I’m sitting here, in the dark, when I should be sleeping.Â Thinking about how 100 different iCloud accounts were manipulated to give up their secrets.Â We should all be taking a hard look at what constitutes account recovery in this day and age of the internet. Disclaimer – I haven’t had a coffee yet this morning. Â If I sound like a raving lunatic, this may be why.
As the dust settles,Â it appears that the attackers walked in the front door. Â Well, the side door actually. Â Data is sketchy, but it looks like account recovery processes at Apple were manipulated to give access to attackers. Â Why can this even happen?
1. Â We design only for the Lowest Common Denominator
WhenÂ an account recovery loop is assembled by a service, it is the same loopÂ regardless of who you are. Or how savvy you are. Â Or how likely you are to be targeted for a given threat. Â Why is this? Â Why not keep the base recovery experience as the one where you get if you can barely spell computer and these password things are scary. Â But why not let people with stronger needs self-identify? Â Allow people to ask to jump through more hoops, to supply more, and better, information in order to receive more, and better protection from targeted attacks?
I know exactly why this kind of “better security” doesn’t happen. Â Because for every JLaw attack, where the security could have helped, there are 10,000 regular people who would turn on a feature like this and then get locked out of their account. Â There, I said it. The lowest common denominator is: that the public expects is that even ifÂ they do everything wrong, even if they cannot in any reasonable or provable way identify themselves as the actualÂ owner of the account, theyÂ should still get their data back. Â And the cost of dealing with those 10,000 upset locked-out people, both in PR and support terms is very real. Â More real and more common than cost associated with the relatively few that get hacked.
2. We have purposely created a Stateless Machine
When you choose to try to recover an account today, you generally do so in a vacuum. Â You are asked to identify yourself, and the information you give is often considered in isolation. Â Do these two strings representing your dog’s name and your first school match the hashed strings stored in our database? Â Yes? Â Great! Â Keys to the kingdom! Â Doesn’t matter that somebody has been trying and failing to do the same thing three times a day for the last week. Â No sense of suspicion is placed on this successÂ as a possible culmination to all those failures. Â This is part of why an attacker can keep calling help desks over and over until they succeed, and why they can keep using online forms over and over until they succeed. Â Also — see #1, whereby it isn’t that unusual for people to really fail at knowing their recovery information and to still expect success.
The whole reason these systems were built to be stateless is because they were built to scale. Â But those requirements need to be examined. Â It should also be a requirement to at least try to recognize whenÂ an attackerÂ could be systematically probing recovery systems, ranging from digital forms to help desks, maybe evenÂ in-person resources, or direct emails to IT staff.
3. We keep the User in the dark
If somebody is systematically probing at a given user’s account, don’t you think it would be valuable to tell them, so that they can try toÂ form their own understanding of their safety? Â If you’ve locked yourself out of your account, I’m sure you won’t mind the notifications. Â And if you haven’t locked yourself out of your account, those notifications may be very important. For example,Â receiving a notification from every one of your email accounts and your bank in a 24 hour period is something that may not be so significant to each system, but should ring seriousÂ bells for the individual. Â There are programs like Shared Signals that are evolving to help with cascading identity attacks, but for now, the only person who might see the pattern is the user. Â And they are not involved in the process.
4. Users don’t care until it’s too late
It’s true. Â There are lots of optional things people could do to be safe that they never bother with. Â ButÂ perhaps, if there was a way to make users aware of recovery question guessing attempts against their account, users might get scared a little sooner, and carefully contemplate their options.
The WORST THING about this breach
I understandÂ the prosaic duh moment going on where people noteÂ that the best way to not have naked pictures stolen is to not have naked pictures taken. Â But this should in no way mask the failure that has taken place from an implementation standpoint. Â We need to safely store and share sensitive things. As a society. We need to trust that accounts we createÂ and populate with our most treasured data are not just swiss cheese for anyoneÂ willing to stalk a specific target. Â The old canard of “Doctor it hurts when I do this”/ “then don’t do that” doesn’t help if the underlying problem is disease rather than a boo boo. Â This issue is not a boo boo, and turning the iphone camera offÂ will not prevent the spread of the disease, it just prevents one symptom from showing.
If the identity fairy came to visit and granted me three wishes, here is what I would wish for. Â These aren’t qualified recommendations in any sense — justÂ a place to start.
- Provide options for users to customize their own recovery ritual.
- Include things like
- Turning onÂ notifications for events like calls to the help desk or for use of the password reset form
- Adding additional or alternate recovery steps
- Additional identity proofing stepsÂ before help desk support will engage Â – like requiring a 2FA authentication before the call continues
- Requiring that KBA answers be retired (or at least flagged for review) after a certain number of incorrect guesses
- Turning on additional 2-factor authentication for services that may not normally be protected (see above for an example
- Include things like
- Architect for recognition of accounts that self-identify (or are verified) as likely targets
- Help Desks should be able to recognize high-fraud-risk accounts
- Audit and accountability should be elevated
- Work towards a point where theÂ system figures out who the high-risk accounts are in real time
- Track the use of recovery mechanisms, and make the history available to the user.
- How many times has a recovery question been used
- How many times has the form been submitted with the user’s user name
- How many times and when has the help desk been notified
The sun is long-up now. Time for reflection to end, and reality to intrude again…