TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The Critical Security Flaws that Resulted in Last Friday's Hack

189 pointsby neilwillgettoitalmost 13 years ago

21 comments

kijinalmost 13 years ago
Why does Google allow the hacker and the account owner to keep resetting passwords in rapid succession? The timeline indicates that two lengthy ping-pong sessions took place during the incident. That kind of behavior should immediately raise a red flag. How often do legitimate users reset passwords alternately from two different locations 10 times in 15 minutes?<p>I'm surprised that Google doesn't detect two people fighting for control of one account. They could have easily detected ping-pong sessions and and locked both parties out of their accounts for a couple of hours. Or they could have penalized the newly added recovery address by forcing an exponential delay between resets using that address. This is not the first time I've heard of somebody breaking into a Gmail account while the account owner is using that very same account.
评论 #4067858 未加载
评论 #4068770 未加载
评论 #4068368 未加载
j_salmost 13 years ago
Rule #1 when publicizing security incidents: always publish something else to the blog within 1.5 hours so that the security incident isn't the top post.<p>Edit: semi-tongue-in-cheek per comments below; as a CloudFlare customer I went to the blog when this first came up expecting to see something but bounced when the first post was a discussion of SSL BEAST since that was the hotness back in the fall of 2011.<p>I do believe it was not planned, but I also feel that vulnerability disclosures should be pinned for a while somehow if possible. I think one way this is done is having a separation between 'new feature' blog and 'ops' blog.
评论 #4066982 未加载
评论 #4067848 未加载
评论 #4066972 未加载
sc00teralmost 13 years ago
Part of this attack bears a certain resemblance to the recent Bitcoinica compromise, in that, from what I understand, they were also forwarding admin emails to personal accounts, one of which was compromised leading to the attacker gaining control of the bitcoinica virtual servers. Cloudflare were fortunate - at least the changes made were reversible, whereas the bitconica compromise resulted in the virtual servers being unrecoverably deleted after breach and theft.<p>There are lessons to be learned from both incidents.
aSigalmost 13 years ago
Does anyone else get the feeling that the attacker is going to be someone the Cloudflare team knows? Firstly they would have had to have known Matthew's phone number. Then, assuming the attacker always had the plan of disrupting the target site, they would have had to have known that the password reset mails were BCC'd to admins.
评论 #4067262 未加载
评论 #4067445 未加载
sp332almost 13 years ago
O.o This reminds me so much of the hack sequence from the game Uplink. The game was based on "hacking" but intentionally used hacking techniques from Hollywood :) It was pretty fun. Anyway for the highest-level targets, you had to get a voiceprint from the phone of an admin, crack the password on the box, and break the encryption while bypassing monitors.<p>Just found out: Uplink is on Steam, and in the Ubuntu Software Center now.
Mizzaalmost 13 years ago
Incredible hack! Hats off to the hacker and to Cloudflare for the transparency of the response.<p>What customer was the target?
评论 #4067156 未加载
cypherpunks01almost 13 years ago
Wow - that's some epic transparency. Kudos to Matt and the Cloudflare team for that.
ejfoxalmost 13 years ago
I like the infographic showing the series of events, definitely goes a long way in terms of aiding transparency. I wonder if it could be a new trend?
评论 #4066938 未加载
评论 #4066919 未加载
评论 #4066866 未加载
metafouralmost 13 years ago
Would most of the attack been rendered impossible if Matthew answered his phone at 11:39 instead of letting it go to voicemail?
评论 #4067349 未加载
startupfounderalmost 13 years ago
"AT&#38;T was tricked into redirecting my voicemail to a fraudulent voicemail box"<p>Capitan Crunch called...
Bob_Walmost 13 years ago
The hack seems very well planned - I wonder just how many smaller sites have been hacked the exact same way as practice, and not picked up since they didn't have direct access to Google's security people?
评论 #4066980 未加载
BryanB55almost 13 years ago
Pretty intense hack... I think Google gives you the option of setting up a recovery phone to receive voice or SMS messages. It looks like SMS may be more secure.<p>It also sounds like he didn't have 2 factor setup on his personal gmail account. I wonder if that would of helped.
评论 #4067682 未加载
gojomoalmost 13 years ago
So, the "Five Whys" analysis came up one short, eh?<p>Just kidding, this is a great level of detail and much appreciated, to understand CloudFlare's process and how to protect against or recognize these tactics elsewhere.
techinsidralmost 13 years ago
<a href="http://www.securityweek.com/exclusive-google-two-factor-authentication-flaw-exposed-google-apps-customers" rel="nofollow">http://www.securityweek.com/exclusive-google-two-factor-auth...</a>
sc00teralmost 13 years ago
Is flaw # 5 (or #1 depending on how you look at it) not having two-factor auth on the personal account? Or does account recovery by-pass two-factor auth by design?
lsh123almost 13 years ago
The funny part - cloudflare still hosts the DNS for the guys who claim responsibility for this attack:<p><pre><code> Domain Name: UGNAZI.COM Registrar: ENOM, INC. Whois Server: whois.enom.com Referral URL: http://www.enom.com Name Server: LEE.NS.CLOUDFLARE.COM Name Server: RUTH.NS.CLOUDFLARE.COM Status: clientTransferProhibited Updated Date: 29-may-2012 Creation Date: 22-jan-2012 Expiration Date: 22-jan-2013</code></pre>
radicaldreameralmost 13 years ago
Hrm <a href="http://exiledonline.com/isucker-big-brother-internet-culture/" rel="nofollow">http://exiledonline.com/isucker-big-brother-internet-culture...</a>
slavakalmost 13 years ago
Great job on the transparency.<p>And now I know about the Google Authenticator app. Fancy little thing, that; glad to find out about it.
madaoalmost 13 years ago
The fact that they are relying on an external mail vendor, and had passwords in their emails is a very sad practice.
评论 #4067411 未加载
saturnalmost 13 years ago
Sounds like if the hacker had just done it out of hours, perhaps when the person in question was asleep, they would have had uncontested access to the accounts and the hack might have been far more damaging.
jsprinklesalmost 13 years ago
I'm amazed Cloudflare got a response from Google that quickly. I'm a paying Apps customer and I don't see responses for 24 to 48 hours on security incidents, not to mention that Google doesn't have a stellar reputation when it comes to things like "support".<p>Goes to show, it's always who you know (or it's bullshit, which is less likely). Or I don't have enough users.
评论 #4067614 未加载