Story image

Quora's been breached: Users, change your passwords

05 Dec 18

Quora’s 100 million users are the latest targets in a major data breach, but at least the company has moved quickly to contain it.

Quora, a social website that allows users to ask and answer questions from others, sent out an announcement yesterday that notified users about the breach.

“On Friday [November 30] we discovered that some user data was compromised by a third party who gained unauthorised access to our systems,” the company says.

That third party may have accessed account and username information, including names, emails, IP addresses, user IDs, encrypted passwords, user account settings, and personalisation data.

Not every Quora users was affected, and some users have been affected more than others, Quora says. 

While user passwords were encrypted, Quora strongly recommends that people who use the same password across many different sites should change that password.

Users’ public questions, answers, blog posts, comments, drafts, and upvotes may also have been accessed. Anonymous users haven’t been affected by the breach because Quora doesn’t store their identities.

But the damage doesn’t stop there – the third party may have accessed data from linked networks, such as contacts, interests, demographic interests, as well as access tokens that have now been rendered useless.

Cybersecurity firm Thycotic’s chief security scientist Joseph Carson says the linked networks are particularly concerning.

“Common organisations have used social logins to create news accounts and in doing so the customers allow access to their social media accounts which sometimes includes friend contacts, check-in information and more detailed contact information beyond what you would normally include when creating accounts,” Carson says.

“Another day of password resets will continue to cause cyber fatigue and it’s very likely that the passwords exposed here are the same passwords people are using for their corporate email account or even their bank account. Password reuse is the biggest risk that people take today.”

While some people may wonder if the stolen information may be used in identity theft, Quora says it’s highly unlikely because it doesn’t collect ‘sensitive personal information’ like credit cards and government IDs.

However, you don’t necessarily need financial information to conduct identity theft – names, emails and locations can be enough.

Quora says it has already put in place security measures while the investigation into the breach continues.

It is currently working with law enforcement and a digital forensics firm to help with the investigation.

“We’re in the process of notifying users whose data has been compromised.

"Out of an abundance of caution, we are logging out all Quora users who may have been affected, and, if they use a password as their authentication method, we are invalidating their passwords.

"We believe we’ve identified the root cause and taken steps to address the issue, although our investigation is ongoing and we’ll continue to make security improvements.”

Quora recognises its responsibility to keep users safe and admits it failed. 

“We recognise that in order to maintain user trust, we need to work very hard to make sure this does not happen again,” the company says.

“There’s little hope of sharing and growing the world’s knowledge if those doing so cannot feel safe and secure, and cannot trust that their information will remain private. We are continuing to work very hard to remedy the situation, and we hope over time to prove that we are worthy of your trust.”

JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.
Juniper simplifies data integration to improve threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.