Microsoft owns up to Xbox Live pretexting
'This situation shouldn't have happened,' says an Xbox exec
Computerworld - Months after Xbox Live users began complaining of hacked accounts, Microsoft Corp. yesterday acknowledged that the service's support staff is at fault, victims of "pretexting" calls by identity thieves.
Reports of account theft on Xbox Live have been making the rounds of its member forums since at least December. But Microsoft responded only after noted security researcher -- Kevin Finisterre of "Month of Apple Bugs" fame -- last week went public about how his account was hijacked.
As recently as Friday, the company was saying only that it had "found no evidence" of a data breach and that any thefts had occurred could be blamed on users giving out personal information.
That assertion changed yesterday. "A security researcher, Kevin Finisterre, discovered not a hack, but the fact that some accounts may have been compromised as a result of 'social engineering,' also known as 'pretexting,' through our support center," said Larry Hryb, director of programming at Xbox Live, in a blog entry. "Once I realized what he was talking about -- he sent me some painful-to-listen-to audio files -- I confirmed that the team is fully aware of this issue. They are examining the policies and have already begun retraining the support staff and partners to help make sure we reduce this type of social engineering attack.
"There's no other way to say it; this situation shouldn't have happened. Our customers deserve better," Hryb added.
The audio file Hryb referred to was provided to Computerworld by Finisterre last Wednesday, and was one of two user accounts described in an earlier story about Xbox Live support representatives and pretexting.
Although most users who posted comments to Hryb's blog entry were appreciative of the mea culpa, some were pessimistic about the chances that support would actually improve. "No surprise here. We've been telling you from Day One that Xbox/Xbox Live support is a joke," wrote someone identified as TH3Hammer. "You're right ... we DO deserve better, but I guarantee that it won't get better."
"I have ZERO faith in ms xbox support. No one I know does either," wrote jmel, another user. "Retrained? Thanks major, but its [sic] gonna take MUCH more, and it shouldn't take this kinda crap to wake up the decision makers at ms."
Many more users, worried about not only account theft but also the ease with which fraudsters were able to get support representatives to spill personal information, urged Microsoft to untangle credit card accounts from Xbox Live. "It would help if we could remove our credit card information after we've used it instead of it being stored on the system (or even the console) forever just waiting to be pretexted," wrote Joergen8.
- Fight Malware, Malfeasance and Malingering Every year brings more extreme sets of threats than the last. The good news is that there are a range of mitigation options....
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts