The hacker who stole confidential Twitter documents used a feature of Microsoft's Hotmail to hijack an employee's work e-mail account, the site that has published some of the Twitter documents said Sunday.
According to TechCrunch, the Web site that last week broke the story about the Twitter breach and has posted some of the stolen information, the hacker calling himself Hacker Croll took advantage of poor password practices, Hotmail's inactive account feature and personal information on the Web to pinch hundreds of Twitter documents.
TechCrunch said it convinced Hacker Croll to divulge the details of his attack, and over the course of several days' conversations was able to piece together not only the original breach, but how some information he obtained allowed him to compromise the e-mail accounts of Evan Williams, Twitter's CEO, and one of its co-founders, Biz Stone.
Hacker Croll first jacked the personal Gmail account of a Twitter employee -- last week Stone identified the person as an administrative assistant with the company -- by resetting the account's password. To do that, Hacker Croll had to answer one or more personal questions used to authenticate the user. According to TechCrunch, Hacker Croll had previously researched this employee, and others at Twitter, by digging through the Internet for likely responses.
Security experts last week speculated that the same process used by a Tennessee college student to break into Alaska Gov. Sarah Palin's Yahoo e-mail account was at the root of the Twitter breach.
"[This was] about weak passwords that are easily guessable, with a huge contribution from people's habit of putting online information that they wouldn't otherwise share with anyone but their closest friends," Sam Masiello, vice president of information security at MX Logic said last week in an interview. "It's not hard to crack [password resets] with the information you can find freely available on social networking sites."
At that point, although Hacker Croll had control of the Twitter employee's personal Gmail account, he could not hide his tracks, as the user would have quickly known something was amiss the next time he or she tried to log on to Gmail, and was rebuffed.
"On requesting to recover the password, Gmail informed [Hacker Croll] that an email had been sent to the userÄôs secondary email account," wrote TechCrunch's Nik Cubrilovic. "Gmail offered a hint as to which account the email to reset the password was being sent to, in case the user required a gentle reminder. In this case the obfuscated pointer to the location of the secondary email account was ******@h******.com."
Hacker Croll deduced that the account was on Hotmail, and then attempted to recover the password on that account as well. The Hotmail account was inactive, however -- a Microsoft practice designed to recycle dormant accounts -- which allowed him to register the inactive Hotmail account. He returned to Gmail and again went through the password recovery process, specifying a password of his own. The new password was then sent to the just-hijacked Hotmail account. "Within a few moments [Hacker Croll] had access to the personal Gmail account of a Twitter employee," explained Cubrilovic. "The first domino had fallen."
No responsibility can be taken for the content of external Internet sites.
Return to internet news headlines
View Internet News Archive