[Infowarrior] - Twitter Hack Raises Flags on Security

Richard Forno rforno at infowarrior.org
Thu Jul 16 04:07:33 UTC 2009


July 16, 2009
Twitter Hack Raises Flags on Security
By CLAIRE CAIN MILLER and BRAD STONE

http://www.nytimes.com/2009/07/16/technology/internet/16twitter.html?_r=1&pagewanted=print
SAN FRANCISCO — You might think your password protects the  
confidential information stored on Web sites. But as Twitter  
executives discovered, that is a dangerous assumption.

The Web was abuzz Wednesday after it was revealed that a hacker had  
exposed corporate information about Twitter after breaking into an  
employee’s e-mail account. The breach raised red flags for individuals  
as well as businesses about the passwords used to secure information  
they store on the Web.

On Web sites containing personal information like e-mail, financial  
data or documents, there is usually just a user name and password for  
protection. More individuals are storing information on Web servers,  
where it is accessible from any online computer through services  
offered by Google, Amazon, Microsoft, social networks like Facebook or  
back-up services like Mozy.

But password-protected sites are growing more vulnerable because to  
keep up with the growing number of passwords, people use the same  
simple ones on numerous sites across the Web. In a study last year,  
Sophos, a security firm, found that 40 percent of Internet users use  
the same password for every Web site they access.

The attack on Twitter highlights the problem. For its internal  
documents, the company uses the business version of Google Apps, a  
service that Google offers to individuals free. Google Apps provides e- 
mail, word processing, spreadsheets and calendars over the Web.

The content is stored on Google’s servers, which can save time and  
money and enable employees to work together on documents at the same  
time. But it also means that the security is only as good as the  
password. A hacker who breaks into one person’s account can access  
information shared by friends, family members or colleagues, which is  
what happened at Twitter.

The Twitter breach occurred about a month ago, Twitter said. A hacker  
calling himself Hacker Croll broke into an administrative employee’s e- 
mail account and gained access to the employee’s Google Apps account,  
where Twitter shares spreadsheets and documents with business ideas  
and financial details, said Biz Stone, a Twitter co-founder.

The hacker then sent documents about company plans and finances,  
confidential contracts, and job applicants to two tech news blogs,  
TechCrunch, in Silicon Valley, and Korben, in France. There was also  
personal information about Twitter employees including credit card  
numbers.

The hacker also broke into the e-mail account of the wife of Evan  
Williams, Twitter’s chief executive, and from there accessed several  
of Mr. Williams’ personal Internet accounts, including those at Amazon  
and PayPal, Mr. Stone said.

TechCrunch revealed documents showing that Twitter, a private company  
that so far has no revenue, projected that it will reach a billion  
users and $1.54 billion in revenue by 2013. Michael Arrington,  
TechCrunch’s founder, said in an interview that the hacker had also  
sent him detailed strategy documents about potential business models,  
the competitive threat from Facebook and when the company might be  
acquired.

Some analysts say the breach highlights how dangerous it can be for  
people and companies to store confidential documents on Web servers,  
or “in the cloud.”

But Mr. Stone said that the attack “isn’t about any flaw in Web apps,”  
but rather about a bigger issue that affects individuals and  
businesses alike. “It speaks to the importance of following good  
personal security guidelines such as choosing strong passwords,” he  
said.

Instead of circumventing security measures, it appears that the  
Twitter hacker managed to correctly answer the personal questions that  
Gmail asks of users to reset the password.

“A lot of the Twitter users are pretty much living their lives in  
public,” said Chris King, director of product marketing at Palo Alto  
Networks, which creates firewalls. “If you broadcast all your details  
about what your dog’s name is and what your hometown is, it’s not that  
hard to figure out a password.”

Security experts advise people to use unique, complex passwords for  
each Web service they use and include a mix of numbers and letters.  
Free password management programs like KeePass and 1Password can help  
people juggle passwords for numerous sites.

Andrew Storms, director of security operations for nCircle, a network  
security company, suggested choosing false answers to the security  
questions like “What was your first phone number?” or making up  
obscure questions instead of using the default questions that sites  
provide. (Of course, that presents a new problem of remembering the  
false information.)

For businesses, Google allows company administrators to set up rules  
for password strength and add additional authentication tools like  
unique codes.

The Twitter hacker claims to have wanted to teach people to be more  
careful. In a message to Korben, the hacker wrote that his attack  
could make Internet users “conscious that no one is protected on the  
Net.” 


More information about the Infowarrior mailing list