Attacks/Breaches
2/5/2013
06:51 AM
Tim Wilson
Tim Wilson
Quick Hits
50%
50%

Twitter Hack Is A Cautionary Tale, Experts Say

Sophisticated attack on Twitter points up need for better detection, better authentication

Twitter's disclosure of a breach affecting some 250,000 users is a warning to enterprises that they need to rethink their malware detection and authentication strategies, experts say.

The social networking giant revealed in a blog post that it had discovered a data compromise potentially exposing approximately 250,000 users' account information to the eyes of a sophisticated attacker.

Twitter did not say exactly how the attackers compromised the data, but it did say that it discovered the exploit when it "detected unusual access patterns" that allowed it to track down the breach. The exploit may have enabled attackers to access usernames, email addresses, session tokens, and encrypted/salted versions of passwords, the company said.

As a precaution, Twitter reset passwords and revoked session tokens for the users' accounts, notifying them by email of the need to change their passwords.

Twitter did not attribute the attack to China, which is suspected in a recent series of media hacks, but an analysis by Internet data tracking company PeerReach indicates that top media figures may have been among the targets.

"This attack was not the work of amateurs, and we do not believe it was an isolated incident," the Twitter blog states. "The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked. For that reason we felt that it was important to publicize this attack while we still gather information."

Several security monitoring companies, including Vigilant, said they detected the attacks. "Although details of entry have not been made public, based on Vigilant's threat intelligence monitoring, we have observed that the motivation was to harvest email address for future spam use," said Lance James, chief scientist at Vigilant, in a statement.

"Multiple emails came through this weekend from victim accounts through bulk mailers, and when contacted, the victims indicated their Twitter account was on the list and that they had also received the email address from their Twitter account," James said. "When passwords were similar, or the same, the attackers used them as a stepping stone to further access email accounts associated with the hack."

Although some of the affected users were frustrated that the attack was not detected sooner, some security experts were encouraged by the fact that Twitter detected it at all. During the past few years, most of the victims studied in the Verizon Data Breach Incident Report found out about their breaches from third parties, rather than discovering it themselves.

"The fact that Twitter detected it quickly and took action is a step in the right direction," says Vinnie Liu, managing partner of security firm Stach & Liu.

But Srinivas Kumar, CTO and co-founder of security startup TaaSERA, says enterprises need to get better at malware detection.

Kumar says there is a need "to provide more visibility at the Web tier for security stakeholders to detect and mitigate risks. Single sign-on, infected access devices, and compromised Web sites together weaken the security posture for Internet-based commerce. We have seen an uptick in this type of activity recently. This is an increasing trend for attacks because it can be used for spam and identity fraud."

Interestingly, Twitter has posted a job advertisement seeking an individual who will help the social networking giant implement two-factor authentication. Experts say they expect the company to follow Google and other leading sites that are now enabling users to protect their identities by authenticating themselves with a step that goes beyond passwords, such as a phone call.

"I think that's something we're going to see from a lot of the major players going forward," says Liu, who has written extensively about passwords and authentication. "When data compromises start to affect their revenue streams, such as we've seen with the gaming sites recently, there's real motivation to increase the sophistication of their access beyond simple passwords."

And if social networks begin to use two-factor authentication as a matter of course, enterprises are likely to follow, Liu says. "Depending on the type of data they are trying to protect, they may not end up using the same second factor, but I think we'll see it becoming more of the norm," he says.

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
2/7/2013 | 6:28:23 AM
re: Twitter Hack Is A Cautionary Tale, Experts Say
Yup completely i agree with this post...But how thi smay be happned..-ácarelessly-áor what?
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.