• Skip to main content

ITSecurity.org

Technology Security Controls

  • Main
  • Products
  • Services
    • Compliance-Services
      • ISO27001 Compliance
      • ISO22301 Compliance
      • ISO27002 Compliance
      • Data-Protection
      • GDPR
      • PCI-DSS Services
    • Identity and Access Management Services
      • IAM Design
      • IAM Policies & Standards
    • Incident Management Services
      • Emergency Incident Response
      • Forensic Support
      • Incident Response
    • Information Security Services
      • Information Security Consultancies
      • Information Security Governance Services
      • Information Security Policies & Standards
    • IT Risk Management Services
      • Risk Management Framework
      • Auditing
    • IT Security Consulting Services
      • IT Security Governance Services
      • IT Security Policies and Standards
    • Additional Security Services
      • Managed Security Services
      • Mobile Security
      • Network Security Services
    • Physical Security Services
      • Physical Security Reviews
    • Policies and Standards Services
    • Programme and Project Services
    • Risk Management Services
      • Risk Management – Framework
      • Risk Management Acceptance & Waivers
    • Security Awareness Services
      • Security Awareness – Phishing Responses
      • Phishing Responses
      • Security Awareness Training – Rebranded Security Training
      • Security Awareness Training – Generic
    • Security Design Services
      • All Security Design and Architectural Services
      • Cloud Security Review
      • Security Appliance Design and Configuration
    • Security Metrics Services
    • Technical Security Assessment Services
      • Penetration Testing – Our Penetration Test Services
      • Database Security – Databases and Repositories
      • Application Security Code Testing
      • Application Security Services
    • Third-Party and Supplier Assurance Services
      • Third and Supplier Party Assurance Methodology
      • Third and Supplier Party Assurance Review
      • Joint Venture Due Diligence
  • Security Digest
  • FAQ
  • Contact Us

Hack

Hackers could read non-corporate Outlook.com, Hotmail for six months

April 15, 2019 by admin

Hackers could read non-corporate Outlook.com, Hotmail for six months

Enlarge
Getty / Aurich Lawson

Late on Friday, some users of Outlook.com/Hotmail/MSN Mail received an email from Microsoft stating that an unauthorized third party had gained limited access to their accounts and was able to read, among other things, the subject lines of emails (but not their bodies or attachments, nor their account passwords), between January 1 and March 28 of this year. Microsoft confirmed this to TechCrunch on Saturday.

The hackers, however, dispute this characterization. They told Motherboard that they can indeed access email contents and have shown that publication screenshots to prove their point. They also claim that the hack lasted at least six months, doubling the period of vulnerability that Microsoft has claimed. After this pushback, Microsoft responded that around 6 percent of customers affected by the hack had suffered unauthorized access to their emails and that these customers received different breach notifications to make this clear. However, the company is still sticking to its claim that the hack only lasted three months.

Not in dispute is the broad character of the attack. Both hackers and Microsoft’s breach notifications say that access to customer accounts came through compromise of a support agent’s credentials. With these credentials, the hackers could use Microsoft’s internal customer support portal, which offers support agents some level of access to Outlook.com accounts. The hackers speculated to Motherboard that the compromised account belonged to a highly privileged user and that this may have been what granted them the ability to read mail bodies. The compromised account has subsequently been locked to prevent any further abuse.

The support account would also have only had access to free Outlook.com/Hotmail/MSN-branded accounts and not to paid Office 365 email.

Motherboard’s source also gave a reason for the hack in the first place. iPhones are associated with iCloud accounts, and that association precludes performing a factory reset. This in turn means that stolen iPhones become less valuable; they can still be salvaged for parts, but they can’t be resold as complete working handsets because they’re still tied to their original owner. However, with access to the iPhone user’s email account, it’s possible to dissociate the phone from the iCloud account and subsequently to reset the handset. In other words, the hackers aren’t much interested in the email accounts per se; they just want to get their hands on those important reset-request emails so that they can boost the value of their stolen phones.

Filed Under: cloud, Hack, Hotmail, IT Security, Microsoft, Outlook.com, Security, tech

Instagram Ransomware attack

October 1, 2018 by admin

Instagram Ransomware attack

Filed Under: Hack, Ransomware

FBI numbers on hacking

October 1, 2018 by admin

FBI numbers on hacking

Filed Under: Hack

Satori Botnet developer arrested

October 1, 2018 by admin

Satori Botnet developer arrested

Filed Under: Hack

Malware to survive OS reinstalls

October 1, 2018 by admin

Malware to survive OS reinstalls

Filed Under: Hack, Malware

Feds use of hacking as a tool

October 1, 2018 by admin

Feds use of hacking as a tool

Filed Under: Hack

Midterm elections can be jeopardized by the hackers

October 1, 2018 by admin

Midterm elections can be jeopardized by the hackers

Filed Under: Hack

North Korean citizen charged with hacking charges

October 1, 2018 by admin

North Korean citizen charged with hacking charges

Filed Under: Hack

  • Page 1
  • Page 2
  • Page 3
  • Next Page »