We will often keep an eye on current events to find practical examples to use as evidence in support of our recommended best practices, but a relatively recent Spotify hack has given us a special opportunity. We now have the opportunity to use this one story to reinforce not one, but two such practices. Let’s dive in, shall we?
Basically, hackers were recently able to access 350,000 Spotify accounts without needing to infiltrate the streaming service. Rather, the hackers responsible used login credentials from other sites and services that had been exposed in other data breaches.
By taking the credentials from these other websites, these hackers simply went down the list and tested them out on Spotify. Known as credential stuffing, this is a very simple tactic that hackers will often use.
This kind of thing is what takes the already-bad password breach and makes it terrible, only getting worse with each platform secured by the recycled credentials. Practices like credential stuffing are precisely why the prevailing wisdom to have a unique password for every account you have—particularly work accounts or those with sensitive or financial data—exists. It also doesn’t hurt to have these passwords locked away in an encrypted password management tool if you need help remembering them.
The second lesson actually comes from the actions of those responsible for the breach. From them, we can learn how important it is to secure any data you are in possession of.
After all, their failing to do so led to the discovery and mitigation of this breach in the first place.
Two security researchers were conducting a simple Internet scan for unsecured data, including some which was present in the attacker’s cache. The hackers had chosen to store their stolen credentials on an unsecured cloud database. In doing so, anyone who happened to stumble upon the collection could gain access without a password. Hypothetically speaking, this meant that other hackers and cybercriminals could have located the stash and copied them for their own nefarious purposes.
Fortunately, this discovery allowed Spotify to be alerted and prompt a password reset for all affected users… for Spotify specifically, that is. There’s still the potential for those credentials to be used elsewhere on the Internet for unauthorized access.
Therefore, the real lesson here is to make sure that your cybersecurity standards are up to par. SCW can help you do that. Reach out to us at (509) 534-1530 to learn how our managed services can assist your cybersecurity without negatively influencing your productivity.
About the author
Sam is a network engineer with a broad range of experience spanning more than 35 years. He wrote is first piece of code in 1979 and has been involved with the industry ever since. For the last 20 years, he has worked for SCW Consulting where he has embraced his passion for network technology and security.
Mobile? Grab this Article!
Tag Cloud
Comments