Following the news about Amazon’s reported reset of customer passwords found online associated with other sites (but not with Amazon), IT security experts from Balabit, Prevoty, STEALTHbits and VASCO Data Security commented below.
Péter Gyöngyösi, Product Manager of Blindspotter at Balabit:
“What’s interesting in Amazon’s action is that it is probably one of the first cases when a large online company takes a proactive measure in resetting passwords. It wasn’t them who got hacked, but they still cross-validated the leaked credentials with their own records and when they found a match they took action. Their letter is vague about whether they in fact knew that the person’s Amazon password was also on the list, or the only thing they saw was the email address and a bunch of passwords. The former, verifying the leaked passwords against their own database and only resetting them when there’s a match, is a risky move, because in this case essentially they would be the ones who confirmed that that their users’ passwords are indeed reused between accounts, which can be valuable information for hackers by itself. The latter case, on the other hand, can be annoying for users who apply due diligence and don’t reuse their passwords.
“Either way, the grim reality is that most people today do use the same easy-to-guess password for all of their accounts, which is a huge security risk. On the end-user side, the solution is to start using one of the many great personal password managers available out there and enable multi-factor authentication wherever it’s possible. And the operators of these services must start to enable multi-factor authentication, using single-sign on services and start to perform a continuous, ongoing analysis of the users’ behavior to identify unusual actions to complement their one-off authentication at the beginning of a user session.”
“It’s fantastic to see companies like Amazon being progressive about password management. Until everyone moves to a password manager and has unique passwords for every account, there will always be password re-use. By scanning open paste bins, code repositories and sites for passwords, Amazon can potentially get out in front. It’s a win/win for both Amazon and customers. Amazon can potentially reduce costs associated with fraud while customers get security awareness. Given that there are open source tools to look for account dumps on the web, more security teams at companies should and can do this.” Brad Bussie, CISSP, Director of Product Management at STEALTHbits:
“Praise Amazon! This act is exactly what organizations need to do to look out for their customers. The fact that Amazon itself wasn’t compromised but was able to compare account details in its own database to those that were available online is a shining example of proactive cyber security. All too often, we are in a constant state of reactivity. Thanks to Amazon for leading by example and having its customers’ interests top of mind. The bottom line is we need more gestures of good will in cybersecurity to help prevent the next breach.”
“This is an incredibly smart move – it essentially says that even if your other online providers won’t protect you, we will. Amazon again demonstrates their innovative mindset and customer-first business philosophy.
“It also underscores the inherent vulnerabilities of 30-year password technology and the need to move to multi-factor authentication, which is far more secure and easier for consumers.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.