Timehop's lack of 2FA led to data breach affecting 21 million users

midian182

Posts: 9,745   +121
Staff member
Facepalm: Timehop, a platform that collects old photos and posts from social media platforms, has revealed it suffered a security breach that resulted in the data of 21 million users being stolen—all because its cloud services lacked two-factor authentication.

Timehop wrote that the intrusion took place on July 4 and that users’ names and email addresses were exposed. Additionally, phone numbers linked to 4.7 million accounts were also stolen. The company stressed that no private/direct messages, financial data, or social media or photo content were affected.

Timehop is advising those who shared their phone numbers with the company to “take additional security precautions with your cellular provider to ensure that your number cannot be ported.”

Authorization tokens used by Timehop to access social media sites like Facebook and Twitter were taken during the breach. The company says it deactivated these keys a few hours after it detected the intrusion, but warned that “there was a short time window during which it was theoretically possible for unauthorized users to access those posts” but has “no evidence that this actually happened.”

Preparations for the attack began in December when an unauthorized person used admin credentials to log into the company’s cloud computing environment, which it admits was not protected by multifactor authentication. Recon activities took place over the next two days, and the person logged in two more times before the July 4 attack.

Timehop has now restored its services after resetting all its passwords and adding multifactor authorization. It is working with local and federal law enforcement to investigate the breach. Security is being enhanced and the company is conducting a complete audit.

A technical report on the incident can be found here.

Permalink to story.

 
A lot of conjecture and assumptions there. The attack could also have potentially been stopped by restricted network access, better password protection policies, login IP monitoring, better social engineering education (how did the attackers get the password in the first place?) etc. To assume that 2FA is the sole solution to/cause of the problem seems pretty random. Not to say that 2FA couldn't have also stopped it, but I don't get the focus on it.
 
A lot of conjecture and assumptions there. The attack could also have potentially been stopped by restricted network access, better password protection policies, login IP monitoring, better social engineering education (how did the attackers get the password in the first place?) etc. To assume that 2FA is the sole solution to/cause of the problem seems pretty random. Not to say that 2FA couldn't have also stopped it, but I don't get the focus on it.
Agreed! We’ve already seen plenty of cases where networks and companies have been compromised even with 2FA enabled... sometimes it’s as easy as “borrowing” someone’s Smartphone for a few minutes...
A network is only as secure as its weakest link - that’s usually the dumbest employees:)
 
Back