Massive Phishing Campaign Hits Multiple Email Services 183
nandemoari writes "It seems as if the massive phishing campaign reported yesterday was not specific to Hotmail, as was initially believed. According to a report by the BBC, many Gmail and Yahoo Mail accounts have also been compromised. Earthlink, Comcast, and AOL were also affected. While the source of the latest attacks has not been determined, many are pointing to the same bug that claimed at least 10,000 passwords from Microsoft Windows Live Hotmail. Microsoft has done their part in blocking all known hijacked Hotmail accounts and created tools to help users who had lost control of their email. An analysis of the data from Hotmail showed the most common password among the compromised accounts to be '12345.' On their end, Google responded to the attacks by forcing password resets on the affected accounts."
Re:Wow! (Score:1, Insightful)
You destroyed the joke thread by starting at the end.
You should have started with "1-2-3-4-5? That's the stupidest combination I've ever heard of in my life! That's the kinda thing an idiot would have on his luggage!"
Where are the details? (Score:5, Insightful)
All of the stories seem to be very short on details. How did the scheme work? How were they getting users to their site instead of Hotmail? Was it something stupid, like a spam email with a link? Or was it DNS forgery or something more subtle?
Everyone is reporting that it was a particularly big haul for a phishing campaign, but nobody seems to be reporting what the deal was, or why this was more successful than your typical, run-of-the-mill phishing attack.
Re:Wow! (Score:3, Insightful)
lol
But seriously, what kind of chickenshit mail server policy even allows that password in the first place?
OH... hotmail.. enough said...
Preaching to the church (Score:1, Insightful)
I know I'm preaching to the church but a good way to make a password is to make up a sentence and take each first letter, convert some to capitals and numbers and you will never ever forget it.
It is like a walk in the park. iilawitp iiLawitp iiL4wi7p voila!
Ban them. (Score:4, Insightful)
Re:Where are the details? (Score:4, Insightful)
> ...how do I know if I've been affected?
Are you a fool? If not you are ok.
If the source is something like DNS poisoning, then it's not that simple. I already know my ISP to be a bunch of fools, but I have little choice in that matter.
Re:Where are the details? (Score:2, Insightful)
Re:Ban them. (Score:3, Insightful)
I think it ought to be policy that derelict accounts, ESPECIALLY those which have weak passwords, be 'locked' after a period of inactivity. Reactivation could be accomplished with, say, a series of difficult CAPTCHAs so the account is always able to be 'revived' but not hijacked like this.
It just seems irresponsible to have such a lack of control over these kinds of things...
Re:Wow! (Score:4, Insightful)
Re:Ban them. (Score:3, Insightful)
But the problem wasn't their passwords. The problem was that they clicked on a bad link, went to a dangerous site, and typed in their password.
Their password could have been the most ueber-elite 32 unicode-character password containing symbols from 5 different writing systems. It wouldn't have mattered.
Give a technological idiot a perfect password, and they will hand it over to the first social engineering attack they meet.