Feeds

RedHotAnt in security trouble, again

handing out passwords this time...

  • alert
  • submit to reddit

Internet Security Threat Report 2014

RedHotAnt has clearly never heard of social engineering as a hacking technique.The Register has been informed that the company's tech support team seems to have no qualms about revealing a user's password to a caller without confirming his or her identity.

Upon calling RHA tech support to make an enquiry about the company's web site, RHA user, and Register reader, Simon Cooper was asked for his user ID and password. Being a security conscious fellow, he declined to give his password out over the phone.

Standard telephone security procedure at RHA is to ask for a user ID, the first line of the address and a post code to confirm identity.

Simon was thus astonished when, without requesting any information other than his user ID, the RHA employee proceeded to read his password back to him and asked him to confirm it.

He wasn't impressed with this, nor by her reassurances that he 'should not worry as there is no harm that people with access to my password could do.'

"Outside accessing my website, my e-mails, assuming my identity and causing widespread fraud under my name I guess she's right," says Simon.

Now, to access a RHA account a user must enter a user ID and a numeric "password", so it is true that with a password alone anyone wanting to fraudulently use Mr Cooper's account would have been stymied. But he had given his user ID too, and no attempt to verify his identity had been made.

"I could have left my ID written on a piece of paper somewhere. There was no way she could have been certain it was me," Mr Cooper told us. "It is like calling a bank with a ten digit account number and them giving you the pin number to access the account on the strength of that information."

We asked RedHotAnt to explain how this could have happened, but as yet, it has been unable to comment beyond reasserting its position that with only a password there is no way anyone could have accessed Mr Cooper's account.®

Related Stories:
RedHotAnt Speaks!
RedHotAnt calls in Old Bill
RedHotAnt hit by heavy users
Tradind Standards checks out RedHotAnt
Technical Problems hit RedHotAnt
Flat fee ISP slams user 'abuse'

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?