Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

AOL Subscriber Data Stolen: You've Got Pwned

Change passwords and security questions now, AOL warns subscribers. For everyone else, treat all emails from AOL addresses with suspicion.

Warning to AOL users: Beware a security intrusion that resulted in the theft of subscribers' information, and don't click on links or attachments in any suspicious-looking emails.

That warning was sounded Monday by AOL's security team, which said in a security update that third-party digital forensic investigators hired by the company found "unauthorized access to information regarding a significant number of user accounts." The information accessed by attackers "included AOL users' email addresses, postal addresses, address book contact information, encrypted passwords, and encrypted answers to security questions that we ask when a user resets his or her password, as well as certain employee information."

The theft of contact information from AOL subscribers means that anyone who receives an email that appears to be from an AOL email address should treat it as suspicious, until proven otherwise.

What should AOL users do now in response to the breach? "We suggest you take some routine security precautions," said Internet for Dummies author John R. Levine in a blog post. "Specifically, we recommend that you change your postal address, phone number, employer, date of birth, and spouse. Oh, and you might as well change your password, too."

The breach is a further reminder that people should never reuse the same password on multiple sites. In the wake of the AOL breach, accordingly, "if you were using the same password for any other online account -- which is, as we have discussed many times before, very bad practice -- then you need to change those passwords too," said independent computer security analyst Graham Cluley in a blog post.

"And it's not just passwords that you have to worry about," he added. "AOL says that address books have also been accessed, which means that online criminals now know who you are friends with, and how to contact them -- making it easy for them to create convincing scam emails or attempt to send out phishing campaigns."

While an AOL "you've got mail" email address today may lack its 90s cachet, last year the company said that 2.5 million people still subscribe to one of its services. "[I'm] bemused by people who say they're surprised AOL is still around," said Cluley via Twitter. "They're the company who bought TechCrunch and the Huffington Post."

AOL said the breach seems to be tied to the flood of spam that appeared to emanate from AOL's servers last week. "We believe that spammers have used this contact information to send spoofed emails that appeared to come from roughly 2% of our email accounts," AOL said. But the company said the emails weren't actually sent via its servers or subscribers' accounts. Instead, it said attackers used contact information stolen from AOL subscribers and spoofed the email addresses to make it appear as if they'd originated from the AOL subscriber.

What about the encrypted data stolen by attackers? AOL also said that to date, there's "no indication that the encryption on the passwords or the answers to security questions was broken." But an AOL spokeswoman, contacted via email, wasn't immediately able to comment about how exactly the stolen information was encrypted. As some past breaches have highlighted -- for example at LinkedIn -- not all businesses implement what information security experts would describe as "minimal standards" for implementing password encryption.

Furthermore, now that attackers have managed to obtain the AOL subscriber data tranche, they can attempt to crack it offline. That means that attackers may gain access to -- or may have already accessed -- people's security questions and answers, which would create problems of the variety to which Levine alluded.

"Looks like I'll have to ask my mother to change her maiden name again," said Virus Bulletin editor Martijn Grooten via Twitter. "Awkward."

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JyotiS948
50%
50%
JyotiS948,
User Rank: Apprentice
11/2/2015 | 3:35:17 AM
computer problems
The information for AOL password recovery contains good content. Anyway I have tried and tested 25dollarsupport.com which has proved the best till date to fix my computer problems . My first preference.
Mathew
50%
50%
Mathew,
User Rank: Apprentice
5/1/2014 | 5:02:03 AM
Re: AIM?
Great question. I'm not an AOL user, but according to the company's website, AIM users can sign into their account using their AOL password. So the short answer is: Yes.

In terms of bigger-picture questions about exactly what type of encryption (and if password hashes were salted, and so on) AOL might have used, AOL has yet to provide those details. (Stay tuned.)
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
4/30/2014 | 4:27:33 PM
Re: AIM?
I'm waiting for further information on the real extension of the data breach. I'm afraid that the number of affected accounts could be impressive, in this case let's be prepared for a series of further attacks which will exploit the stolen/spoofed identities.

Regards
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
4/30/2014 | 4:20:47 PM
AIM?
Mat, was AIM also affected by this breach?
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
'Unkillable' Android Malware App Continues to Infect Devices Worldwide
Jai Vijayan, Contributing Writer,  4/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18375
PUBLISHED: 2020-04-10
The ASG and ProxySG management consoles are susceptible to a session hijacking vulnerability. A remote attacker, with access to the appliance management interface, can hijack the session of a currently logged-in user and access the management console.
CVE-2019-18376
PUBLISHED: 2020-04-10
A CSRF token disclosure vulnerability allows a remote attacker, with access to an authenticated Management Center (MC) user's web browser history or a network device that intercepts/logs traffic to MC, to obtain CSRF tokens and use them to perform CSRF attacks against MC.
CVE-2019-7305
PUBLISHED: 2020-04-10
Information Exposure vulnerability in eXtplorer makes the /usr/ and /etc/extplorer/ system directories world-accessible over HTTP. Introduced in the Makefile patch file debian/patches/debian-changes-2.1.0b6+dfsg-1 or debian/patches/adds-a-makefile.patch, this can lead to data leakage, information di...
CVE-2020-8832
PUBLISHED: 2020-04-10
The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of the kernel before 4.15.0-91.92, an attacke...
CVE-2020-1633
PUBLISHED: 2020-04-09
Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, lea...