05:55 PM
Connect Directly

Twitter Hack Made Possible By Weak Password

Some 33 high-profile accounts have been compromised, including Fox News, The Huffington Post, Barack Obama, Britney Spears, and CNN's Rick Sanchez.

The security breach at Twitter on Monday was made possible by a weak password.

According to a report filed by Kim Zetter of Wired News, an 18-year-old hacker calling himself GMZ gained access to the account of a Twitter employee on Monday using a dictionary attack program that he created.

Because the Twitter employee's account had access to administrative tools, GMZ was able to access any Twitter member's account by resetting the password.

GMZ told Zetter that he subsequently offered members of an online forum access to Twitter accounts upon request.

Twitter on Monday acknowledged that 33 high-profile accounts had been compromised, including accounts used by Facebook, Fox News, The Huffington Post, Barack Obama, Britney Spears, and CNN's Rick Sanchez.

Twitter said that it had identified the problem and that the company was dealing with it. It advised users to reset their passwords and to make sure that the e-mail address listed their Twitter's account setting area is legitimate.

Dictionary attacks, as the name suggest, are automated login attempts that try every word in the attack program's dictionary. Because this is a well-known attack method, passwords that consist solely of single words, regardless of language, are deemed weak.

Strong passwords, Microsoft suggests, should be at least 14 characters long and should appear to be a random string of characters. The company advises making passwords using the entire keyboard -- uppercase characters, symbols, and numbers -- rather than just lowercase characters. It further recommends selecting a memorable phrase and using the first letters in the words as the basis for a strong password, with symbols like "$" added for increased complexity.

What other security tips should companies know backward and forward? InformationWeek has published an independent analysis on this topic. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

Best of the Web
Dark Reading Radio