Attacks/Breaches
4/29/2014
01:40 PM
Connect Directly
RSS
E-Mail
50%
50%

AOL Subscriber Data Stolen: You've Got Pwned

Change passwords and security questions now, AOL warns subscribers. For everyone else, treat all emails from AOL addresses with suspicion.

Warning to AOL users: Beware a security intrusion that resulted in the theft of subscribers' information, and don't click on links or attachments in any suspicious-looking emails.

That warning was sounded Monday by AOL's security team, which said in a security update that third-party digital forensic investigators hired by the company found "unauthorized access to information regarding a significant number of user accounts." The information accessed by attackers "included AOL users' email addresses, postal addresses, address book contact information, encrypted passwords, and encrypted answers to security questions that we ask when a user resets his or her password, as well as certain employee information."

The theft of contact information from AOL subscribers means that anyone who receives an email that appears to be from an AOL email address should treat it as suspicious, until proven otherwise.

What should AOL users do now in response to the breach? "We suggest you take some routine security precautions," said Internet for Dummies author John R. Levine in a blog post. "Specifically, we recommend that you change your postal address, phone number, employer, date of birth, and spouse. Oh, and you might as well change your password, too."

The breach is a further reminder that people should never reuse the same password on multiple sites. In the wake of the AOL breach, accordingly, "if you were using the same password for any other online account -- which is, as we have discussed many times before, very bad practice -- then you need to change those passwords too," said independent computer security analyst Graham Cluley in a blog post.

"And it's not just passwords that you have to worry about," he added. "AOL says that address books have also been accessed, which means that online criminals now know who you are friends with, and how to contact them -- making it easy for them to create convincing scam emails or attempt to send out phishing campaigns."

While an AOL "you've got mail" email address today may lack its 90s cachet, last year the company said that 2.5 million people still subscribe to one of its services. "[I'm] bemused by people who say they're surprised AOL is still around," said Cluley via Twitter. "They're the company who bought TechCrunch and the Huffington Post."

AOL said the breach seems to be tied to the flood of spam that appeared to emanate from AOL's servers last week. "We believe that spammers have used this contact information to send spoofed emails that appeared to come from roughly 2% of our email accounts," AOL said. But the company said the emails weren't actually sent via its servers or subscribers' accounts. Instead, it said attackers used contact information stolen from AOL subscribers and spoofed the email addresses to make it appear as if they'd originated from the AOL subscriber.

What about the encrypted data stolen by attackers? AOL also said that to date, there's "no indication that the encryption on the passwords or the answers to security questions was broken." But an AOL spokeswoman, contacted via email, wasn't immediately able to comment about how exactly the stolen information was encrypted. As some past breaches have highlighted -- for example at LinkedIn -- not all businesses implement what information security experts would describe as "minimal standards" for implementing password encryption.

Furthermore, now that attackers have managed to obtain the AOL subscriber data tranche, they can attempt to crack it offline. That means that attackers may gain access to -- or may have already accessed -- people's security questions and answers, which would create problems of the variety to which Levine alluded.

"Looks like I'll have to ask my mother to change her maiden name again," said Virus Bulletin editor Martijn Grooten via Twitter. "Awkward."

Mathew Schwartz is a freelance writer, editor, and photographer, as well the InformationWeek information security reporter. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mathew
50%
50%
Mathew,
User Rank: Apprentice
5/1/2014 | 5:02:03 AM
Re: AIM?
Great question. I'm not an AOL user, but according to the company's website, AIM users can sign into their account using their AOL password. So the short answer is: Yes.

In terms of bigger-picture questions about exactly what type of encryption (and if password hashes were salted, and so on) AOL might have used, AOL has yet to provide those details. (Stay tuned.)
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
4/30/2014 | 4:27:33 PM
Re: AIM?
I'm waiting for further information on the real extension of the data breach. I'm afraid that the number of affected accounts could be impressive, in this case let's be prepared for a series of further attacks which will exploit the stolen/spoofed identities.

Regards
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
4/30/2014 | 4:20:47 PM
AIM?
Mat, was AIM also affected by this breach?
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-4448
Published: 2014-10-22
House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.