G-Archiver Harvesting Google Mail Passwords 462
Thwomp writes "It appears that a popular Gmail backup utility, G-Archiver, has been harvesting users' Gmail passwords. This was discovered when a developer named Dustin Brooks took a look at the code using a decompiler. He discovered a Gmail account name and password embedded in the source code. Brooks logged in and found over 1,700 emails all with user account information — with his own at the top. According to a story in Informationweek, he deleted the emails, changed the account password, and notified Google. The creator of G-Archiver has pulled the software, stating that it was debug code and was unintentionally left in the product."
This is why I backup my Gmail with G-Archiver (Score:5, Funny)
Re: (Score:2)
Re:This is why I backup my Gmail with G-Archiver (Score:5, Insightful)
Re:This is why I backup my Gmail with G-Archiver (Score:5, Insightful)
Re:This is why I backup my Gmail with G-Archiver (Score:5, Insightful)
The upshot of this case is that the app in question was written with
Re:This is why I backup my Gmail with G-Archiver (Score:4, Insightful)
Re:This is why I backup my Gmail with G-Archiver (Score:5, Insightful)
Re:This is why I backup my Gmail with G-Archiver (Score:5, Funny)
Re:This is why I backup my Gmail with G-Archiver (Score:5, Insightful)
Re:This is why I backup my Gmail with G-Archiver (Score:4, Insightful)
I suppose he could have had the passwords filtered in some way and not noticed the 'folder' (or whatever gmail has) filling up.
Re:This is why I backup my Gmail with G-Archiver (Score:5, Insightful)
Re:This is why I backup my Gmail with G-Archiver (Score:5, Insightful)
Does it really matter which it is? There's no compelling reason to ever use their product, and they've just demonstrated that they can't be trusted. Is it really any better if it's due to ineptness rather than maliciousness?
Re: (Score:3, Informative)
If something is collecting my login information (and thus access to every conversation made using that address), I expect a damn good reason and I expect it before someone else exposes it and potentially gains access to my account and countless others. For that matter, I expect it before the money leaves my hands.
Re:This is why I backup my Gmail with G-Archiver (Score:5, Informative)
Can't remember if strings is part of Microsoft's "Unix tools for Windows" though, but Cygwin32 will do the trick.
Re: (Score:3, Insightful)
I'm failing to see how this is insecure.
Re:This is why I backup my Gmail with G-Archiver (Score:5, Funny)
Arcane trickery to see what the code is doing?
You've obviously never edited someone else's Perl...
Re:This is why I backup my Gmail with G-Archiver (Score:5, Insightful)
Wouldn't help a bit; the good and the bad parts of the software used the same port to the same server in the same way.
Wouldn't help a bit; the good and the bad parts of the software used the same SSL channel, you won't get into that with a normal sniffer.
Wha?!? (Score:5, Informative)
Oh, by the way, you realize that lots of people are paid to audit OSS code before they deploy it in their company, right? The ability to do this is actually a selling point for a lot of companies.
Re: (Score:3, Informative)
Re: (Score:3)
Re: (Score:3, Informative)
And if the firewall software checks to see if it has been modified then alter the firewall software so that it does not perform such a check. Hopefully you see where this is going...
Re: (Score:3, Funny)
So, to continue, why not just make the firewall check itself to make sure it checks if it has been modified?
What could the malware possibly do then?
Re:This is why I backup my Gmail with G-Archiver (Score:5, Informative)
So? Somebody you trust can do it for you. Or, you can trust that there are enough people looking at the code that they'll find any big problems, and that news of these problems will find its way to you. With non-free software, the number of people looking at the code is much smaller.
Re: (Score:3, Insightful)
That holds true if you run around downloading random binaries from random websites (ie. the way your typical Windows user acquires all their software). But hardly anybody who has used an OS with a proper package manager for more
Re: (Score:3, Informative)
How trivial is that to verify if I control both? Depending on the compiler/options you could get some different executables...
Debug, Sure (Score:5, Insightful)
Right. And I have a bridge I'd like to sell you too.
Re:Debug, Sure (Score:5, Funny)
Re: (Score:2, Interesting)
Re:Debug, Sure... Around 1999 I found this out (Score:5, Interesting)
DAMN, I wish I could recall the name. I may
Here we go... I'm PRETTY damned sure it was NetObjects Fusion. Just googled "Year 1999 web building applications intranet web" and they were at the top of the list... I preferred it over front phage, but...
And, now that I Google "Year 1999 protocol analyzer sniffer packet" it seems to refresh my memory that I am PRETTY sure Sniffer Basic was the tool I used.
Of course, after that I never used any such tool on the LAN. But, being formerly in the IT department, and knowing what to look out for to help the company probably kept me out of trouble.
Re: (Score:3, Funny)
I call:
- ms word ms blurb
- access abscess
- excel hexedcell
- x box hexed box
- outlook LOOKOUUUTTT!!!!
- powerpoint powerpointless
But, I'd have to say my faves are abscess and front phage...
Re:Debug, Sure (Score:5, Funny)
Why do you feel the need to hurt the reputation and business of us legitimate bridge sellers?!?
Re:Debug, Sure (Score:5, Funny)
And who among us can honestly say they've never oiled their snake?
Re:Debug, Sure (Score:5, Funny)
Re:Debug, Sure (Score:5, Funny)
He said us, that clearly excludes girls.
Re:Debug, Sure (Score:5, Funny)
Not to be droll (Score:5, Interesting)
I worked at a pet store that did some light animal care, and snakes were some of the animals we treated and kept. The oil was Linatone(tm). It helps snakes shed, and it is lightly anti-biotic and anti-microbial and anti-parasite. (it makes reptiles happy 8-).
So yes, snake oil for oiling snakes...
The /. crowd has no imagination (Score:4, Insightful)
As I read the comments attached to this article, I see that many slashdotters can't imagine why this debug code would be put into the software in the first place.
To those slashdotters: You people have no imagination.
Imagine you're a G-Archiver developer, and one of your customers calls you, saying "Your program doesn't work. It's saying something about an invalid user." In order to reproduce the problem, you ask the customer for his credentials. He tells you his username and password over the phone, and you try logging in yourself. It works fine.
After a while, you think the problem might be that the password being entered is different from the one you were given over the phone. Perhaps it has something to do with the customer's strange keyboard layout, or maybe the customer's keyboard has some flaky keys.
So what do you do? You give that one customer a special build of the software that emails you the username and password as entered.
Later, you accidentally check in the debug code for that special build. Oops.
Re:The /. crowd has no imagination (Score:5, Insightful)
And you don't notice the 1,777 emails piling up in your inbox until someone investigates your code and calls you out on it.
I agree with the others - you interested in buying a bridge?
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
Also, I'm kinda interested in his market. Thunderbird has an option t
A-ha! (Score:4, Interesting)
If it isn't, surely someone had a boner after reading the article and is coding as we speak...
Re:A-ha! (Score:5, Funny)
That doesn't make sense. (Score:5, Insightful)
Re:That doesn't make sense. (Score:5, Insightful)
A developer wanting to collect people's usernames and passwords and realising that since the program talks to gmail already doing so over gmail would make it much less likely to be noticed by people monitoring network connections for "phone home" behaviour, seems the most likely explanation. Of course there mightn't be any malicious intent, just a "cool, look at all the accounts I collected" thing - like those people who get a warez copy of every piece of software ever released without ever actually using any of them...
Hmmm (Score:5, Funny)
Re:Hmmm (Score:5, Insightful)
He tried but it caused an infinite loop.
Trust me, trust me not. (Score:2, Interesting)
Trust me, trust me not, trust me, trust me not.
Oh damn, there goes my password.
Do you believe the developer? What debug code needs to send an email containing user account information?
Re:Trust me, trust me not. (Score:5, Insightful)
This seems to be a clear case of privacy invasion and unauthorized access to private data. And I think that this should have been brought to the attention of the police for further investigation.
In this case the guilty will have time to cover his tracks and hide.
Try this approach the next time you see something as grave as this. The worst thing that can happen if you report it is that the case gets dismissed.
Re: (Score:3, Insightful)
http://www.informit.com/articles/article.aspx?p=102181&seqNum=4 [informit.com]
Re: (Score:3, Interesting)
DMCA (Score:5, Insightful)
Comment removed (Score:5, Insightful)
Re:Even the courts aren't this daft (Score:5, Funny)
Re: (Score:2)
Why would the program need to send the password to anyone at all? It's an email archiver. All it needs to do is log in and pull the email. No need to mail the username/password combination at all.
Re:Even the courts aren't this daft (Score:5, Funny)
Re: (Score:3, Funny)
Re:Even the courts aren't this daft (Score:5, Informative)
So if we really want to avoid having the police hunt us for petty crimes of downloading files - give them something real. :-)
Nice move, but illegal? (Score:5, Insightful)
Re:Nice move, but illegal? (Score:5, Insightful)
Granted, he probably shouldn't have deleted everything and changed the password (morally: yes, legally: no), so it's likely he may face charges because of this. That's our legal system, folks.
Caught (Score:5, Funny)
Re: (Score:2)
How does that work? Are their pants down in(side) the cookie jar, or are they physically standing inside some freak monster cookie jar, with their pants down?
Re: (Score:3, Funny)
Son, I think it's time we talk, man to man. [imdb.com]
Re: (Score:2)
Emailing them to yourself? (Score:2)
yourself -- like many folks do -- man, you are
looking to get punished like this. This is
especially true if you use public terminals.
(I know, I know. Not the same thing. Still...)
Gmail Backups? (Score:3, Interesting)
Re: (Score:2, Informative)
Re: (Score:3, Insightful)
Re:Gmail Backups? (Score:4, Informative)
Re: (Score:3, Insightful)
Redundancy is never a replacement for backups.
http://slashdot.org/article.pl?sid=08/01/25/1535226 [slashdot.org]
Never ascribe to malice (Score:5, Insightful)
Although in this case, that's some serious incompetance going on!
Re: (Score:2)
It could be incompetence in this case
There are plenty of competent, malicious criminals out there. In fact, some of them are called Politicians.
Don't give out passwords (Score:5, Insightful)
And this, children, is why you should never ever give the password to your account to someone else. Not even someone who claims to want to do something for you. Once you've given it to them, you have no control over what they do with it.
Re:Don't give out passwords (Score:5, Insightful)
Re: (Score:3, Insightful)
I was looking at [finally] creating a facebook account the other day. On the account creation page, they have some fields where you supply your webmail address and the password to your webmail account, and it'll automatically look through your address book and find your f
Almost Willing To Believe (Score:2, Informative)
That REALLY doesn't make sense (Score:2, Interesting)
Re:That REALLY doesn't make sense (Score:4, Informative)
Just wondering... (Score:5, Interesting)
So why did the binary program also have the password for the gmail account? One would assume that the email address would have been enough. After all, sending someone email doesn't require their password.
Re: (Score:2)
Re:Just wondering... (Score:5, Informative)
In perspective, this isn't much (Score:2)
I'm really surprised it's sub-2000. Goes to show not many people use it.
Since the password of the email account was changed, it couldn't upload any further data either.
what was that dude's name (Score:2, Interesting)
Re:what was that dude's name (Score:5, Informative)
Re:what was that dude's name (Score:5, Interesting)
His name is Dennis Ritchie (Score:3, Informative)
Backup???? (Score:3, Insightful)
Doesn't look malicious to me (Score:5, Insightful)
Maybe I'm getting old, but this seems like a pretty clear case of "oh crap, I'm an idiot", rather than "mwuahahah, my plan for global domination proceeds apace!". According to the posting on codinghorror, the guy who found the issue (Dustin Brooks) found that the creator, John Terry, of the G-Archiver software had left his own email information in the code. Yes, the G-archiver forwarded a record of the account information of everyone who used the app to that mailbox, but if you look at the screenshot, none of those emails has been flagged as read by gmail (but maybe that's an artifact of a POP connection?).
Either way, this just smacks to me of a novice developer doing something incredibly dumb, rather than incredibly malicious. If he actually wanted to just collect other people's account information, why leave his own in the source code? He could have just as easily forwarded the information to an anonymized email account, or simply an account for which the login information was not present in source.
Just my opinion, I reserve the right to be wrong.Re:Doesn't look malicious to me (Score:4, Insightful)
It's either an honest mistake, or a REALLY poor hack attempt. Unless I've given further information, I'm inclined to think it was an honest mistake.
Adamn
Re: (Score:3, Informative)
Deleted the emails (Score:5, Insightful)
[...]
Google's statement continues. "We are investigating this incident, the underlying activities of which violate Gmail Program Policies. We have suspended the suspect account, and are in the process of notifying the owners of those accounts whose passwords may have been compromised. It's unfortunate that fraudsters continue to use email for these purposes. We have phishing detection capabilities built into Gmail, so we were able to act quickly to limit the impact of this particular attack."
Re:Deleted the emails (Score:5, Insightful)
Your e-mails haven't ever been actually deleted (Score:5, Insightful)
From the GMail Privacy Policy: (which is blessedly short, and in English)
"You may organize or delete your messages through your Gmail account or terminate your account through the Google Account section of Gmail settings. Such deletions or terminations will take immediate effect in your account view. Residual copies of deleted messages and accounts may take up to 60 days to be deleted from our active servers and may remain in our offline backup systems."
SirWired
Re: (Score:3, Insightful)
Why are suprised that when you let someone other than yourself hold onto your data that they can access it even after you can't? Do you know what backups are?
For google, there are a number of reasons why they would want to retain the data, not that I think they should if they tell you its deleted. The amount of example emails they can run new code at to test various perfor
Yet another SCM problem (Score:4, Interesting)
Just a few suggestions:
1) Use source control and know how to use it. Know how to tag releases and when your code is 'frozen' and ready to ship. Communicate.
2) Know how to use your source control to ID recent changes. Review recent changes.
3) At least know how to use diff, for Christ's sake. Diff your code and look for recent changes.
4) Just a thought, you might want to move your soon to be released code to another repository. Just a thought.
5) LART any programmer touching the soon to be released code without communicating or following through (i.e. removing debug code). If the said programmer is a cowboy, move that programmer over to sales.
6) Dare I say it, QA and code reviews. Even short-cycle extreme programming has de facto code reviews in that 2 programmers check each other's work.
As projects get larger and more complex, version control get harder. But a few basic rules can help out.
Malice? Incompetence? (Score:3, Interesting)
If they were all unread, and if the last login on that account was like forever ago, then maybe the developer's story is the truth.
But this is a key example of where open source wins, because most eula's will have a don't decompile clause.
To quote Hanlon's Razor...again. (Score:3, Insightful)
"Never attribute to malice that which can be adequately explained by stupidity"
Although in this case I think stupidity might not be an appropiate term. Unless you have oversight (either peer or some other form) it's quite easy to accidently leave deubugging code in a release. I'll hold my hand up and say I've done it; any programmer who says they haven't done it - or at least something similar - is either delusional, hasn't noticed yet or is a downright liar.
Snow Job (Score:5, Informative)
This is misleading. They should have fully disclosed the problem if they want to re-gain anyone's trust. It wasn't that they "may" have been revealed; they as a matter of fact "WERE" revealed. An admission that their program LOGGED AND TRANSMITTED PASSWORDS TO THE PARENT COMPANY would also have been nice.
An Accident? (Score:3, Insightful)
I don't think this can be justified. You can't "accidentally" harvest account names and passwords. Bells go off in the head when you're writing code that says "create an email, send it to this address, and include the current user's username and password."
Re: (Score:3, Insightful)
Re: (Score:3, Informative)