Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:50 AM

5 Ways To Solve The Password Reset Problem

Apple, Amazon, and other vendors need to come up with better ways to safeguard accounts against social engineering attacks. But users must help.

Technology companies and retailers that sell goods and services to consumers--including cell phone plans, books and music, online file-storage lockers, and cloud-based collaboration software--have a password security problem.

The nature of the problem was highlighted by the recent hack of technology journalist Mat Honan, who saw his laptop, tablet, and smartphone get remotely wiped by an attacker--dubbed "Phobia"--who was trying to keep Honan from regaining access to the three-letter Twitter account ("mat") that Phobia hacked for fun.

In today's ultra-connected digital world, Honan's fatal information security flaw was to have left a single point of failure--a Gmail account tied to an iCloud account--that Phobia was able to compromise. True, Phobia first socially engineered Amazon into providing the information he needed to impersonate Honan with Apple (name, address, and last four digits of the credit card on file), before resetting passwords and "owing" Honan's digital life.

But this security issue isn't limited to the companies that featured in that life hack of Honan. "Everyone is pointing the finger at Amazon and Apple, saying it's a big security hole, they need to make changes. But I don't look at it that way--if it's a security hole, it affects a lot more companies than Amazon," says the threat intelligence manager for Trustwave SpiderLabs, who goes by "Space Rogue," speaking by phone. Indeed, most companies will reset users' passwords by phone, provided you know a user's name, address, and the last four digits of their on-file credit card number. Most banks, meanwhile, require the last four digits of a person's social security number, instead of their credit card.

[ Get more good advice. Read 8 Ways To Avoid Getting Your Life Hacked. ]

Given that lackluster state of consumer identity verification, here are five must-have password security practices that every company and consumer should practice:

1. Deploy background-verification security checks.

To make it more difficult for social engineers to successfully impersonate consumers, more companies have been validating people's identity by asking such questions as, "Which of the following five addresses is associated with your name?"

Such security checks are enabled via services that first comb publicly available information to find "digital fingerprints" that are likely associated with a specific person. One such service is RSA Identity Verification, which RSA bills as "dynamic, knowledge-based authentication to validate user identities and reduce the risk of identity impersonation and fraud."

2. Employ "do it yourself" secret questions.

Too many businesses ask people the same questions: mother's maiden name, or the name of their first school, town in which they were born, or favorite pet. Why not shake things up? "My cell phone company, if I call up AT&T, and ask to make a change to my account, they ask for a secret password--they have a password they asked for when I created my account that's 'secret' and which I provided when I first set up the account," says Space Rogue.

3. Resets trigger massive warnings.

Want to change your password? Then the service in question should blast a password-reset warning to every device you own. "Ideally, before resetting a password by phone, they'd send a forced 'Find My'-style push alert to all registered devices on the account saying something like, "Apple Customer Service has received a request to reset your iCloud password. Please call 1-800-WHATEVER within 24 hours if this is unauthorized," says Marco Arment, the co-founder of Tumblr, in a blog post. As that suggests, he also recommends that anyone who wants to rest a password by phone be made to wait 24 hours, to give ample time to alert potential victims.

4. Consumers: Use lots of different credit cards.

One way that Phobia was able to successfully hack Honan was thanks to Honan having used the same credit card at Apple and Amazon. By seeing the last four digits of the card--displayed by Amazon, when users access their account--Phobia was then able to provide it to Apple to authenticate himself as Honan. "If the card [Honan] stored with Amazon didn't match the card stored with Apple, the attack would have stopped here," says Rob Sobers, technical manager at Varonis Systems, via email. To help prevent such attacks, he says, "you could dedicate a single purpose credit card for Apple."

"Personally I use a different credit card and email address at Paypal, Amazon, and Apple," says Trustwave's Space Rogue. "It isn't foolproof but it does make things more difficult."

5. Consumers: Enable two-factor Gmail authentication.

While Gmail featured in the hack of Honan, he notably didn't have two-factor authentication turned on. But if he had, it would likely have blocked the attacker. In fact, Space Rogue specifically recommends that all Gmail users employ their accounts for any services that are tied to bank or credit card accounts, such as Amazon or online banking, thanks to the added security. "Use Gmail as the address for any accounts that can access money and turn on the free two-factor authentication they offer," he says. Also don't forget to use different passwords for every one of those sites too.

But too many sites--including Amazon and Apple--still don't offer two-factor authentication. While it's not a silver bullet, it would be better than the current username and password protection both sites offer.

Amazon and Apple are both reportedly revisiting their password-reset practices, but many more companies will have to pursue similar changes to protect their customers from "life hack" attacks. Beyond the above five recommendations, what should all businesses be doing--or doing better--to safeguard consumers' identities?

One of the biggest challenges facing IT today is risk assessment. Risk measurement and impact assessment aren't exact sciences, but there are tools, processes, and principles that can be leveraged to ensure that organizations are well-protected and that senior management is well-informed. In our Measuring Risk: A Security Pro's Guide report, we recommend tools for evaluating security risks and provide some ideas for effectively putting the resulting data into business context. (Free registration required.)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
8/1/2013 | 4:31:22 PM
re: 5 Ways To Solve The Password Reset Problem
Apple has improved security practices. Two-factor authentication is now available so this article is technically inaccurate. See this FAQ for more information: http://support.apple.com/kb/HT...
User Rank: Apprentice
8/24/2012 | 12:27:27 PM
re: 5 Ways To Solve The Password Reset Problem
Email password resets in my opinion need to be authenticated. When someone wants to reset their password, the site should have a form of 2FA where the person receives by SMS a one-time password that they use to telesign into their account to reset the account password. That way if their secondary email has been compromised the hacker will not be able to gain control without the OTP. I use Two-Factor Authentication across a lot of my accounts. I feel a lot more secure when I can telesign into my account. If you have that option available to you use it, it is worth the time and effort to have the confidence that your account won't get hacked and your personal information isn't up for grabs. I'm hoping that more companies start to offer this awesome functionality. This should be a prerequisite to any system that wants to promote itself as being secure.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-26
An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related command...
PUBLISHED: 2020-10-26
This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands.
PUBLISHED: 2020-10-26
A remote unauthenticated arbitrary code execution vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.
PUBLISHED: 2020-10-26
The HPE BlueData EPIC Software Platform version 4.0 and HPE Ezmeral Container Platform 5.0 use an insecure method of handling sensitive Kerberos passwords that is susceptible to unauthorized interception and/or retrieval. Specifically, they display the kdc_admin_password in the source file of the ur...
PUBLISHED: 2020-10-26
SSMC3.7.0.0 is vulnerable to remote authentication bypass. HPE StoreServ Management Console (SSMC) is an off node multiarray manager web application and remains isolated from data on the managed arrays. HPE has provided an update to HPE StoreServ Management Console (SSMC) software* U...