/plushcap/analysis/cloudflare/the-four-critical-security-flaws-that-resulte

The Four Critical Security Flaws that Resulted in Last Friday's Hack

What's this blog post about?

On June 4th, 2012, Matthew Prince reported a hacking incident that targeted his personal Gmail account and subsequently compromised CloudFlare's email accounts. The hack was made possible by four key security flaws: AT&T redirecting voicemail to a fraudulent box, Google's account recovery process being tricked by the fraudulent voicemail, a flaw in Google's Enterprise Apps account recovery process allowing two-factor authentication bypass, and CloudFlare BCCing transactional emails to some administrative accounts. To mitigate these risks, Prince suggests enabling two-factor authentication using apps like Google Authenticator instead of relying on phone networks, removing phone numbers from Google accounts, and not BCCing password reset messages to administrative accounts. The hack lasted less than 2 hours, with the hackers in Gmail for about an hour and a half, and CloudFlare's email accounts for around 28 minutes.

Company
Cloudflare

Date published
June 4, 2012

Author(s)
Matthew Prince

Word count
596

Language
English

Hacker News points
None found.


By Matt Makai. 2021-2024.