Twitter security in crosshairs after AP account hijack

Advertisement
By Agence France-Presse | Updated: 25 April 2013 16:18 IST
A hijacked Associated Press Twitter account that rattled markets with false word of an attack on the White House put the security of social media in the crosshairs Wednesday.

The stock market rebounded from the nosedive triggered Tuesday by the bogus tweet and the AP posted a message on Twitter that its account "which was suspended after being hacked, has been secured and is back up."

The AP Twitter page indicated more than 1.8 million followers as of early evening in San Francisco, where the one-to-many messaging service has its headquarters.

What remained were questions as to whether security was tight enough on Twitter and other popular social networks in an age when people increasingly turn to posts from friends or strangers for reliable news and information.

Advertisement

Twitter was firm that evaluating and improving defenses at the service remains an ongoing priority and that the hijacking of the AP account didn't prompt any immediate moves to toughen security.

Advertisement

AP's Twitter account appeared to have been breached after hackers tricked someone into revealing a password with a deceptive email message in what is referred to as a "phishing" attack.

Some online reports contended that Twitter was considering "two-factor authentication" that would require users to either know something or do something aside from just type in passwords to access accounts.

Advertisement

"When you look at the problem in mass, the most critical thing we see is people just have horrendous passwords and use them all over the web," said Mark Risher, chief and founder of Impermium, an Internet security firm.

While incorporating a second step such as sending a confirmation code in a message to an email account or mobile phone associated with a user's account is a big improvement, even that defense is flawed, he said.

Advertisement

Risher was 'spam czar' at Yahoo! Mail before leaving the Internet pioneer and launching Impermium in 2010. His team includes Sameer Bhalotra, a former senior director of cybersecurity for the White House.

Phishing attacks are becoming increasingly sophisticated and convincing, sometimes with information harvested from social networks used to make pitches more personal and believable to specific targets, according to Risher.

A person conned into giving hackers a password could just as easily be asked for a second bit of information needed to get into an account, he reasoned.

"You really can't just expect users to never get duped, because they always will," Risher said. "Service providers should never be satisfied with a password."

Adding multiple layers of security to get into accounts treads on the ease of using online services, forcing social networks to risk aggravating members.

"There is a trade-off between convenience and safety," he said. "It is like putting five deadlock bolts on the door. It would make you more secure but it really would be a hassle if you wanted to pop out to the corner store."

Impermium and other companies specialize in ways to spot "bad guys" who use stolen passwords to get into accounts.

Signs watched for include whether an account is being accessed from a smartphone other than one typically used or if the visitor appeared to be trying to cover their tracks.

Last month, Twitter arranged with major web email service providers Google, Yahoo! and AOL to reject emails claiming to be from Twitter if they didn't have a special protocol that acts as a "handshake" of authenticity.

The intent was to block phishing email messages from even reaching targets. Twitter maintained that it has a variety of ideas about hardening security but would not disclose details.

"The answer is the service providers," Risher said. "Just like in the real world where a bank doesn't say that once you make it past the door you can do whatever you want."

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Bridgerton Season 4 Premieres in Two Parts on Netflix: See Details
  2. Scientists Track Glowing Green Comet 3I/ATLAS as It Nears Earth
  3. Earth's Deep Interior May Have Hidden an Ancient Ocean of Water
  4. Scientists Discover Hidden Rainfall Pattern That Could Reshape Farming
  1. Early Earth’s Deep Mantle May Have Held More Water Than Previously Believed, Study Finds
  2. Nandamuri Balakrishna's Akhanda 2 Arrives on OTT in 2026: When, Where to Watch the Film Online?
  3. Single Papa Now Streaming on OTT: All the Details About Kunal Khemu’s New Comedy Drama Series
  4. Scientists Study Ancient Interstellar Comet 3I/ATLAS, Seeking Clues to Early Star System Formation
  5. Bridgerton Season 4 to Release in Two Parts on OTT: When and Where to Watch It Online?
  6. Spider-Like Scar on Jupiter’s Moon Europa Could Indicate Subsurface Salty Water
  7. Wake Up Dead Man: A Knives Out Mystery Now Streaming on Netflix: Everything You Need to Know
  8. Secret Rain Pattern May Have Driven Long Spells of Dry and Wetter Periods Across Horn of Africa: Study
  9. Sister Midnight Out on OTT: Know Where to Watch This Radhika Apte-Starrer Online
  10. JWST Detects Thick Atmosphere on Ultra-Hot Rocky Exoplanet TOI-561 b
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.