Attacks/Breaches
4/24/2013
09:27 AM
50%
50%

Twitter Preps Two Factor Authentication After AP Hoax

Security move follows a rash of high-profile account takeovers, including a hoax tweet from the Associated Press' account about White House explosions.

"Breaking: Two Explosions in the White House and Barack Obama is injured."

So claimed a tweet from The Associated Press account, which counts 1.9 million followers, posted at 1:07:50 p.m. Eastern time Tuesday. Just minutes later, however, new tweets issued from other AP accounts began to deny that report.

But the news still seemed to trigger a downturn in the Dow Jones Industrial Average, and the hoax tweet "briefly erased $200 billion of value" from U.S. stock markets on Tuesday, reported The Wall Street Journal. It said the downturn had been triggered, at least in part, by automated trading systems that use "so-called algorithms that automatically buy and sell shares after scanning news feeds." Those algorithms reportedly reacted to the fake news by waiting to buy new stocks.

In a Tuesday press briefing, White House spokesman Jay Carney confirmed that there had been no explosions, and that the president was safe. "I was just with him," he said. The FBI is reportedly investigating the hoax tweet and related Twitter account takeovers.

[ Is "cyberwarfare" as bad as it sounds? Read Cyber Strikes Like Nuclear Bombs, Says Chinese General. ]

Following the hoax tweet, the AP Tuesday self-reported that "The AP has disabled its other Twitter accounts following the attack."

Tuesday evening, a hacktivist group known as the Syrian Electronic Army claimed credit for the AP account takeovers. "Ops! @AP get owned by Syrian Electronic Army! #SEA #Syria #ByeByeObama" read a tweet posted to the group's @Official_SEA6 Twitter account. The group also claimed credit via its syrianelectronicarmy.com website for takeovers of the @AP and @AP_Mobile accounts.

Interestingly, numerous AP accounts remained suspended as of early Wednesday morning. "It's a bit surprising that 12 hours after the hack, the Twitter account @AP is still suspended," said Mikko Hypponen, chief research officer at F-Secure, via Twitter. But later Wednesday morning, the @AP account was again live.

Other still-suspended accounts included @AP_Mobile, @AP_Fashion, @AP_Images, @AP_NFL, @AP_Country, @AP_Travel and @APStylebook. The delay in AP resuming control of those accounts suggests the news agency is still attempting to identify how attackers seized the accounts, or else remediate all machines that may have been compromised by attackers

The AP has yet to disclose how the attackers compromised its Twitter accounts, but released a statement saying that "the attack on AP's Twitter account and the AP Mobile Twitter account was preceded by phishing attempts on AP's corporate network." It didn't specify if those phishing attacks used malware attached to emails, emails with links to websites that could launch drive-by attacks that attempted to exploit browser vulnerabilities, or both.

But AP spokesman Paul Colford told The New York Times that all of these phishing attacks had been blocked.

In the wake of the White House bomb hoax, Wired reported Tuesday that Twitter is now testing a two-factor authentication system internally and plans to roll it out incrementally to users. The publication cited no source for that information, and said it had learned of no timeline for when such a rollout might begin.

"Until Twitter implements that, you can continue to expect to see high-profile accounts be hijacked with some regularity," said Christopher Budd, threat communications manager at Trend Micro, in a blog post.

A Twitter spokeswoman didn't immediately respond to a request for comment, emailed outside normal business hours, about either the AP account takeovers or reports that the company is beta-testing a two-factor authentication system.

Twitter in February advertised a job for an engineer with expertise in "multifactor authentication and fraudulent login detection," following a watering hole attack that compromised up to 250,000 users' accounts.

Why did the Syrian Electronic Army issue the fake tweet? According to the group's website, its mission includes redressing "the campaigns led by the Arab media and Western on our Republic by broadcasting fabricated news about what is happening in Syria." The group is widely seen as being sympathetic to the regime of Syrian president Bashar al-Assad.

The White House bomb tweet hoax follows the group's takeover in recent days of multiple CBS Twitter accounts, including 60 Minutes, and posting tweets with links to websites that launched drive-by attacks. The group this week also seized multiple accounts relating to worldwide soccer governing body FIFA. Those takeovers followed the group recently taking control of the National Public Radio Twitter feed as well as multiple BBC Twitter accounts.

As of Wednesday morning, the Syrian Electronic Army account @Official_SEA6 had been suspended by Twitter, but the group appeared to have registered @Official_SEA7, which remained active, although had no posts.

What lessons can be learned from the latest Twitter corporate account takeovers? "If you manage a Twitter handle, this underscores the importance of using a strong password, running up-to-date security software, not clicking on links, and being very, very cautious when working with Twitter credentials," said Trend Micro's Budd.

Also beware reusing passwords, which is a widespread practice. According to a study released Tuesday by British communications regulator Ofcom, a survey of 1,805 people over the age of 15 found that 55% "use the same password for most, if not all, websites."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Drew Conry-Murray
50%
50%
Drew Conry-Murray,
User Rank: Ninja
4/24/2013 | 11:35:31 PM
re: Twitter Preps Two Factor Authentication After AP Hoax
The attack is a testament to Twitter's influence, but it's also interesting to see how correctly the social sphere course-corrected.

Drew Conry-Murray
Editor, Network Computing
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3407
Published: 2014-11-27
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888.

CVE-2014-4829
Published: 2014-11-27
Cross-site request forgery (CSRF) vulnerability in IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allows remote attackers to hijack the authentication of arbitrary users for requests tha...

CVE-2014-4831
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to hijack sessions via unspecified vectors.

CVE-2014-4832
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to obtain sensitive cookie information by sniffing the network during an HTTP session.

CVE-2014-4883
Published: 2014-11-27
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?