Could Hotmail password theft be due to a trojan?
A researcher says there is evidence that not all of the Gmail and Hotmail account passwords were taken as a result of phishing.
Although Microsoft and Google have both said that the passwords were taken as a result of phishing, ScanSafe security researcher Mary Landesman said there was no way that the companies could have been totally sure of this.
Speaking to IT PRO she said: "No offence to, and I don't mean to undermine either Microsoft and Google, but certainly neither one of them can actually definitively either."
"I think they came out with phishing as the most likely explanation in their minds without having really gone over the lists in great detail," she added.
Landesman said that there were a lot of indicators in the password lists that are consistent with data theft rather than phishing.
"It doesn't mean that 100 per cent of the list was derived from either source [phishing or trojan], more likely a combination of sources," she said.
The researcher said that one tell-tale sign of a possible trojan was that 1,369 of the account records appeared more than once and as some as many as five times.
"Phishing scams do not typically vet the usernames and passwords when they receive them," she said.
"The fact that there actually seems to be failed login attempts is much more indicative of a keylogger or some sort of trojan capture."
She also said on her blog post that previous lists of known phished accounts generally saw some victims left nonsensical messages as they realised that they were being phished, but this list had no such entries.
She said that although '123456' did appear in the list as a password, it still only appeared 63 times out of the 10,000 records, and by and large most of the users had respectable passwords, so were potentially less likely to fall for a phishing scam.
Microsoft and Google had not responded to our request for comment on Landesman's remarks at the time of publication.
Key considerations for implementing secure telework at scale
Identifying the security risks and advanced requirements of a remote workforceDownload now
The State of Salesforce 2020
Your guide to getting the most from SalesforceDownload now
Fast, flexible and compliant e-signatures for global businesses
Be at the forefront of digital transformation with electronic signaturesDownload now
Rethink your cybersecurity strategy for the new world
5 steps to secure the enterprise and be fit for a flexible futureDownload now