Amazon.com security slip allowed unlimited password guesses on mobile apps
The problem, now fixed, affected Amazon.com's iOS and Android mobile apps
IDG News Service - A gaping hole in Amazon.com's mobile application, now fixed, allowed hackers to have an unlimited number of attempts guessing a person's password, according to security vendor FireEye.
If users enter their password incorrectly 10 times on the Amazon.com website, the company requires them to solve the squiggle of characters known as a CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart). The CAPTCHA is intended to thwart automated programs that will rapidly try different passwords.
But Amazon.com did not show a CAPTCHA on its mobile applications for the iOS and Android platforms, allowing unlimited guesses, according to FireEye researchers Min Zheng, Tao Wei and Hui Xue, who wrote of their findings on FireEye's blog.
FireEye notified Amazon.com of the problem on Jan. 30, and Amazon.com told the security company on Feb. 19 it had been fixed.
The username for many Amazon.com customers is their email address, which is usually easy for hackers to obtain. Due to other data breaches, there are large lists of commonly used passwords circulating on the Web, which could be incorporated into an automated program to see if an account can be validated.
"What makes things worse, many people just use the same password across different websites, so attackers can control more accounts than just Amazon's after figuring out the password," Wei said via email.
In a blog post, the FireEye researchers wrote that Amazon.com does not require so-called "strong" passwords. It is possible to use weak passwords such as "123456" and "111111," which puts accounts at risk.
The researchers created an exploit for the 2.8.0 version of Amazon.com's Android shopping client that cracked the password of an account they created. "This exploit tried 1,000 incorrect attempts before it successfully cracked the password," they wrote.
The problem may have been an oversight by Amazon, but Wei said "we have found security issues around passwords in many mobile apps from various vendors."
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts