Feeds

Man hijacks 90 eBay accounts

Lax security, careless users

Top 5 reasons to deploy VMware with Tegile

An Australian man pleaded guilty to breaking into eBay and a local bank to steal AU$42,000 (about $34,000), in a case that demonstrates the problem of account takeovers on the auction site.

Dov Tenenboim, 21, of the Sydney suburb of North Bondi, stood accused of breaking into at least 90 different eBay seller accounts last year, mostly by guessing passwords. Tenenboim frequently figured out the credentials by matching usernames to passwords, prosecutors said. Other times he hacked into email accounts.

Following a familiar route, Tenenboim targeted users with highly favorable feedback ratings from their eBay peers. Posting under the guise of a trusted user with an established account makes it easier to dupe buyers.

After hacking the accounts, Tenenboim used them to advertise non-existent iPods, according to the Sydney Morning Herald. He also hacked into the Commonwealth Bank. He pleaded guilty to two counts of making a false statement to obtain money, two counts of obtaining money by deception and four counts of committing an unauthorized computer function. Tenenboim faces a maximum of 11 years in jail and fines of $9,900.

Account takeovers have been a persistent problem on eBay. Over the past several weeks, we've observed hundreds of fraudulent auctions being offered by users with unblemished records. Such hijackings are on the rise, according to a small but vocal group of eBay users, who also claim the breaches are the result of an unpatched security hole in the company's defenses.

eBay strongly denies such a hole and says the takeovers are the result of users having their log-in credentials snatched through lax passwords and phishing attacks. Tenenboim's methods appear consistent with such statements.

But eBay can't be let off the hook completely. The company employs lax password requirements that, for instance, allow a user ID of james34231 and a password of james34. (To be fair, Google Mail allowed the same combination, though the site warned it was only "fair.")

What's more, eBay, like the vast majority of online services, has no mechanism in place to allow account holders to log in using security keys that generate random numbers every minute or so. Such devices would render most current password attack methods ineffective.

eBay has said it is in the early stages of testing such a system for its PayPal users, and a spokeswoman says the key will also work on eBay. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.