Story image

Time capsule app TimeHop breached, 21 million users affected

10 Jul 2018

US-based time capsule app TimeHop suffered a data breach on July 4 that affected 21 million users.

This intrusion led to a breach of some data including names, email addresses, and some phone numbers. In a statement released on its site, TimeHop says, “No private/direct messages, financial data, or social media or photo content, or Timehop data including streaks were affected.”

The statement details how the breach unfolded.

At 2:04 US Eastern Time in the afternoon of July 4, Timehop observed a network intrusion.

The breach occurred because an access credential to TimeHop’s cloud computing environment was compromised.

That cloud computing account had not been protected by multifactor authentication.

TimeHop said it has now taken steps that include multifactor authentication to secure authorisation and access controls on all accounts.

The attack was detected, and two hours and nineteen minutes later, and TimeHop’s engineers locked out the attackers.

Cybersecurity companies have chimed in to comment on the breach.

RedLock CEO and co-founder Varun Badhwar says, “27% of organisations have experienced potential account compromises.

“When organisations embrace the shared responsibility model of cloud computing, which directs them to provide their own security ‘in’ the cloud, and when they adopt a cloud threat defence strategy, account compromises can be mitigated, if not totally prevented.”

Barracuda Networks network security VP and general manager Dr Klaus Gheri says, “This follows a trend for basic security best practices not being followed by organisations who should know better.

“While it’s heartening to see that Timehop is now using multi-factor authentication (MFA) since the breach took place, they should have used it from the beginning. “With 83% of organisations using public cloud for storage (according to a survey we carried out last year), not following basic security advice like this is potentially giving criminals a very successful and easy ‘back door’ into thousands of organisations worldwide,” Gheri says.

Verodin behavioural research team head James Lerud says, “Timehop were able to begin remediation actions about two hours after detecting malicious activity, which is a very good response time.

“Their decision to deactivate access tokens is the right move, but should also serve as a reminder to regularly review what apps have access to your social media accounts."

ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.