Credit card numbers are not secure. Therefore, they should not ever be accepted as authentication. Especially only 6 digits of it! This is by far the most shocking part of this story. As if I needed another reason to despise GoDaddy.
[Edited to add] I would sure love to see a scarlet letter list of companies which allow such practices, so I can never use them.
I don't work in that department, but I'll forward the page to the CEO and make sure it gets read and addressed.
Edit: I see you got a new CEO since I and so many other customers left in disgust about your company's support of SOPA and all those other issues. I'm sure you still have binders full of scantily clad women to decorate your booths at trade shows. Your company is permanently tainted, one of the worst examples of what's wrong with the computer industry, and I'm never coming back.
Isn't the solution more around recovering from when the break-ins inevitably happen?
https://www.namecheap.com/ accepts bitcoin as payment to avoid this situation.
Then I can come back here and post nasty comments about squatters.
The guy has given a clear and convincing story of what happened. I'm sure that it would be pretty easy for someone on Twitter's security team (assuming that they have one) to verify that the username was taken when he said it was.
I don't know what I find more shocking -- that PayPal would actually give the last four digits of a credit-card number to a complete stranger, that GoDaddy would let someone guess a two-digit number, or that a credit-card number is all you need to identify yourself. (In Israel, it's common for companies to ask for the last four digits of your credit card number in addition to other details, but never on its own.)
Actually, I'm willing to believe just about anything about GoDaddy. But PayPal is known for being surprisingly harsh and paranoid about security, shutting down accounts and holding money when they suspect problems. It's sad and rather surprising to me that they're willing to give out such information so easily, unless you specifically ask them not to. Shouldn't it be the other way around, that they refuse to provide such details unless you allow them to?
I really hope that Twitter and PayPal apologize profusely to this author, and undo the damage they've done as best as possible.
Is there any possible rational for Paypal to give the last four digits of his card number to "him" over the phone? Given that they're routinely used for verification, it's as if they've never heard of social engineering. It's simply inexcusable.
And it's almost as bad as the ridiculous "Log In Without Your PayPal Security Key" option that lets you bypass 2-factor auth and head straight to the ultra-secure world of the ridiculous security questions such as the ever-popular "what city were you born [that's also listed on Facebook]" and what not. I still can't believe they think that's a good idea.
The founder's interview [1] describe the beginning as a constant race against fraud, which no other bank was willing to compete in: "You're going to go bankrupt when the chargebacks start".
The was a locked room with a screen-and-keyboard-only computer where you could research about transactions and find suspicious and fraudulent ones. According to the founder, it became PayPal's core asset.
[1] in the book Founders At Work, which I recommend.
I think something is in the works...
https://support.twitter.com/articles/15362-inactive-account-...
@N (now @N_is_stolen)'s last post was 4 months ago, so he is still technically considered an active user.
It doesn't appear that he is trying to sell it, which is the usual behaviour of an account/name squatter.
I have several domains that I plan to use for little projects over the coming year (though given my lack of free time right now that may not happen like it didn't last year...). Am I a squatter for having paid for something I intend to use but have not got around to doing anything with yet? A couple of them are password/credentials related, for an example of a squatter talk to the person who owns password.net and sends me unsolicited email regularly trying to get me to offer to buy it as it will "help my brand" (the names I've got are the intended "brand", the generic short name is worth no more to me than standard registration fees - who slaps short names into their address bar instead of using a search engine these days?).
Now I reread that, it sounds a little... sexual.
PayPal gave the attacker the last four digits of my credit card number over the phone
That person should lose their job if it is not PayPal policy.
I really hope by some small chance the person that did this gets some serious prison time, if not for this then anything else prior or down the road. Then maybe one of those mornings they wake up in prison they can ponder if it was all worth it.
GoDaddy should not use the 4 last digits as a way to confirm identity, exactly for the reason I mentioned above
It would be one thing if this was a spouse or someone intercepting their physical mail. It's not. It's someone out of the blue who called PayPal to get the last four of a complete stranger.
GoDaddy's verification is bad too but at least they had some kind of attempt.
I find their TV Commercials the worst and makes us as a community go back to the 1950s stereo types????
Love it when I help churches with their websites and it has a GoDaddy account :(
This is a systemic fault of PayPal and firing a lowly phone-jockey will not solve that. There are computer system protections that were clearly not in place (the representative was able to see this data on the screen, rather than having to enter it blind and have it validated - or, if they did, they had infinite re-tries which is also bad. Three wrong attempts, and the account should be locked and have to be escalated) but there are also culture/training problems: Until otherwise satisfactorily proven, anyone calling must be assumed to be in bad faith when they call. A representative with this mindset would not let a caller start guessing the "password".
Now they laxed the security somewhat and people give them sheet for that... There's no winning for them, is there?
But really, the employees should not give away any user information, ever. It should be a one way street here. That would have stopped the attacker in this case, as well, I believe...
Anyhow, if any of them actually comply to ISO 9001, it is possible to audit previous data to establish the true identity of the owner in some arbitrary date before any of this happened.
Quite possibly, to avoid unnecessary user annoyance, these companies will only subject themselves to the effort of analyzing that data under court order, so it's fair to suppose there is need to open a judicial process. Therefore, I believe it's possible to regain access to everything that was supposedly stolen, even though it may take quite some time.
I pay Twitter nothing, and yet the service is valuable to me. So instead of continuously crippling the service in the name of goodness knows what, why not actually charge users for a premium experience. Things like customer service that works, a gold member status flag, controls on swapping account ownership, analytics and so on. Offer 3 paid levels - personal, business and corporate, and obviously keep the free level forever. Once revenue comes from customers, then perhaps it will help in understanding that while other revenue night be larger, the true value of Twitter is derived from the community.
Because then they couldn't justify their $50 Billion valuation. They'd "just" be a $1 billion company or something.
Sites like Twitter or Facebook could be perfectly fine profitable ventures that worked in their users' interests. But instead they got unobtainable market values, so they have to look like they're on track to meet them, and the easiest way to do that is to exploit their users.
Just today I got a notification from Facebook saying that videos are going to play silently automatically in my feed on my phone, meaning that if I'm on mobile data, my cap will be used quicker. This is the kind of thing I'd like to be able to pay to avoid.
Trying to win a market that way. If only one popular site starts to use it, -- you might be getting some network effect out of it.
I think it was a better level to work on. Let others help with the network.
What you should do, is make sure that you trust your registrar. Paypal sure have some questionable practises, but the real culprit in this story is clearly GoDaddy.
That's horrible advice. That sort of attitude taken to the extreme means we shouldn't be using DNS for anything ourselves and put everything in Google's (or Amazon's) big bag.
Should I redirect my customers to facebook.com/company as well in fear of someone taking over my DNS?
The lesson from this whole charade is to not trust something as crucial your DNS to untrustworthy companies like Godaddy. We've heard the horror stories before and we keep on hearing them again.
Relying on Google, a company with no direct end-user support and no emergency hotline to secure the most important thing you have, DNS, is even bigger madness. I've been locked out from a Gmail account before. It took me weeks to get it back, because Google has no support.
So yeah. Get a proper DNS-provider, and don't dig yourself deeper into the hellhole you're currently setting up.
Wild story coming out today because I was just setting up a couple domains/emails today on Google Apps. There's actually a section in the process in which they suggest setting the MX TTL to 1 Week.
Also considering closing my paypal account now.
This kind of thing happened a lot in MMO games which is why they try to push account security into your hands so they don't have to attempt to arbitrate in deals that may or may not have happened outside of their sphere of control.
Btw, I personally use Bigrock instead. They have a very a good customer support.
http://rikacomet.blogspot.in/2013/12/quick-comparison-betwee...
https://support.twitter.com/articles/18311-the-twitter-rules
Abuse and Spam > Selling usernames: You may not buy or sell Twitter usernames.
There doesn't appear to be any way to contact Twitter about this.
Shortly after, I received a second email "Welcome to Twitter, <username>"
Going to: https://support.twitter.com/forms/impersonation
..and selecting "Someone is using my email address without my permission." tells me to submit a general support ticket. That's fine except none of the general categories has anything to do with this problem and choosing "My issue is not in the list" simply redirects me immediately to the root support page. I submitted a ticket with a different topic and have not heard back from them in a week and expect I never will.
If that hadn't happened, he'd still have his twitter account.
>If I were using an @gmail.com email address for my Facebook login, the attacker would not have been able to access my Facebook account.
Just google and the NSA then. Also, Gmail has an exposed password reset and social-engineerable support. A server running Postfix/Exim doesn't.
I'd consider a domain with a good registrar far more secure than google.
It seems like if he'd had 2FA turned on with GoDaddy, this may not have happened. So rather than use @gmail.com addresses to register for things, as he recommends, just turn on 2FA with your provider. And if your provider doesn't support it, leave them and tell them why.
The admonition to use a @gmail.com address was annoying enough that I actually put up a response blog post just on this point: https://konklone.com/post/protect-your-domain-name-with-two-...
Sigh I use Google Apps exactly so that I have control over the domain and aren't subject to the good will of Google. I had never thought of this particular problem. Now I don't know what to do.
The admonition to use a @gmail.com address was annoying enough to me that I responded with a blog post: https://konklone.com/post/protect-your-domain-name-with-two-...
It still works if you find an expired domain name, register the domain name and then do the whole password-reset procedure. Might be cheaper to buy a 6 digit number on eBay though :)
In times of 9 digit numbers, 6 digit numbers were still sufficiently unique :)
Focusing on the Twitter handle sale part: I have the twitter handle @jetsetter, and have been offered multiple thousands of dollars for it (guess who!).
Unfortunately, selling a twitter handle is against TOS. Only @israel has been officially allowed to transfer hands for money, that I'm aware of.
So trying to broker the sale of a twitter account can allow the buyer to report your 'behavior' to twitter. They can seize the account and make it so no one has it, which may be what the buyer prefers to you having it.
So no matter the price you could command, it isn't like you could just list @n up for sale and make it rain.
Twitter: "I'm sorry, you can't do that."
Israel: "What are you, some kind of Anti-semite!?!"
Twitter: "OK, OK, go ahead and do what you want. See, we're not anti-semite :)"
at the bottom a twitter representative is quoted as saying that as long as they give you permission to sell/buy a handle they won't block/lock the account.
Also apparently CNN also purchased a handle[1].
[1] http://www.businessinsider.com/cnn-acquires-cnnbrk-twitter-a...
If not I could just make fake email logs and report you.
the most famous is the CNNbrk handle
He might have been able to get it back if it was his trademark or even name that he lost and not some witty username.
Let's see if this story hits real news headlines and affects Twitters stock before closing bell tomorrow and action will happen.
"Here's my credit card and GoDaddy creds, guys, and here's a technical note about my DNS settings that I want you to pay extra special attention to. Tell me when I should expect to start getting the GoDaddy confirmation emails. Other than that, have fun playing with DNS settings -- I never want to even think about them again."
This post is 5% "Here's my recommendation for a DNS service" and 95% "Notice how in return for an hour or two of grunt work a SaaS company just made it very easy for me to award them $2,000 of high-margin recurring revenue a year despite being twice as expensive as my pre-existing option by successfully overcoming my 'I would love to move off my existing solution but it requires grunt work so I think I'll punt on that decision for, oh, eight years' objection? That's a really good trade. You should consider offering it in your SaaS business, too, in any way that makes sense for it."
Referral link, gets both of us 1 month free service: https://dnsimple.com/r/96a980397648e9
Also everything patio11 said above. :)
Honestly I don't have enough experience with them to really evaluate their services, but they seem trustworthy and competent, and I like working with people I know I can talk to.
Their customer service has been really great since, so I'm staying. It's probably slightly more expensive than I could get elsewhere, but for the sense of security I get, it's completely worth it.
Point being- In this shitty business, where trust is everything - I prefer a small player who I can have a direct personal relation to, over some big nameless corporation.
Executive-lock (E-Lock) allows for the domain name to be frozen. This means that the domain name is:
1. Unable to be transferred out to another Registrar.
2. Unable to be pushed to another Fabulous account.
3. Unable to have changes to its nameservers.
4. Unable to have the registrar-lock status removed.
You can define whatever conditions you want and they manually do them if you want it unlocked. It could take many days to unlock your domain, but it definitely isn't going anywhere.
"If your portfolio generates US$750 a month or you are willing to transfer 750+ domains to Fabulous, please complete the form below."
That's a little out of my range though I'd be willing to pay a premium (how much of a premium?).
* 2 factor authentication
* 5 security Q/A's before you can make an account change!
http://www.namesilo.com/Support/Domain-Defender
there is no WAY this guy would have had an issue if he was with namesilo and had both protections enabled
(I'm just a happy client and in no other way related to them)
Have been using them since 2006 both personally and at work. They do have 2 factor auth.
You think the hacker who tricked Paypal and Godaddy is in the right here to steal it? I can't believe it.
I've heard people go on about how Google (and I suppose other corporations) are evil, and how they are rolling their own custom mail solutions etc. It's times like these that people lose important things.
Also, I really don't understand why US companies must store credit card details. I understand the convenience, but there's been a lot of security compromises to let this practice continue. In South Africa online retailers don't store CC info, yet we aren't being brought to our knees by inconvenience.
At least the attacker mentioned his methods, so GoDaddy and PayPal can educate their staff better.
Aside from mining your data for marketing purposes, Google is evil because they continue to store your e-mails even after you delete them. Custom mail solutions are markedly superior if you know what you're doing, like anything else in life that you assume your own direct control over rather than leaving it to someone else.
I've had two users offer to buy my username.
"Not accepting an offer of $50K for a twitter username I didn't use" doesn't really count...
Much closer than saying "I would sell this if I received a 50k offer."
The first few digits of card numbers refer to the provider (Visa, Amex, etc) [0]. Given that Paypal gave the last four digits of the card, I'm surprised they wouldn't give out the provider as well, so guessing this would be even easier.
[0] https://github.com/stripe/jquery.payment/blob/master/src/jqu...
Using an unusual/unknown address for account validation mails (maybe with forwarding of other communications) probably would make sense, though. And/or sites coming up with a better account-recovery procedure, perhaps outsourced to a startup.
There's probably a market for a super-secure email address for account login mails, but that isn't a free gmail account.
How we make sure that you don't lose your $50,000 Twitter username: http://ow.ly/t4yR8 $5.99 domain transfers with code BYEBYEGD
a) Two Factor should be mandatory and as soon as it is, any representative of the company MUST insist that a reset cannot be done over the phone. It should be highly suspicious if someone comes up and says "Hi, I lost my email account access AND my phone so could you please reset my password via phone now?"
b) If not Two Factor, the security questions should also be mandatory. No other "data" like past addresses or cc numbers should suffice to reset over the phone if the person doesn't know the answers to all security questions.
And, speaking of these questions, of course they should be stuff that you know and cannot be "guessed" by anyone who is able to read your facebook page or similar. Maybe even some non nonsensical thing like "Favorite Food" - "Horse Droppings". As long as you remember this, nobody should be able to "hack" that over the phone. Even if you go on and on on facebook about how you "could eat your way through a giant bowl of pasta you love it so much"
I would NEVER remember this. EVER.
... there has got to be a multi-stage process for authentication that does NOT use any CC or SSN. Of course, the responsibility lies with the account owner for maintaining passwords/authentication information.
If you lose the information, no way to recover it.
I say this because it seems (again, I'm not an expert) that these thieves use social engineering mostly in the "data recovery" stage of the process.
The only way to tighten that from my perspective is to put maximum responsibility on the account owner to keep their logins, passwords (again, for multi-stage authentication), and such on hand. Don't have a need to recover your info, and others can't use the recovery process to get to your account.
I guess it wouldn't be a perfect scenario but... this, or lose @N.
I am sorry to hear there are companies allowing these practices, though... sad.
Also if account data is changed they MUST keep a log of what your data was before. At least anything beside passwords.
High chance the story will be quickly forgotten and the account will be re-used.
This sounds like pretty normal automated monitoring for what looks like compromised account behaviour.
That meant that anyone using SMS via AT&T for two-factor auth was vulnerable.
The extra layer of security is only enabled if you call AT&T and ask them to further protect your account from future changes.
Good Developers understand how critical it is to handle authentication and password storage well. It can be complicated thing and is very easy to screw up.
But all that goes out the window when somebody calls the support line. There needs to be just as much scrutiny placed on over the phone authentication as there is within an application. The problem is likely that those over the phone patterns/anti-patterns are not well documented and available.
http://wiki.gandi.net/en/contacts/login/2-factor-activation
(note to self: activate 2FA)
Makes me happy that companies are moving towards text authentication since emails are easy (or at least well practiced) to compromise.
Note: Time to change my Time To Lives on my MX records and up my security.
However. If someone were to steal a physical asset in order to extort something else out of me I would go immediately to the police. I'd have thought I'd do the same if the assets involved were digital.
I've no idea if a criminal offence was committed in what ever jurisdiction this happened. But I'd have thought extortion is illegal is many parts of the world?
I'm not really sure I understand the psychology behind it and whether it's a juvenile attempt to demonstrate relative power (e.g. "I did this to you, ergo I'm more powerful/smarter/whatever") or something else entirely.
Follow us at @N on twitter.
Looks like a typo. Imparts zero cred since 99.999% of people will not take your ability to "possess" a short twitter account name as helpful for whatever else you may be trying to do.
As far as the "Sorry I am so technically gifted. Let me tell you what you should do to prevent me next time..." thing, what kind of cartoon caper is this?
If they sell it to someone I guess that is a reason to take it, but it also seems like some enterprising DA would want to use it as an example of receiving stolen property ( because News! Hacking! Fame!) So if anyone buys this name they might be in trouble at some unspecified point in the future.
$50k is hardly worth such a bold crime with no exit strategy.
He may say that he has left them alone, but you have no chance of knowing.
btw, @! google search returns 0 results. interesting... hmm, twitter apparently allows alphanumeric handles only...
what sane person doesn't call the FBI when an attacker blatantly commits fraud against them, admits to it, and then commits extortion based on the successful fraud? Furthermore, what kind of attacker explains how they attacked? Thats ludicrous.
this has got to be some kind of roundabout way of advertising for the various competitors of godaddy mentioned in the post.