59
The Twitter Attacks Team 8 Glennis Corby Kelsey Francis Kenny Franks Thomas Lester Michael Qin

The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Twitter Attacks

Team 8Glennis CorbyKelsey FrancisKenny FranksThomas Lester

Michael Qin

Page 2: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What happened?

At least two separate password breaking attacks in early 2009

Page 3: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What happened?

33 high-profile Twitter accounts compromised

Prank posts, some including affiliate links

Page 4: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

Who done it?

“GMZ”, a 18-year-old college studentactively hacking for three yearshad used same technique to hack

Miley Cyrus's YouTube accountSelena Gomez's SayNow account

motivated by curiosity of web security

Page 5: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Target

“Crystal”, a popular follower of the Twitter feeds

Page 6: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Used tool to launch dictionary attack

Page 7: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Used tool to launch dictionary attack

“happiness”

Page 8: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Gained access to her employee account administrative accessaccess to any other account

Page 9: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

Hiding the Trail

Forgot to hide his IP address

Page 10: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

Hiding the Trail

Forgot to hide his IP address Posted message to Digital Gangster

offered access to hacked accounts by request

Page 11: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Victims

Highly requested accounts included:Barack ObamaBritney SpearsRick SanchezKevin RoseFacebookCBS NewsFOX News

Page 12: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

Why did the attack succeed?

No rate limit on sign in retry attempts

Page 13: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

Why did the attack succeed?

No rate limit on sign in retry attempts Bad habits

use of weak passwordsreinforced by lack of password restrictions

Page 14: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What was the impact?

Awareness of unlimited sign in attempts vulnerability

Page 15: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What happened in the aftermath?

Bogus messages, lewd comments Links to affiliate sites GMZ's hacked account closed within a few hours

Page 16: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What has changed?

On June 29th, Twitter changed the verify_credentials method of its API to limit the number of requests to 15 per hour

Page 17: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What has changed?

On June 29th, Twitter changed the verify_credentials method of its API to limit the number of requests to 15 per hour ...not implemented until July 15th

Page 18: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What else happened?

Twitter employee email accounts compromised

Sensitive, confidential corporate data published on Internet

Page 19: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

Who done it this time?

“Hacker Croll”, a Frenchman in his early twenties Motivated primarily by

curiosityexplorationinterest in web security

Page 20: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Scoured the web for info on Twitter

Page 21: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Scoured the web for info on Twitter Easily found

list of employeestheir rolestheir email addresses

Page 22: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Tried password recovery on personal Gmail account of Jason Goldman, director of product management

Page 23: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Tried password recovery on personal Gmail account of Jason Goldman, director of product management Gmail hinted at secondary email address to check for reset message:

******@h******.com

Page 24: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Tried password recovery on personal Gmail account of Jason Goldman, director of product management Gmail hinted at secondary email address to check for reset message:

******@hotmail.com

Page 25: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Guessed Hotmail account

Page 26: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Guessed Hotmail account Found it had expired

Page 27: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Guessed Hotmail account Found it had expired Registered expired account

Page 28: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Guessed Hotmail account Found it had expired Registered expired account Reset Gmail password again

Page 29: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Opened new Hotmail account and clicked Gmail password reset link

Page 30: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Opened new Hotmail account and clicked Gmail password reset link

Full access to personal Gmail account of Twitter employee

Page 31: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Searched email for passwords used elsewhere

Page 32: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Searched email for passwords used elsewhere

To: Lazy UserFrom: Super Duper Web ServiceSubject: Thank you for signing up to Super Duper Web Service Dear Lazy User, Thank you for signing up to Super Duper Web Service. For the benefit of our support department (and anybody else who is reading this), please find your account information below: username: LazyUserpassword: funsticks To reset your password please follow the link to.. ahh forget it, nobody does this anyway. Regards,Super Duper Web Service

Page 33: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Changed Gmail password back to the one discovered and waited

Page 34: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Changed Gmail password back to the one discovered and waited Observed normal activity on Gmail account

Page 35: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Changed Gmail password back to the one discovered and waited Observed normal activity on Gmail account

User unaware of compromise

Page 36: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Used same password to sign on to employee's corporate email, hosted by Google Apps

Page 37: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Used same password to sign on to employee's corporate email, hosted by Google Apps Full access to corporate Gmail account of senior Twitter employee

Page 38: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Used same password (again) or“secret question” recovery features to compromise user's other accounts

Page 39: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Used same password (again) or“secret question” recovery features to compromise user's other accounts

AT&TAmazoniTunesMobileMe

Page 40: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Used same password (again) or“secret question” recovery features to compromise user's other accounts

AT&TAmazoniTunesMobileMe

phone logspurchase historycredit card infomore emails

Page 41: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Attack

Used gathered info as jumping-off point to gain access to email accounts of at least three senior Twitter execs

Twitter massively compromised and completely oblivious

Page 42: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Booty

Hundreds of sensitive email attachments

Page 43: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Booty

Hundreds of sensitive email attachments

Effective control of twitter.com domain name

Page 44: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

The Booty

Hundreds of sensitive email attachments

Effective control of twitter.com domain name Enough work and personal info to cause serious headaches

Page 45: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What was the impact?

Embarrassment and potential harm done to Twitter

Page 46: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What was the impact?

Embarrassment and potential harm done to Twitter

Wider awareness of vulnerability of information living in “the cloud”

Page 47: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

Why did the attack succeed?

Bad habitsuse the same password everywherenever change passwords

Page 48: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

“Hacker Croll didn't exploit any software vulnerabilities.

He exploited stupidity.”- Ted Dziuba

Page 49: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

Why did the attack succeed?

Bad habitsuse the same password everywherenever change passwords

“Secret” questions

Page 50: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

“I've used social engineering only, no exploit, no xss vulnerability, no backdoor, np [sic ] sql injection”

- Hacker Croll

Page 51: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

Why did the attack succeed?

Bad habitsuse the same password everywherenever change passwords

“Secret” questions Time and patience of attacker

Page 52: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

Why did the attack succeed?

Bad habitsuse the same password everywherenever change passwords

“Secret” questions Time and patience of attacker Security as an afterthought

Page 53: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What happened in the aftermath?

Confidential documents publicizedexecutive meeting notespartner agreements financial projectionsfloor planssecurity passcodes

Page 54: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

I would like to offer my personal apology to Twitter. I think this company has a great future ahead of it.I did not do this to profit from the information. Security is an area that fascinated me for many years and I want to do my job. In my everyday life, I help people to guard against the dangers of the Internet. I learned the basic rules .. For example: Be careful where you click the files that you download and what you type on the keyboard. Ensure that the computer is equipped with effective protection against viruses, external attacks, spam, phishing … Upgrading the operating system, software commonly used … Remember to use passwords without any similarity between them. Remember to change them regularly … Never store confidential information on the computer …I hope that my intervention will be repeated to show how easy it can be for a malicious person to gain access to sensitive information without too much knowledge. Hacker Croll.

Page 55: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What has changed?

At Twitter, not much

Page 56: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What has changed?

At Twitter, not much

Server password = “password”

Page 57: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

What has changed?

At Twitter, not much

Server password = “password” Similar attacks continue

DNS records compromised by “Iranian Cyber Army” in December

Page 58: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

Relevant book chapter

Chapter 4Passwords as AuthenticatorsAttacks on PasswordsPassword Selection Criteria

Page 59: The Twitter Attacks · The Attack Searched email for passwords used elsewhere To: Lazy User From: Super Duper Web Service Subject: Thank you for signing up to Super Duper Web Service

ReferencesK. Zetter, “Weak Password Brings ‘Happiness’ to Twitter Hacker,” Wired News , January 6, 2009, http://www.wired.com/threatlevel/2009/01/professed-twitt/J. Stay, “With No Notice, Twitter Adds More Limits—Password Trouble Ensues,” Stay N' Alive , July 17, 2009, http://staynalive.com/articles/2009/07/17/with-no-notice-twitter-adds-more-limits-password-trouble-ensues/K. Parrish, “Digital Gangster Takes Credit for Twitter Attacks,” Tom's Guide , January 7, 2009, http://www.tomsguide.com/us/Twitter-Hacked-DMZ-Dictonary-Attack,news-3259.htmlR. McMillan, “Hacker: I Broke Into Twitter,” PC World , May 1, 2009, http://www.pcworld.com/businesscenter/article/164182/hacker_i_broke_into_twitter.htmlN. Cubrilovic, “The Anatomy of the Twitter Attack,” TechCrunch , July 19, 2009, http://www.techcrunch.com/2009/07/19/the-anatomy-of-the-twitter-attack/M. Arrington, “In Our Inbox: Hundreds Of Confidential Twitter Documents,” TechCrunch , July 17, 2009, http://www.techcrunch.com/2009/07/14/in-our-inbox-hundreds-of-confidential-twitter-documents/R. Wauters, “Another Security Tip for Twitter: Don’t Use ‘Password’ as Your Server Password,” TechCrunch , July 15, 2009, http://www.techcrunch.com/2009/07/19/the-anatomy-of-the-twitter-attack/T. Dziuba, “Twitter docs hack exploits stupidity vuln,” The Register , July 20, 2009, http://www.theregister.co.uk/2009/07/20/dziuba_twitter_hack/R. Adhikari, “‘Cyber Army’ Attacks Twitter, Iran Green Movement Site,” TechNewsWorld , December 18, 2009, http://www.technewsworld.com/story/68938.html?wlc=1263931570N. Cubrilovic, “The Anatomy of the Twitter Attack: Part II,” TechCrunch , December 18, 2009, http://www.techcrunch.com/2009/12/18/anatomy-twitter-attack-2-dns-iran/