Story image

Quora's been breached: Users, change your passwords

05 Dec 2018

Quora’s 100 million users are the latest targets in a major data breach, but at least the company has moved quickly to contain it.

Quora, a social website that allows users to ask and answer questions from others, sent out an announcement yesterday that notified users about the breach.

“On Friday [November 30] we discovered that some user data was compromised by a third party who gained unauthorised access to our systems,” the company says.

That third party may have accessed account and username information, including names, emails, IP addresses, user IDs, encrypted passwords, user account settings, and personalisation data.

Not every Quora users was affected, and some users have been affected more than others, Quora says. 

While user passwords were encrypted, Quora strongly recommends that people who use the same password across many different sites should change that password.

Users’ public questions, answers, blog posts, comments, drafts, and upvotes may also have been accessed. Anonymous users haven’t been affected by the breach because Quora doesn’t store their identities.

But the damage doesn’t stop there – the third party may have accessed data from linked networks, such as contacts, interests, demographic interests, as well as access tokens that have now been rendered useless.

Cybersecurity firm Thycotic’s chief security scientist Joseph Carson says the linked networks are particularly concerning.

“Common organisations have used social logins to create news accounts and in doing so the customers allow access to their social media accounts which sometimes includes friend contacts, check-in information and more detailed contact information beyond what you would normally include when creating accounts,” Carson says.

“Another day of password resets will continue to cause cyber fatigue and it’s very likely that the passwords exposed here are the same passwords people are using for their corporate email account or even their bank account. Password reuse is the biggest risk that people take today.”

While some people may wonder if the stolen information may be used in identity theft, Quora says it’s highly unlikely because it doesn’t collect ‘sensitive personal information’ like credit cards and government IDs.

However, you don’t necessarily need financial information to conduct identity theft – names, emails and locations can be enough.

Quora says it has already put in place security measures while the investigation into the breach continues.

It is currently working with law enforcement and a digital forensics firm to help with the investigation.

“We’re in the process of notifying users whose data has been compromised.

"Out of an abundance of caution, we are logging out all Quora users who may have been affected, and, if they use a password as their authentication method, we are invalidating their passwords.

"We believe we’ve identified the root cause and taken steps to address the issue, although our investigation is ongoing and we’ll continue to make security improvements.”

Quora recognises its responsibility to keep users safe and admits it failed. 

“We recognise that in order to maintain user trust, we need to work very hard to make sure this does not happen again,” the company says.

“There’s little hope of sharing and growing the world’s knowledge if those doing so cannot feel safe and secure, and cannot trust that their information will remain private. We are continuing to work very hard to remedy the situation, and we hope over time to prove that we are worthy of your trust.”

Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.