Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Imperva: Twitter email account hack was multi-vectored but tapped into poor security safeguards

July 2009 by Imperva

The hacking of a Twitter senior executive’s email account was the result of a complex series of events but, says Imperva, the data security specialist, was the end result of a combination of poor security practices and safeguards.

"As expected, the modus operandi of the hacker that emailed the Twitter planning documents to TechCrunch has now been revealed, and it shows that it is possible for a hacker to retrieve an account password for a legitimate user’s cloud-based email service," said Amichai Shulman, Imperva’s chief technology officer.

"If you examine what actually happened, it’s clear that the security system for retrieving an account password in the cloud needs to be every bit as rigorous as a customer calling, for example, their bank and identifying themselves over the phone," he added.

According to Shulman, people using cloud-based services are happy to respond to `secret questions’ such as "your childhood hero", "your pet’s name" and "your mother’s maiden name."

Whilst these answers, he says, are likely to be unique and relatively difficult to guess on a purely random basis, they can often be second guessed by careful observation of a person’s social networking site records, which then paint a very good picture of someone’s likes and dislikes.

"Because of these security shortcomings - which legal professionals may yet argue about in court if Twitter does decide to sue those concerned for publishing the data - the big question is who is to blame for this highly public account hack?"

Is fault of the email service provider or Twitter, or the senior manager concerned? says the Imperva CTO.

Or is it, as we surmise, a combination of circumstances and security failures that have conspired to create the situation?

The reality of the Twitter email account hack, says Shulman, is that the hacker exploited a complex set of security shortcomings to reach his goal of gaining unauthorised access to the documents in question.

"Companies should take note of this risk and plan their security safeguards accordingly. Today, most companies haven’t properly considered the implications of employees using social networking and the information," he said.


See previous articles

    

See next articles