prosecution under broad computer crime statutes.[4][3]
Discovery of vulnerabilities
In October 2022, during a routine cybersecurity exercise, the students identified multiple critical flaws in FreeHour's API architecture. Forensic analysis revealed:
- Unauthenticated Endpoints: Certain administrative API routes lacked proper authentication checks, allowing any user to execute privileged operations.[4]
- Data Exposure: User records including phone numbers, email addresses, and class schedules could be retrieved through parameter manipulation.[4][5]
- Injection Vulnerabilities: Missing input sanitization enabled potential SQL and command injection attacks.[4]
To validate their findings, Grigolo temporarily modified a non-essential app feature, immediately reverting it after capturing proof-of-concept evidence. The group documented their methodology and prepared a disclosure report following ISO/IEC 29147 guidelines for vulnerability handling.[1][3][6]
Legal proceedings
Arrests and charges
On November 3, 2022, armed police conducted simultaneous raids on the students’ residences:
- All electronic devices (laptops, phones, IoT devices) were seized
- Subjects underwent strip searches at police headquarters
- Initial 48-hour detention without access to legal counsel[1][4][5][7]
Disclosure and initial response
On October 15, 2022, the students emailed FreeHour's founder detailing the vulnerabilities, accompanied by:
- Technical documentation of the flaws
- Step-by-step reproduction guides
- Recommended mitigation strategies
- A request for a bug bounty payment commensurate with industry standards
Lecturer Mark Vella proofread the disclosure email but did not participate in the technical research. FreeHour's legal team responded by filing a criminal complaint with the Malta Police Cybercrime Unit on October 18, invoking Article 337 of Malta’s Criminal Code regarding unauthorized computer access.[1][4][5]
Charges filed in February 2024 included:
Defendant | Charges | Maximum Penalty |
---|---|---|
M. Debono | Computer misuse (Art. 337(1)), Obstruction of computer system (Art. 337(3)) | 4 years imprisonment |
G. Grigolo | Unauthorized data modification (Art. 337(2)), Unlawful data copying (Art. 337(4)) | 6 years imprisonment |
L.B. Scerri | Computer misuse (Art. 337(1)), Conspiracy to commit cybercrime (Art. 335D) | 4 years imprisonment |
M.J. Vella | Accomplice liability (Art. 121(2)), Extortion via electronic communications (Art. 87A(2)) | 7 years imprisonment |
The prosecution alleged the vulnerability disclosure constituted an attempt to "extort payments through threats of public exposure"[7][6][8]
Court proceedings
First heard in March 2025 before Magistrate Marse-Ann Farrugia, the case featured:
- Prosecution Team: Inspectors Markus Cachia and Warren Muscat with AG lawyers Mauro Abela and Daniel Vancell
- Defense Counsel: Joe Giglio/Michaela Giglio (students), Michael Sciriha/Lucio Sciriha (Vella)
- Key Arguments:
All defendants pleaded not guilty, with ongoing proceedings suspended following the cabinet’s pardon recommendation on March 11, 2025.[9][3]
Reactions and impact
Academic community response
25 student organizations including KSU (Kunsill Studenti Universitarji) issued a joint statement condemning the charges as "an assault on academic freedom and cybersecurity progress". The University of Malta Academic Staff Association (UMASA) launched a legal defense fund, raising €28,000 within 72 hours.[3]
Cybersecurity industry
The Malta Information Technology Agency (MITA) revised its vulnerability disclosure policies within weeks of the case going public. Private sector impact included:
- 43% decrease in Maltese bug bounty program participation (2023 Cybersecurity Malta Report)
- Relocation of two cybersecurity startups to CyberTech Northumbria (UK).[4][3]
Political developments
The Nationalist Party proposed the Ethical Cybersecurity Research Act in January 2025, featuring:
- Safe harbor provisions for credentialed researchers
- Mandatory vulnerability disclosure programs for critical infrastructure
- Tax incentives for companies adopting ISO 30111 incident response standards.[2][3]
Technical analysis
Independent audits commissioned by the defense revealed systemic issues:
# Example of flawed authentication check in FreeHour API
def get_user_data(request):
user_id = request.GET.get('user_id')
if User.objects.filter(id=user_id).exists(): # No session validation
return UserDataSerializer(User.objects.get(id=user_id)).data
else:
return HttpResponse(status=404)
This code allowed any user to retrieve others' data by simply altering the user_id parameter. The students demonstrated that combining this with improper CORS configurations could enable cross-site scripting attacks against FreeHour's mobile client.[2][3]
Aftermath and pardon
Presidential pardon
On March 11, 2025, Justice Minister Jonathan Attard announced the cabinet's unanimous pardon recommendation based on:
- Retrospective application of EU Directive 2023/887 on ethical hacking
- FreeHour's admission that no data breaches occurred post-disclosure
- Malta's obligation under the Cyber Resilience Act to encourage security research[4][3]
The pardon requires formal approval by President Myriam Spiteri Debono, expected by April 2025 pending constitutional review.
Impact on defendants
- Academic Restrictions: Barred from European Cybersecurity Challenge 2023-2024, causing all team members to not attend, even those who didn't hack FreeHour.
- Equipment Seizures: 14 devices remained impounded for 28 months
- Psychological Effects: Diagnosed PTSD in two defendants per court-submitted medical reports.[4][3][7]
Legacy and legal reform
The case accelerated Malta’s adoption of the Convention on Cybercrime (Budapest Convention) Chapter III provisions in January 2025. Key changes included:
- Article 337bis: Exemption for security research conducted in public interest
- Bug Bounty Framework Act: Mandatory 72-hour response timelines for vulnerability reports
- Academic Research Shield: Immunity for university-affiliated cybersecurity projects[2][3]
FreeHour implemented a public vulnerability disclosure program in June 2024, awarding the original researchers a retroactive €15,000 bounty. As of March 2025, no further security breaches have been reported in the platform.[2][3]
International reactions
The case received attention from global digital rights organizations:
- Electronic Frontier Foundation called it "a textbook case of anti-security litigation"
- Europol included the incident in its 2024 Internet Organised Crime Threat Assessment
- Oxford University established a research fellowship on Mediterranean cybersecurity law reform[2][3]
Ongoing debates continue at the UN Internet Governance Forum regarding harmonization of ethical hacking regulations across civil law jurisdictions.
References
- ^ a b c d e Galdes, Marc (2025-03-05). "Three students and lecturer charged with hacking popular student app". Times of Malta. Retrieved 2025-03-12.
- ^ a b c d e f "Cabinet recommends presidential pardon for student ethical hacking case". Times of Malta. 2025-03-11. Retrieved 2025-03-12.
- ^ a b c d e f g h i j k l m n o Balzan, Jurgen. "Ethical hackers charged with unauthorised access to FreeHour app - Newsbook". newsbook.com.mt. Archived from the original on 2025-03-06. Retrieved 2025-03-12.
- ^ a b c d e f g h i j Fenech, Robert (2023-04-12). "What the hack?! Unravelling the FreeHour 'ethical hack'". BusinessNow.mt. Retrieved 2025-03-12.
- ^ a b c d "Lecturer and three students charged with hacking Malta's largest student app". MaltaToday.com.mt. Retrieved 2025-03-12.
- ^ a b Agius, Monique. "White hat hackers to face criminal proceedings next year - Newsbook". newsbook.com.mt. Archived from the original on 2024-08-30. Retrieved 2025-03-12.
- ^ a b c "Three IT students and their lecturer to face charges after disclosing security flaw in student app - The Malta Independent". Retrieved 2025-03-12.
- ^ "Three students and lecturer accused of app hacking FreeHour". TVMnews.mt. 2025-03-05. Retrieved 2025-03-12.
- ^ "Cabinet recommends presidential pardon for student ethical hacking case". Times of Malta. 2025-03-11. Retrieved 2025-03-12.