Microsoft confirms phishers stole 'several thousand' Hotmail passwords
Denies security breach of the service; phishing expert calls it 'one of the biggest' ever
Computerworld - Microsoft today confirmed that thousands of Windows Live Hotmail account usernames and passwords had leaked to the Internet, but said the credentials were "likely" stolen in a phishing attack.
The company denied that its Web-based e-mail service had been hacked and the account log-in information stolen because of some lapse on its part.
Earlier today, Neowin.net reported that more than 10,000 accounts had been compromised and speculated that Hotmail had either suffered a breach or an aggressive phishing campaign had collected the usernames and passwords by duping people into divulging the information.
"We determined that this was not a breach of internal Microsoft data and initiated our standard process of working to help customers regain control of their accounts," a Microsoft spokeswoman said in an e-mail to questions posed earlier today by Computerworld.
Microsoft did acknowledge that Hotmail accounts had been compromised. "Over the weekend Microsoft learned that several thousand Windows Live Hotmail customers' credentials were exposed on a third-party site due to a likely phishing scheme," the same spokeswoman added.
"That's a big result for a phishing campaign," said Dave Jevans, the chairman of the Anti-Phishing Working Group (APWG), an industry association dedicated to fighting online identity theft. "But it's not outside the realm of possibility. We've seen 50,000 to 75,000 [compromised] accounts when phishers target an ISP with millions of users."
Hotmail has about 400 million registered users, according to Microsoft, although the company declined to spell out how many are active users of the service.
"A .05% rate, which is what 100,000 users would represent, isn't unreasonable for 10 to 20 million users," Jevans said. "They wouldn't have to spam every [Hotmail] user to get that."
According to Neowin.net, which first reported the Hotmail incident, more than 10,000 accounts had been compromised. However, Neowin said it had seen only a partial list -- accounts with usernames starting with "A" or "B" -- and suspected that the total could be much larger.
If the 10,000 accounts for A-B are extrapolated to the full alphabet, it's possible that over 100,000 accounts were compromised. "If that's the case, this would definitely be one of the biggest single phishing events," said Jevans. "But it could be the result of a long period of time, months and months of harvesting."
Although the number of phishing attacks declined earlier this year, they have recent stormed back, said Jevans. "They're close to, or at, an all-time peak," he said.
Both Microsoft and Jevans recommended that all Hotmail users change their passwords, just in case. "Change it, ASAP," urged Jevans.
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts