Story image

Quora's been breached: Users, change your passwords

05 Dec 2018

Quora’s 100 million users are the latest targets in a major data breach, but at least the company has moved quickly to contain it.

Quora, a social website that allows users to ask and answer questions from others, sent out an announcement yesterday that notified users about the breach.

“On Friday [November 30] we discovered that some user data was compromised by a third party who gained unauthorised access to our systems,” the company says.

That third party may have accessed account and username information, including names, emails, IP addresses, user IDs, encrypted passwords, user account settings, and personalisation data.

Not every Quora users was affected, and some users have been affected more than others, Quora says. 

While user passwords were encrypted, Quora strongly recommends that people who use the same password across many different sites should change that password.

Users’ public questions, answers, blog posts, comments, drafts, and upvotes may also have been accessed. Anonymous users haven’t been affected by the breach because Quora doesn’t store their identities.

But the damage doesn’t stop there – the third party may have accessed data from linked networks, such as contacts, interests, demographic interests, as well as access tokens that have now been rendered useless.

Cybersecurity firm Thycotic’s chief security scientist Joseph Carson says the linked networks are particularly concerning.

“Common organisations have used social logins to create news accounts and in doing so the customers allow access to their social media accounts which sometimes includes friend contacts, check-in information and more detailed contact information beyond what you would normally include when creating accounts,” Carson says.

“Another day of password resets will continue to cause cyber fatigue and it’s very likely that the passwords exposed here are the same passwords people are using for their corporate email account or even their bank account. Password reuse is the biggest risk that people take today.”

While some people may wonder if the stolen information may be used in identity theft, Quora says it’s highly unlikely because it doesn’t collect ‘sensitive personal information’ like credit cards and government IDs.

However, you don’t necessarily need financial information to conduct identity theft – names, emails and locations can be enough.

Quora says it has already put in place security measures while the investigation into the breach continues.

It is currently working with law enforcement and a digital forensics firm to help with the investigation.

“We’re in the process of notifying users whose data has been compromised.

"Out of an abundance of caution, we are logging out all Quora users who may have been affected, and, if they use a password as their authentication method, we are invalidating their passwords.

"We believe we’ve identified the root cause and taken steps to address the issue, although our investigation is ongoing and we’ll continue to make security improvements.”

Quora recognises its responsibility to keep users safe and admits it failed. 

“We recognise that in order to maintain user trust, we need to work very hard to make sure this does not happen again,” the company says.

“There’s little hope of sharing and growing the world’s knowledge if those doing so cannot feel safe and secure, and cannot trust that their information will remain private. We are continuing to work very hard to remedy the situation, and we hope over time to prove that we are worthy of your trust.”

ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."
Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
IXUP goes "post-quantum" with security tech upgrade
The secure analytics company has also partnered with Deloitte as a reseller, and launched a SaaS offering on Microsoft Azure.
Infoblox appoints channels head for A/NZ
Kenneth Cartwright’s appointment extends Infoblox’s position in secure cloud-managed network services throughout the region.
ExtraHop’s new partner program for enterprise security
New accreditations and partner portal enable channel partners to fast-track their expertise and build their security businesses.
Hackers increasingly ‘island hopping’ – so what does it mean?
Carbon Black's Rick McElroy discusses this new trend and what it means for the new age of cybercrime.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.