Could Hotmail password theft be due to a trojan?
A researcher says there is evidence that not all of the Gmail and Hotmail account passwords were taken as a result of phishing.
Although Microsoft and Google have both said that the passwords were taken as a result of phishing, ScanSafe security researcher Mary Landesman said there was no way that the companies could have been totally sure of this.
Speaking to IT PRO she said: "No offence to, and I don't mean to undermine either Microsoft and Google, but certainly neither one of them can actually definitively either."
"I think they came out with phishing as the most likely explanation in their minds without having really gone over the lists in great detail," she added.
Landesman said that there were a lot of indicators in the password lists that are consistent with data theft rather than phishing.
"It doesn't mean that 100 per cent of the list was derived from either source [phishing or trojan], more likely a combination of sources," she said.
The researcher said that one tell-tale sign of a possible trojan was that 1,369 of the account records appeared more than once and as some as many as five times.
"Phishing scams do not typically vet the usernames and passwords when they receive them," she said.
"The fact that there actually seems to be failed login attempts is much more indicative of a keylogger or some sort of trojan capture."
She also said on her blog post that previous lists of known phished accounts generally saw some victims left nonsensical messages as they realised that they were being phished, but this list had no such entries.
She said that although '123456' did appear in the list as a password, it still only appeared 63 times out of the 10,000 records, and by and large most of the users had respectable passwords, so were potentially less likely to fall for a phishing scam.
Microsoft and Google had not responded to our request for comment on Landesman's remarks at the time of publication.
Digital document processes in 2020: A spotlight on Western Europe
The shift from best practice to business necessityDownload now
Four security considerations for cloud migration
The good, the bad, and the ugly of cloud computingDownload now
VR leads the way in manufacturing
How VR is digitally transforming our worldDownload now
Deeper than digital
Top-performing modern enterprises show why more perfect software is fundamental to successDownload now