Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Cloudsweeper Project Estimates Your Inbox’s Worth to Criminals

    Written by

    Robert Lemos
    Published July 5, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      People who have ever wondered why online criminals would want to gain access to their email accounts now have a way to find out: Two researchers at the University of Illinois at Chicago have created an online service that checks a person’s Gmail account for sensitive information, offers to encrypt the information and then estimates how much access to the account would be worth on the black market.

      The service, called Cloudsweeper, sifts through a person’s inbox looking for password-reset or account-recovery emails as well as other sensitive account information. If it finds clear-text passwords, the service will offer to encrypt them. Then, the service will use current prices found on black-hat forums to put a price on the user’s inbox.

      Most people do not consider how much they rely on a single email address for the security of their other accounts, Peter Snyder, a Ph.D. student in computer science at the University of Illinois at Chicago and the primary lead on the Cloudsweeper project, told eWEEK.

      “The fact that your one email account, in reality, can give someone access to a hundred other accounts really catches people by surprise,” Snyder said.

      While the use of easy-to-guess passwords and the reuse of a single password across multiple accounts are the major threats to the security of online accounts, criminals are increasingly finding ways to abuse the account-recovery options of online services. In June 2012, attackers intent on taking control of Web-infrastructure firm CloudFlare rerouted the CEO’s voice mail and then used his Gmail account recovery to reset corporate passwords. While the company reacted quickly, the attackers gained access to sensitive corporate accounts before CloudFlare regained control.

      Cloudsweeper evolved from a simple script originally created by Chris Kanich, an associate professor at the University of Illinois at Chicago, who had initially written a small Python program to search inboxes for passwords and delete the sensitive codes. In September 2012, Snyder worked with Kanich to turn the script into a service, later adding the ability to encrypt the passwords. In March, the researchers began adding the capability to value the potential access to each account, which went live June 26.

      While the average user may have little to fear from attackers targeting their personal email accounts, the idea of the Cloudsweeper project is to help users determine how much they rely on a single email address, Snyder said. The idea of putting a value on people’s account has boosted the project’s popularity. In the week since the group launched the feature, more than 25,000 people have signed up.

      The service does require the user to trust Snyder and Kanich, since their script has access to the user’s email account. However, the Cloudsweeper script uses the open standard for authorization (OAuth) to access accounts, and the user can revoke access at any time. In addition, the research project is listed in the University of Illinois at Chicago’s human research protocol database as UIC IRB 2012-0774, providing additional checks on the authenticity of the program.

      “At the end of the day, we have to rely on the user trusting us,” Snyder said.

      While it’s not required to use the service, the researchers also ask users to opt in to some anonymous data collection. The researchers plan to study the password habits of other online services. While Cloudsweeper only works with Gmail at the moment, the researchers may create similar services for Yahoo, Windows Live Mail or other services, Snyder said.

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.