Feeds

RedHotAnt in security trouble, again

handing out passwords this time...

  • alert
  • submit to reddit

Build a business case: developing custom apps

RedHotAnt has clearly never heard of social engineering as a hacking technique.The Register has been informed that the company's tech support team seems to have no qualms about revealing a user's password to a caller without confirming his or her identity.

Upon calling RHA tech support to make an enquiry about the company's web site, RHA user, and Register reader, Simon Cooper was asked for his user ID and password. Being a security conscious fellow, he declined to give his password out over the phone.

Standard telephone security procedure at RHA is to ask for a user ID, the first line of the address and a post code to confirm identity.

Simon was thus astonished when, without requesting any information other than his user ID, the RHA employee proceeded to read his password back to him and asked him to confirm it.

He wasn't impressed with this, nor by her reassurances that he 'should not worry as there is no harm that people with access to my password could do.'

"Outside accessing my website, my e-mails, assuming my identity and causing widespread fraud under my name I guess she's right," says Simon.

Now, to access a RHA account a user must enter a user ID and a numeric "password", so it is true that with a password alone anyone wanting to fraudulently use Mr Cooper's account would have been stymied. But he had given his user ID too, and no attempt to verify his identity had been made.

"I could have left my ID written on a piece of paper somewhere. There was no way she could have been certain it was me," Mr Cooper told us. "It is like calling a bank with a ten digit account number and them giving you the pin number to access the account on the strength of that information."

We asked RedHotAnt to explain how this could have happened, but as yet, it has been unable to comment beyond reasserting its position that with only a password there is no way anyone could have accessed Mr Cooper's account.®

Related Stories:
RedHotAnt Speaks!
RedHotAnt calls in Old Bill
RedHotAnt hit by heavy users
Tradind Standards checks out RedHotAnt
Technical Problems hit RedHotAnt
Flat fee ISP slams user 'abuse'

A new approach to endpoint data protection

More from The Register

next story
Amazon says Hachette should lower ebook prices, pay authors more
Oh yeah ... and a 30% cut for Amazon to seal the deal
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Nintend-OH NO! Sorry, Mario – your profits are in another castle
Red-hatted mascot, red-colored logo, red-stained finance books
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
Feel free to BONK on the TUBE, says Transport for London
Plus: Almost NOBODY uses pay-by-bonk on buses - Visa
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?