Reddit suffers massive breach as all user data before 2007 is compromised

SMS-based two-factor authentication is "not as secure as we thought" the company admits

Reddit has announced it had suffered a "serious attack" in June after a malicous actor intercepted its employees' SMS-based two-factor authentication (2FA) setup.

An attacker compromised a handful of Reddit employees' accounts between 14 and 18 June and gained access to some recent user data, such as email addresses, and all data from between 2005 and 2007, including account credentials and email addresses.

Advertisement - Article continues below

Announcing the breach following an investigation, the social news aggregator said it now realises text message-based 2FA is "not nearly as secure as we would hope" and has recommended everyone moves to token-based 2FA - after identifying this as the most likely point of intrusion.

"Although this was a serious attack, the attacker did not gain write access to Reddit systems; they gained read-only access to some systems that contained backup data, source code and other logs," CTO Chris Slowe posted on Reddit's announcements page.

"They were not able to alter Reddit information, and we have taken steps since the event to further lock down and rotate all production secrets and API keys, and to enhance our logging and monitoring systems."

Slowe said the company became aware of the breach the following day, on 19 June, and had been working with cloud and source code hosting providers to best understand the full extent of what was compromised.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Among other information accessed were tailored 'email digests' sent to users between 3 and 17 June this year, each linked with a username and email address, as well as other data such as Reddit source code, internal logs, and employee workspace files.

Reddit says it has reported the incident to the relevant authorities and is forcing password-resets for users who may have been affected by the incident. Moreover, the company is taking measures to improve security beyond SMS-based 2FA - including enhanced logging, more encryption and token-based 2FA.

The incident highlights the frailty of SMS-based 2FA, with industry voices overwhelming castigating text message as a secure authentication method in the wake of this breach. Phone number hijacking, for instance, spiked shortly after SMS-based 2FA became widely adopted, according to Toby Murray, a computing lecturer at the University of Melbourne.

Even in 2016 the US Federal Trade Commission's chief technologist Lorrie Cranor issued a warning about the ease by which attackers can steal mobile phone numbers in order to bypass 2FA and compromise their sensitive data, after it happened to herself.

Advertisement - Article continues below

"Having a mobile phone account hijacked can waste hours of a victim's time and cause them to miss important calls and messages. However, this crime is particularly problematic due to the growing use of text messages to mobile phones as part of authentication schemes for financial services and other accounts," she wrote on the FTC's website.

"The security of two-factor authentication schemes that use phones as one of the factors relies on the assumption that someone who steals your password has not also stolen your phone number.

"Thus, mobile carriers and third-party retailers need to be vigilant in their authentication practices to avoid putting their customers at risk of major financial loss and having email, social network, and other accounts compromised."

Meanwhile, Reddit's Chris Slowe also announced the company had hired its first head of security two-and-a-half months ago, who he would not identify by name, adding "he has been put through his paces in his first few months".

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/security/vulnerability/356295/microsoft-patches-high-risk-flaws-that-can-be-exploited-with-a
vulnerability

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020
Visit/security/34616/the-top-password-cracking-techniques-used-by-hackers
Security

The top 12 password-cracking techniques used by hackers

12 Jun 2020