Forum Moderators: phranque
Learning Lessons From The "Twitter Hacker" [pcworld.com] Incident
Hacker Croll started by building a profile of his target company, in this case Twitter. Basically, he assembled a list of employees, their positions within the company, and their associated e-mail addresses. After the basic information was accumulated, Croll built a small profile for each employee with their birth date, names of pets, and so on.After Croll had created these profiles, he just went about knocking on doors until one fell down. That's exactly what happened when he did a password recovery process for a Twitter employee's personal Gmail account. Croll discovered that the secondary account attached to this person's Gmail was a Hotmail account. The problem was that Hotmail account had been deleted and recycled due to inactivity -- a longstanding policy on Hotmail. Now, all Hacker Croll had to do was reregister the Hotmail account for himself, go back and do the Gmail password recovery, and then Gmail sent the password reset information straight to the bad guy.
Twitter Hacker Exposes Company Documents [webmasterworld.com]
What type of software would stop a more suave hacker who profiles employees to DATE one?
edit: my point being a two pronged approach is best. Protect your passwords and track anyone who tries to request lost passwords leave a trail that leads back to them (IP tracking, phone verification etc)
So how can you safely retire an old hotmail account? I guess you could try to find all the sites and systems you used with that email. But even then you are likely to forget or miss a few.
Maybe there is an obvious answer, but it is too early in the morning for me. ;-)
that means OFFLINE
You'll need a separate piece of software to keep track of them all
I guess you'd need to protect this though...mother's maiden name, anyone?
For me, the weakest link of this system is likely physical security, as I carry the password database around on a flash drive on my keychain...
For me, the weakest link of this system is likely physical security, as I carry the password database around on a flash drive on my keychain...
Two throughts. I remember a colleague finding a USB drive in a car parking lot. [webmasterworld.com]
What about reliability of the USB drive. Do you have a backup stored safely?
I think that is a perfectly fine policy.
What needs to happen here is that Google, Microsoft, Yahoo, and several other big providers need to come up with an API for each other to check if a username exists. If the username does not exist, then they don't send any email there.
This is a good reason to use strong randomly generated passwords for every site you log into. You'll need a separate piece of software to keep track of them all, but it will stop this sort of thing from happening.
The hacker used email password recovery to have the password sent to him. The strength and randomness of the password, as well as whether or not it was used at another site, were irrelevant.
If any employee has been divorced the ex has ALL information needed to get into anything they like including birth date, social security number etc.
Information that would be quite valuable for convincing a diligent email password recovery interface to email the password, but would not necessarily get them into the target email account in order to retrieve it. There are indeed some websites that will let you reset as password without email confirmation, but they are rare.
What needs to happen here is that Google, Microsoft, Yahoo, and several other big providers need to come up with an API for each other to check if a username exists. If the username does not exist, then they don't send any email there.
The email account/username in question did exist, the hacker (re)created it. Unless you're saying that the above should consider an account name taken if it exists at any of the three? Not gonna happen :-)
The solution for this particular vulnerability seems pretty straightforward: Don't let your employees use web email accounts as their backup email. Everyone gets an ISP email address whether they use it or not and presumably companies like Twitter don't have any employees without internet access.
The hacker used email password recovery to have the password sent to him. The strength and randomness of the password, as well as whether or not it was used at another site, were irrelevant.
I never retain a password that has been mailed to me. I will always go to the site and generate a new one after receiving a password recovery mail.
Prohibiting webmail seems a bit extreme. Just implement a reasonable pattern of regular password updating. You can force users to update their passwords in Google Apps. Perhaps Gmail and other webmail providers should institute a more stringent reconfirmation of a user's ID on a more frequent basis.
Opinion: Top 11 things to learn from Twitter security [computerworld.com]1. Don't be afraid to suspend accounts that present a risk to you and your users.
2. Doing one thing right doesn't make you good at -- does not even mean you understand -- security.
3. Single sign-on should be limited.
4. Sensitive information must be stored internally.
5. Access control must be implemented.
6. Web-based password reset schemes are not appropriate for a corporate environment.
7. Implement misuse and abuse detection.
8. Security must be proactive.
9. You must control your own forensics data.
10. Social networking can cripple an organization.
11. If an idiot can do this, what will a savvy criminal be capable of?
The email account/username in question did exist, the hacker (re)created it. Unless you're saying that the above should consider an account name taken if it exists at any of the three? Not gonna happen :-)
Well, I am saying that the first time it was tried the hacker knew what the account was. During that step, Gmail shouldhave pinged hotmail and and hotmail said the act was doa, so Gmail should have purged that hotmail address from it's system and not allowed it to be used a 2nd time (which is when the pw reset link was sent to the freshly created hotmail act).