Attacks/Breaches
4/24/2013
09:27 AM
50%
50%

Twitter Preps Two Factor Authentication After AP Hoax

Security move follows a rash of high-profile account takeovers, including a hoax tweet from the Associated Press' account about White House explosions.

"Breaking: Two Explosions in the White House and Barack Obama is injured."

So claimed a tweet from The Associated Press account, which counts 1.9 million followers, posted at 1:07:50 p.m. Eastern time Tuesday. Just minutes later, however, new tweets issued from other AP accounts began to deny that report.

But the news still seemed to trigger a downturn in the Dow Jones Industrial Average, and the hoax tweet "briefly erased $200 billion of value" from U.S. stock markets on Tuesday, reported The Wall Street Journal. It said the downturn had been triggered, at least in part, by automated trading systems that use "so-called algorithms that automatically buy and sell shares after scanning news feeds." Those algorithms reportedly reacted to the fake news by waiting to buy new stocks.

In a Tuesday press briefing, White House spokesman Jay Carney confirmed that there had been no explosions, and that the president was safe. "I was just with him," he said. The FBI is reportedly investigating the hoax tweet and related Twitter account takeovers.

[ Is "cyberwarfare" as bad as it sounds? Read Cyber Strikes Like Nuclear Bombs, Says Chinese General. ]

Following the hoax tweet, the AP Tuesday self-reported that "The AP has disabled its other Twitter accounts following the attack."

Tuesday evening, a hacktivist group known as the Syrian Electronic Army claimed credit for the AP account takeovers. "Ops! @AP get owned by Syrian Electronic Army! #SEA #Syria #ByeByeObama" read a tweet posted to the group's @Official_SEA6 Twitter account. The group also claimed credit via its syrianelectronicarmy.com website for takeovers of the @AP and @AP_Mobile accounts.

Interestingly, numerous AP accounts remained suspended as of early Wednesday morning. "It's a bit surprising that 12 hours after the hack, the Twitter account @AP is still suspended," said Mikko Hypponen, chief research officer at F-Secure, via Twitter. But later Wednesday morning, the @AP account was again live.

Other still-suspended accounts included @AP_Mobile, @AP_Fashion, @AP_Images, @AP_NFL, @AP_Country, @AP_Travel and @APStylebook. The delay in AP resuming control of those accounts suggests the news agency is still attempting to identify how attackers seized the accounts, or else remediate all machines that may have been compromised by attackers

The AP has yet to disclose how the attackers compromised its Twitter accounts, but released a statement saying that "the attack on AP's Twitter account and the AP Mobile Twitter account was preceded by phishing attempts on AP's corporate network." It didn't specify if those phishing attacks used malware attached to emails, emails with links to websites that could launch drive-by attacks that attempted to exploit browser vulnerabilities, or both.

But AP spokesman Paul Colford told The New York Times that all of these phishing attacks had been blocked.

In the wake of the White House bomb hoax, Wired reported Tuesday that Twitter is now testing a two-factor authentication system internally and plans to roll it out incrementally to users. The publication cited no source for that information, and said it had learned of no timeline for when such a rollout might begin.

"Until Twitter implements that, you can continue to expect to see high-profile accounts be hijacked with some regularity," said Christopher Budd, threat communications manager at Trend Micro, in a blog post.

A Twitter spokeswoman didn't immediately respond to a request for comment, emailed outside normal business hours, about either the AP account takeovers or reports that the company is beta-testing a two-factor authentication system.

Twitter in February advertised a job for an engineer with expertise in "multifactor authentication and fraudulent login detection," following a watering hole attack that compromised up to 250,000 users' accounts.

Why did the Syrian Electronic Army issue the fake tweet? According to the group's website, its mission includes redressing "the campaigns led by the Arab media and Western on our Republic by broadcasting fabricated news about what is happening in Syria." The group is widely seen as being sympathetic to the regime of Syrian president Bashar al-Assad.

The White House bomb tweet hoax follows the group's takeover in recent days of multiple CBS Twitter accounts, including 60 Minutes, and posting tweets with links to websites that launched drive-by attacks. The group this week also seized multiple accounts relating to worldwide soccer governing body FIFA. Those takeovers followed the group recently taking control of the National Public Radio Twitter feed as well as multiple BBC Twitter accounts.

As of Wednesday morning, the Syrian Electronic Army account @Official_SEA6 had been suspended by Twitter, but the group appeared to have registered @Official_SEA7, which remained active, although had no posts.

What lessons can be learned from the latest Twitter corporate account takeovers? "If you manage a Twitter handle, this underscores the importance of using a strong password, running up-to-date security software, not clicking on links, and being very, very cautious when working with Twitter credentials," said Trend Micro's Budd.

Also beware reusing passwords, which is a widespread practice. According to a study released Tuesday by British communications regulator Ofcom, a survey of 1,805 people over the age of 15 found that 55% "use the same password for most, if not all, websites."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Drew Conry-Murray
50%
50%
Drew Conry-Murray,
User Rank: Ninja
4/24/2013 | 11:35:31 PM
re: Twitter Preps Two Factor Authentication After AP Hoax
The attack is a testament to Twitter's influence, but it's also interesting to see how correctly the social sphere course-corrected.

Drew Conry-Murray
Editor, Network Computing
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.