Buffer encrypts access tokens after spammer hack
Buffer said it is now encrypting OAuth access tokens and added a security parameter to its API calls
IDG News Service - Buffer, a service for scheduling social media posts, said Sunday it has strengthened its security after spammers gained access to its network.
On Saturday, Buffer halted all social media postings after a raft of spam coming from Buffer accounts hit Facebook and Twitter. Later that day, service was restored, but Buffer advised users to access their accounts from its main URL rather than from its mobile applications.
Buffer, based in San Francisco, said Sunday it is encrypting OAuth access tokens, which allow users to grant another application access to a service without revealing their password. Buffer also added a new security parameter to its API (applications programming interface) calls.
"We have greatly increased security of how we are posting to Twitter and Facebook and have confidence to cover the security holes the hackers have used to break into our system," wrote Joel Gascoigne, Buffer's founder.
Facebook said 30,000 Buffer users who had accounts on its service had spam issues, which is about 6.3% of the 476,343 Facebook accounts that are connected to Buffer, Gascoigne wrote. Buffer users will need to reconnect their Twitter accounts but not their Facebook ones. Posts that were scheduled to be published on Facebook during the outage will need to be resent.
Gascoigne wrote he expects Buffer to publish a more detailed update on the hack later.
"We're working with several security experts on tracking down exactly how it was possible for the spammers to get into our system," he wrote. "We're making good progress on this, this morning."
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts