Feeds

Ethical hacker backer hacked, warns of email ransack

Switches registrars, tightens security after 'upsetting' incident

Intelligent flash storage arrays

The IT security certification body that runs the Certified Ethical Hacker programme has itself been hacked.

The EC-Council said the same hackers who ran the DNS poisoning attack that resulted in the defacement of its website in late February had also managed to access the control panel for its website after breaking into the systems of a third-party registrar. This compromised access allowed the miscreants to circumvent security controls and get into the security organisation's email system, as a breach notice from the EC-Council to its members explains.

EC-Council uses a cloud service provider for enterprise email. Once the domain privilege was attained, the hacker then issued a password reset request to the email service provider. This circumvented EC-Council's best practices of using complex passwords and 2-factor authentication. We have informed the service provider of this password reset policy vulnerability and are hopeful that they have already rectified it for the benefit of the IT community in general.

With administrative access to the email service provider, the hacker was able to compromise a small number of email accounts before the EC-Council security team was able to respond to the breach.This resulted in unauthorized access to messages in those specific email boxes for a short duration of time.

The investigation into the breach is still ongoing and it's unclear which member data, if any, has been exposed. Credit card transactions are run through a different system that wasn't exposed by the attack but any private information sent by email might have been compromised, although this is uncertain.

"As a precautionary measure, we are writing to notify members that have sent any personally identifiable information to EC-Council via email that there is a possibility that these may have been exposed through email," the breach notification from the EC-Council explains. "No credit card data was compromised."

The US-based EC-Council runs the Certified Ethical Hacker programme, C|EH and other certifications. The organisation – whose tagline is Hackers are here. Where are you? – asks members to submit sensitive data such as passport details as part of its registration process. The leak of this data is obviously the main concern raised by the breach.

In response to the incident, the EC-Council has promised to tighten up its security procedures.

The organisation said in a statement on the breach that went out on yesterday:

EC-Council strives to set a very high bar for how they serve their community, and this incident is upsetting. EC-Council has since transferred their domain to another registrar, changed policies on management of personal information, improved existing data retention policies, introduced two-factor authentication for member portals, and improved security procedures and systems. ®

Bootnote

A shout-out to Mark, an infosec contractor going for CEH accreditation, who tipped us off about the EC-Council's breach notification to its members.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.