The hacker who stole confidential Twitter documents used a feature of Microsoft's Hotmail to hijack an employee's work e-mail account, the site that has published some of the Twitter documents said Sunday.
According to TechCrunch, the Web site that last week broke the story about the Twitter breach and has posted some of the stolen information, the hacker calling himself Hacker Croll took advantage of poor password practices, Hotmail's inactive account feature, and personal information on the Web to pinch hundreds of Twitter documents.
[ Security is no laughing matter -- unless InfoWorld's Robert X. Cringely has something to say. Find out his take on the Twitter vs. TechCrunch tiff | Learn how to secure your systems with Roger Grimes' Security Adviser blog and newsletter, both from InfoWorld. ]
TechCrunch said it convinced Hacker Croll to divulge the details of his attack, and over the course of several days' conversations was able to piece together not only the original breach, but how some information he obtained allowed him to compromise the e-mail accounts of Evan Williams, Twitter's CEO, and one of its co-founders, Biz Stone.
Hacker Croll first jacked the personal Gmail account of a Twitter employee -- last week Stone identified the person as an administrative assistant with the company -- by resetting the account's password. To do that, Hacker Croll had to answer one or more personal questions used to authenticate the user. According to TechCrunch, Hacker Croll had previously researched this employee, and others at Twitter, by digging through the Internet for likely responses.
Security experts last week speculated that the same process used by a Tennessee college student to break into Alaska Gov. Sarah Palin's Yahoo e-mail account was at the root of the Twitter breach.
"[This was] about weak passwords that are easily guessable, with a huge contribution from people's habit of putting online information that they wouldn't otherwise share with anyone but their closest friends," Sam Masiello, vice president of information security at MX Logic said last week in an interview. "It's not hard to crack [password resets] with the information you can find freely available on social networking sites."
At that point, although Hacker Croll had control of the Twitter employee's personal Gmail account, he could not hide his tracks, as the user would have quickly known something was amiss the next time he or she tried to log on to Gmail, and was rebuffed.
"On requesting to recover the password, Gmail informed [Hacker Croll] that an email had been sent to the user??s secondary email account," wrote TechCrunch's Nik Cubrilovic. "Gmail offered a hint as to which account the email to reset the password was being sent to, in case the user required a gentle reminder. In this case the obfuscated pointer to the location of the secondary email account was ******@h******.com."