The State of Hacked Accounts 69
Orome1 writes "Most users get hacked at high rates even when they do not think they are engaging in risky behavior, with 62% unaware of how their accounts had been compromised, The results of a Commtouch survey presenting statistics on the theft, abuse and eventual recovery of Gmail, Yahoo, Hotmail and Facebook accounts, shows that less than one-third of users noticed their accounts had been compromised, with over 50% relying on friends to point out their stolen accounts. Also, more than two-thirds of all compromised accounts are used to send spam and scams, which is not surprising, as cybercriminals can improve their email delivery rates by sending from trusted domains such as Gmail, Yahoo, and Hotmail, and enhance their open and click-through rates by sending from familiar senders."
Lower limits. (Score:3)
These are lower limits: consider the large but unknown number of users who are not and never will be aware that their accounts have been cracked. Then there are the billions of abandoned accounts...
Re: (Score:3)
Define "bs free stuff". Hotmail peaked years ago, but gmail is extremely popular for good reason and yahoo is also very heavily used. And of the probably dozen or so email addresses I have, they're ALL powered by gmail (even though only one of them is actually @gmail.com). Technically two of them are paid, but that's beside the point. I've dealt with having my own mail server. It sucks. And it's not like it's the service's fault that people choose crappy passwords.
Re: (Score:3)
In fact Gmail now has cellphone based authentication too, which is pretty much safe unless the attacker is specifically targeting you. But people who'll use it are the same who use good passwords, so not much is gained.
Re: (Score:3)
"I've dealt with having my own mail server. It sucks."
Factor in there that most users aren't competent to set up a mail server, however insecure it might be. In fact, online mail is so very popular because most users can't even set up a mail client! Way back, when the internet was much newer, I set up Pegasus Mail for some people. (at that time, Outlook seemed to be the number one vector for virus/worm infections) They thought I was some kind of genius, based on the ability to set up a client! Had I sugg
Re: (Score:2)
trusted domains such as hotmail and yahoo? (Score:5, Funny)
WTF happened while I was napping?
Re: (Score:2)
Actually, I trust Yahoo and Hotmail slightly more than GMail... on our servers, @gmail.com has a default block on it, because the percentage of mail from that domain that is NOT spam is in the low single digits. It all went down hill when they stopped requiring invitations to join, and crashed when the success rate in mechanically breaking their CAPTCHA registration got over 10%, so it became ridiculously simple to generate thousands of real accounts a day.
Throw in the @gmail addresses that arrive via Yahoo
This will never end (Score:4, Insightful)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
More than users who won't use strong passphrases, I have a problem with sites that don't allow them. E.g. limiting the password to a maximum of 8 characters, all of which must be alphanumeric. Or requiring that you answer one of a limited number of fixed "security questions".
Re:This will never end (Score:4, Insightful)
Or requiring that you answer one of a limited number of fixed "security questions".
who cares what the question is, just put in an unguessable answer that you make up, that way no amount of personal knowledge about you can give it away
snake
Re: (Score:2)
who cares what the question is, just put in an unguessable answer that you make up
Of course, and that's what I do. But still, it's another attack vector. And I bet many people actually put in easily guessable answers.
Re: (Score:2)
Of course, and that's what I do. But still, it's another attack vector. And I bet many people actually put in easily guessable answers.
Worse than that, they put in the truth. In this age of social networking, it is trivial to find out a maiden name, a date of birth, a child's name, a first school etc.
Re:This will never end (Score:5, Insightful)
Doesn't matter in context. You're bitching about the wrong problem for the article.
Most of the time when a web based email account gets cracked it isn't that you set your password to "password". Instead it's that you logged in from a compromised machine, and someone got ahold of your actual password, whether it's "fido" or "1xe34v3tsAad". There's a damn good reason I don't check my email anywhere other than devices I know are clean.
(Had something like what TFA describes happen to someone I know; it took her forever to realize that what had transpired was that she'd checked gmail on a coworker's computer and said coworker had been grossly lax in terms of safety. When a scan was run on the box for the first time ever it returned over a hundred bits of malware, some of it serious. The coworker, incidentally, was a private secretary to a lawyer, so this was a "holy shit" moment if ever there was one.)
Think about it for a moment and you'll see why the perpetrators use malware and/or social engineering rather than, say, a dictionary attack; there's nothing google, facebook or yahoo can do about it. They can easily limit the number of login attempts, encrypt usernames and passwords, reject really common passwords during account creation, etc, but if some third party gets the correct password from an infected PC, then when they log in it will appear legitimate.
That isn't to say you shouldn't bother with strong passwords, but if you think having a strong password protects you from everything, you're fooling yourself. The solution here also requires security software and education about admin privileges and trusted vs. untrusted sources for "free" software as it's the likeliest vector for infection (presupposing for a moment that the user needs a windows box, and frankly half the time the answer to that is "yes" for a number of reasons).
Re: (Score:3)
I was pretty disappointed that TFA didn't offer any suggestions to best practices to prevent hacking, or even suggest how a user might determine if they were compromised. It was just a moment for everyone reading the article to feel aloof and point their fingers at all the plebes under them.
I've been using Google's 2 Step Authentication for a few months, and HTTPS since it was offered and feel pretty secure about the security of my Google login, but if someone hijacked my account, I don't think I would rea
Re: (Score:1)
Re:This will never end (Score:5, Interesting)
I use a different random 20 character Password for EVERY website and service I use (thank you lastpass!).
Last week, google told me my account needed to be verified, after a mobile phone in korea logged into my account. (I also use Firefox or chrome on linux). Only thing I can think of was that there was some sort of XSS (since I keep myself logged into gmail) on either a website my linux box visited, or my android phone. I'm leaning towards the phone, since I use gmail over https on linux.
Re:This will never end (Score:5, Informative)
I work for Google on anti-hijacking and account security. The message you saw is very common. The cause is that there was an attempt to abuse your account to spam your friends. One of the popular tools that does this identifies itself to Gmail as various types of mobile phone, which is why it shows up as such in your account history. In fact, it's a regular program that runs on the desktop. No XSS involved.
In this case, it sounds like we detected the hijacking attempt, rejected the spam, sent your account to phone verification and forced you to choose a new password. This is a standard procedure for when we detect a hijack attempt at mail send time. We're getting better at stopping these attempts at login time using heuristics, so it'll become less common in future.
Re: (Score:2)
Oblig... (Score:2)
Re: (Score:1)
1, 2, 3, 4... that's the password an idiot would use on their luggage!
Re: (Score:2)
People just don't care enough about it to inconvenience themselves with strong authentication, how many of our mothers use their dog's name, in all lowercase, as their password on every single one of their accounts?
When we design systems that a substantial portion of our intended users can't or won't use as we intend, then the problem is us, not them.
Systems like online banking, email, ordering books and movies online, etc. . . . these are intended for the general public. As such, they must be designed for the average user to be able to use safely and easily. We cannot fall back on the premise that if the user doesn't know how, then he shouldn't be using it. That's not okay for these sorts of products and systems. It'
Duh. The sites themselves have no security. (Score:5, Interesting)
When you have websites like Facebook that, by default, use unencrypted HTTP and a trivially sniffable session cookie for their authentication, there's really nothing a user can do to protect themselves. (Okay, now they offer HTTPS, but that wasn't always the case.)
The problem with HTTPS, of course, is that it is seriously heavyweight. Most content doesn't need encryption; it just needs authentication. For those sites, SSL is serious overkill.
What this really points out is the desperate need for a standard mechanism of authentication that is not based on cookies, but rather nonce-based, similar to the way digest authentication works, but integrated with web pages so it doesn't feel ugly and bolted on. Until we get that, there's really no point in users bothering to secure their accounts. Why choose a strong password when you're basically sending it back and forth on the Internet equivalent of a postcard?
Re:Duh. The sites themselves have no security. (Score:5, Insightful)
Can we get past this already? SSL is not heavyweight, and has not been for years. It's a couple percent of overhead*. Most authentication systems are going to have significantly more overhead than turning on SSL, since they'll be most likely hitting the filesystem or a database to retrieve session information on top of the actual code logic that goes into authentication.
I agree that an authentication system tied more tightly into the browser would be of great value, but it won't happen anytime soon if ever. See: IE6. Hell, even Safari is updated quite infrequently (and even then mostly just security patches, not feature releases), never mind the plethora of mobile browsers floating around these days. That also solves a completely different problem than SSL. There's no getting around the fact that in order to have hijack-proof sessions, all of the authentication data - whether in the form of a session cookie or some new, novel mechanism - needs to be sent encrypted. Not necessarily SSL, but that's more or less a solved problem so why not? I also quite like the idea of nobody knowing what URLs I'm hitting.
* Excluding the time spent tracking down that one damn analytics script that's pulling in a tracking pixel over http and making browsers throw up all over the place
Re: (Score:2)
http://noscript.net/ [noscript.net] If it's not from the trusted domain, it doesn't get run. Ever.
Re: (Score:3)
Im not sure that HTTPS qualifies as "seriously heavyweight". A Pentium4 processor can handle about 400mbit/sec of AES SSL-- lets assume this is the home computer. Rendering the HTML, running scripts, and handling the flash content would comprise a far bigger portion of the CPU usage than perhaps 1meg of SSL'd traffic.
On the server side, you can right now get a $250 Xeon E3 1220L, using ~20watts, which can handle ~13gbit/second of AES traffic (with the AES-NI extensions). If thats not sufficient, you can
Re: (Score:3)
The sustained data rate is not the heavyweight part, it's the heaviness of building a session. With most web services it's the transaction throughput that's important. The problem is magnified by the number of transactions needed for a single page load on modern sites.
Hacked (Score:3)
Re: (Score:1)
My point? They're not very bright.
Trusted? (Score:2)
Hotmail? I think I block anything from there. That's spammer haven as far as I'm concerned.
Re: (Score:2)
Trust. An email which comes from an account you've already sent email to is often not labeled as spam since it's assumed you trust it. Not to mention that some people actually believe the person sent it instead of a bot (think "Hey, check out these pics" type of spam)
Re: (Score:2)
IT departments do it too (Score:3)
MMO Accounts? (Score:2)
I'd be interested to know some statistics regarding MMO accounts.
Like bank and money-transfer accounts, game accounts can be converted into cash. Sometimes quite a bit of cash -- prime accounts on some MMOs can be liquidated for hundreds or even thousands of dollars sometimes. But unlike "real money" services, law enforcement has little interest -- in either the criminal or the MMO company -- since in their eyes, it's just a game.
Often, the operating company itself has little interest. As an example, con
Re: (Score:2)
I used to have a World of Warcraft account, I use gmail as my primary email service. One thing that happened to me is that about 8 months after I stopped playing WoW I get a lot of weird emails overnight. the last one bothered me the most. "From the Gmail team" or something to that effect, what it boiled down to is that some one in China had accessed my email through "unknown means" and managed to get my passwords and account information for WoW then they proceeded to have like 12 demo's of WoW, I changed m
Hacked (Score:2)
This would've been much more interesting if you would've posted it as CmdrTaco.
Seldom used accounts get hijacked. (Score:2)
A few people I know have had email accounts hijacked by spammers. In each case, it was a purely Web-based email service, the user used a weak password, and the user didn't notice the account had been hijacked until told by others, because the user seldom used the account.
On the whole, that makes this seem like a minor nuisance, not a crisis. Remind people to use strong passwords, and consider closing disused email accounts.
Re: (Score:2)
Apple Stores (Score:5, Funny)
Imitation Watches at Replica Watches (Score:2, Funny)
Imitation Watches at Replica Watches
TOP grade Replica Watches of high quality at wholesale prices!
Join the wise shoppers to let your dreams come true.
BEST deals of imitation watches plus FREE shipping!
*PLEASE NOTE*
You are receiving this email because you or some one with your email has subscribed in our website.We have No aim of spamming and at any time if you want to stop receiving email from us,Just use the unsubscribe button At the end of the email,But you will Lose out our Special offers and Make money
Third party websites (Score:1)
Bad article is factually wrong or just bad? (Score:2)
"Most users get hacked at high rates even when they do not think they are engaging in risky behavior,"
'Most users' do not get hacked. Therefore this article's very first statement is total nonsense. What the article meant to say is either;
"Users get hacked at high rates even when they do not think they are engaging in risky behavior,"
or
"Of Users who have been hacked, most do not think they are engaging in risky behavior,"
What "at high rates" means is a mystery that isn't explained in the article. There
Idle accounts (Score:2)
Check all your accounts once in a while to look for suspicious behavior.
I have a facebook account that was hijacked by someone that I believe is going after the same girl. And then the account was being to sent lewd messages and materials. By the time I discovered it was too late. It has been four years since then and I still having trouble for reconciliation.
"Log-in with" is a major source of this problem (Score:1)
I've been hacked twice, and it's because of these websites that feature a "log in with that have code to intercept your credentials. Either the website operator does it deliberately or the site has been backed to siphon the information.
So much fun spending an afternoon deleting spammy comments from my Twitter account because of this. It won't happen again -- when I visit a site that only allows login through another provider, poof I'm outta there.
Re: (Score:1)
Oh how I dislike the Slashdot comment parsing :-)
What I posted there referred to sites that have a log-in-with (Twitter, FB, etc). :-)