this post was submitted on 03 Jan 2024
826 points (94.1% liked)

Technology

59593 readers
3345 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Hope this isn't a repeated submission. Funny how they're trying to deflect blame after they tried to change the EULA post breach.

you are viewing a single comment's thread
view the rest of the comments
[–] BetaSalmon@lemmy.world 2 points 10 months ago (3 children)

How should the company be protecting user data, when - like you said -, the average person doesn't take cybersecurity seriously, are not techies, don't use a computer outside the office, and just want to log into their account with a password they remember?

Are you basically just saying the company should've enforced 2FA? Or maybe one of those "confirm you're logging in" emails, every time they want to log in?

[–] Adalast@lemmy.world 4 points 10 months ago (1 children)

From what I'm seeing, the hackers used the weak password accounts to access a larger vulnerability once they were behind the curtain. The company I work for deals with sensitive proprietary data daily and we are keenly aware that individuals should never have an opportunity to access the information if any other user. Things like single-user quarantining of data blocks are a minimum for security. Users log in and live on their own private island floating in a void. On top of that use behavior tracking to detect access patterns that attempt to exit the void and revoke credentials. That is also not even remotely mentioning that you have a single point of access entering thousands of accounts. That on it's own should be throwing enough red flags to pull down the webserver for a few minutes to hours. There is a lot they could have done.

[–] JohnEdwa@sopuli.xyz 4 points 10 months ago* (last edited 10 months ago)

It wasn't exploiting a vulnerability, they gained access to other peoples data because the site has a deliberate feature to share your data with your relatives if both have allowed that. That's why the term used is "scraped", they copied what the site showed.
When someone logs in to a Facebook account, it's not a vulnerability that they can now see all of the info their friends have set to "friends only", essentially.

Also they used a botnet so the login attempts weren't suspicious enough to do anything about - they weren't brute forcing a single user multiple times, but each trying once with the correct password.

[–] psud@lemmy.world 2 points 10 months ago

Yes, one of those "confirm it's you" emails. They're less intrusive than regular 2FA, and are only needed when a user logs in from a machine without the right cookie

[–] rainerloeten@lemmy.world 1 points 10 months ago

Hello, as I said, it's about "security by design", which means to design a system that 'doesn't allow for insecure things' in the first place. Like a microwave oven doesn't operate when the door is open. IT-/cyber-security is a complex field, but 2FA is a good place to start, regarding user facing services. There are lots more things than that of course.