Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Timehop Reports Data Breach Impacting 21 Million Users

    Written by

    Sean Michael Kerner
    Published July 9, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Social media service Timehop publicly disclosed on July 8 that it was the victim of a data breach that impacts 21 million users.

      The breach was discovered by Timehop on July 4, though an investigation by the company revealed that attackers first gained unauthorized access to the system in December 2017. Timehop reported that names, email addresses and some phone number were stolen in the breach, though the company emphasized that attackers did not directly access or manipulate users’ social media accounts.

      “On July 4, 2018, Timehop experienced a network intrusion that led to a breach of some of your data,” Timehop wrote in an advisory. “We learned of the breach while it was still in progress, and were able to interrupt it, but data was taken.”

      The Timehop service enables users to be reminded of past events from their social media timelines. The service connects to users’ Twitter, Instagram and Facebook accounts to source pictures and create what the firm refers to as “memories” of milestones from user posts. While Timehop has stated that user memories were not accessed, the company admitted that API keys that enable Timehop to read and show users’ social media posts were also compromised. 

      “We have deactivated these keys so they can no longer be used by anyone—so you’ll have to re-authenticate to our App,” the company stated.

      What Happened

      In a technical report detailing the security breach, Timehop stated that the attacker initially gained access to a Timehop administrator’s cloud credentials in December 2017. The attacker then proceeded to create a new administrative account and conducted what Timehop referred to as reconnaissance of the Timehop’s cloud deployment.

      “On July 4, 2018, the attacker(s) conducted activities including an attack against the production database, and transfer of data.,” Timehop stated. “At 2:43 pm US Eastern Time the attacker conducted a specific action that triggered an alarm, and Timehop engineers began to investigate. By 4:23 PM, Timehop engineers had begun to implement security measures to restore services and lock down the environment.”

      Part of locking down the environment for Timehop involved changing all passwords and API authentication keys. Additionally, Timehop added multifactor authentication to all of its administrative accounts that didn’t already have that capability enabled. Going a step further, Timehop stated that it revoked inappropriate permissions and increased the monitoring of its deployment and product infrastructure.

      Analysis

      Timehop was able to block the actual attack 2 hours and 19 minutes after the attackers began to remove data. In the modern world with high-speed internet connectivity, that’s a lot of time for an attacker to be downloading data.

      What’s worse, though, is that Timehop had an unauthorized administrative user in its system for at least seven months who wasn’t detected. Clearly the attacker waited for an opportune time to remove data, choosing a holiday period, likely with the expectation that they would remain undetected.

      The Timehop breach clearly demonstrates that attackers don’t always move rapidly to steal data and there is a certain amount of dwell time that attackers will use to surveil a system. The Timehop incident also once again demonstrates the primary importance of securing and monitoring privileged account access. The week prior to the Timehop breach, the Gentoo Linux distribution reported that one of its administrative users had been breached, leading to an attacker placing malware in the organization’s GitHub repository.

      Attackers generally have to execute multiple steps to be able to exfiltrate data from an organization. Having layers of security that can identify and block the different steps in an attack chain is key to limiting risk. 

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×