{"id":23126,"date":"2022-05-24T10:19:27","date_gmt":"2022-05-24T14:19:27","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=23126"},"modified":"2022-05-25T15:00:25","modified_gmt":"2022-05-25T19:00:25","slug":"hackers-able-to-hack-online-accounts-even-before-registration","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/hackers-able-to-hack-online-accounts-even-before-registration\/","title":{"rendered":"Hackers Able To Hack Online Accounts Even Before Registration"},"content":{"rendered":"<p data-ar-index=\"0\"><span style=\"font-weight: 400;\">Research shows that hackers may hijack online accounts before users even register them by exploiting flaws that have since been fixed on popular websites such as Instagram, LinkedIn, Zoom, WordPress, and Dropbox.<\/span><\/p>\n<p data-ar-index=\"2\"><span style=\"font-weight: 400;\">Andrew Paverd, a researcher at Microsoft Security Response Center, and Avinash Sudhodanan, an independent security researcher, studied 75 popular online services and discovered that at least 35 are high-risk for account pre-hijacking attacks.<\/span><\/p>\n<p data-ar-index=\"4\"><span style=\"font-weight: 400;\">These attacks differ in type and severity, but they all emanate from poor security practices of the websites concerned.<\/span><\/p>\n<p data-ar-index=\"6\"><span style=\"font-weight: 400;\">&#8220;The impact of account pre-hijacking attacks is the same as that of account hijacking. Depending on the nature of the target service, a successful attack could allow the attacker to read\/modify sensitive information associated with the account such as messages, billing statements, usage history, etc. or perform actions through the victim&#8217;s online identity,\u201d said Sudhodanan.\u00a0<\/span><\/p>\n<p data-ar-index=\"8\"><span style=\"font-weight: 400;\">A hacker makes an account on a vulnerable site via a user&#8217;s email address and hopes that the victim labels it as spam. The hacker then waits for the victim to create an account on the site or indirectly tricks them into creating one.<\/span><\/p>\n<p data-ar-index=\"10\"><span style=\"font-weight: 400;\">In the process, there are five different attacks that hackers can perform, namely the classic-federated merge (CFM), the unexpired session (US) ID, the trojan identifier (TID), the unexpired email change (UEC), and the non-verifying Identity provider (IdP) attack (NV).<\/span><\/p>\n<p data-ar-index=\"12\"><span style=\"font-weight: 400;\">Among the five, research shows that the unexpired session is the most common type of attack.<\/span><\/p>\n<p data-ar-index=\"14\"><span style=\"font-weight: 400;\">Majority of online services today require new users to verify ownership of the email address. Hence, making new accounts using an individual\u2019s email address will not proceed without access to the user\u2019s email account.<\/span><\/p>\n<p data-ar-index=\"16\"><span style=\"font-weight: 400;\">To bypass this, the hacker can make the account using their email address and then switch to the victim&#8217;s email address, abusing a common functionality present in most online services.<\/span><\/p>\n<p data-ar-index=\"18\"><span style=\"font-weight: 400;\">Examples of platforms in high-risk for such attacks include Dropbox (UEC), Instagram (TID), LinkedIn (US), WordPress.com (US and UEC), and Zoom (CFM and NV).<\/span><\/p>\n<p data-ar-index=\"20\"><span style=\"font-weight: 400;\">To help mitigate this kind of attack, users are advised to set up multi-factor authentication on their accounts as soon as possible, as this would cause all past sessions to be invalidated.<\/span><\/p>\n<p data-ar-index=\"21\">\n<p data-ar-index=\"22\"><span style=\"font-weight: 400;\">For more information, read the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-can-hack-your-online-accounts-before-you-even-register-them\/\" target=\"_blank\" rel=\"noopener\">original story<\/a> in Bleepingcomputer. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research shows that hackers may hijack online accounts before users even register them by exploiting flaws that have since been fixed on popular websites such as Instagram, LinkedIn, Zoom, WordPress, and Dropbox. Andrew Paverd, a researcher at Microsoft Security Response Center, and Avinash Sudhodanan, an independent security researcher, studied 75 popular online services and discovered [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[378,381,361,16],"tags":[],"class_list":["post-23126","post","type-post","status-publish","format-standard","hentry","category-digital-transformation","category-operations","category-privacy","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=23126"}],"version-history":[{"count":1,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23126\/revisions"}],"predecessor-version":[{"id":23154,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23126\/revisions\/23154"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=23126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=23126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=23126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}