Palin's 'Hacker' Tells How He Did ItHacker claiming to have broken into Republican VP candidate Sarah Palin's Yahoo email account reportedly used low-tech research and a little social engineering
So how did someone manage to hack Sarah Barracudas email account?
Word got out late yesterday that Republican vice presidential hopeful Sarah Palins personal Yahoo mail account ([email protected]) had been hacked, with some screenshots of messages and photos of her family posted on WikiLeaks.org and, later, gawker.com. Just whodunnit remains unclear, but details of just how the hack was executed have been emerging today -- and it was embarrassingly and eerily simple.
Palins Yahoo account had been in the limelight this week after reports that she had used her personal email account to conduct official state government business.
Initially, the Anonymous group, best known for its online protests against the Church of Scientology, was pegged with the hack, but the group has since posted a message on its site denying its involvement. The latest word is that it may have been a one-man effort, according to a Wired.com post. The person claiming to have executed the hack said in a post (which has since been removed) on the 4chan bulletin board site that he used Wikipedia to get Palins birthdate, her ZIP code, and then Googled for information for her security question -- where she met her husband -- in an effort to trick Yahoo into reassigning her password.
Her password was reportedly changed to popcorn, according to the Associated Press report.
Security experts say Yahoos forgot-my-password" service was basically fooled into giving up Palins account to the attacker. Once he got enough information to go on and pose as Palin, he could easily grab control of her email account.
This is much bigger than Web-based email insecurity. This is the inherent danger of the current hype around cloud-based computing. There is no cloud, just a lot of fog around the security and privacy vulnerabilities surrounding online data of all kinds. Email, office collaboration, everything," says Randy Abrams, director of technical education for Eset.
If it is online, it is available 24x7 for an attacker to attempt to access, Abrams says. Download and remove messages from the server is what I recommend, if you have anything you don't want to be public.
Meanwhile, the FBI and Secret Service are investigating the hack. The alleged hacker appeared worried in his post that by hiding behind only a single anonymous proxy service, he could eventually be exposed. Investigators reportedly plan to speak with the operator of that service, who told the AP he plans to turn over any information from his logs that may be helpful to the case.
Kelly Jackson Higgins, Senior Editor, Dark Reading
Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio