Snapchat breach seen as startup growing pains

The Snapchat breach that led to millions of user names and phone numbers posted on the Web shows how a startup's priorities of growth and features can sometimes lead to weak security, experts say.

While the Snapchat break-in was seen as avoidable, security experts had less to say about the hacking of Skype's official blog and social network accounts, saying not enough details were available. Both attacks occurred this week.

With Snapchat, the mobile photo-sharing service made several errors in its use of cryptography and key management, according to Zak Dehlawi, senior security engineer for Security Innovation. Those mistakes led to the perpetrators posting 4.6 million user names and phone numbers on a Web site called The site has been taken down.

On Christmas Eve, Gibson Security, based in New Zealand, posted a lengthy explanation of the vulnerabilities it found in Snapchat security after notifying the company of the problems.

On Dec. 27, Snapchat said in its blog that it had implemented safeguards and counter-measures to prevent third-parties from matching user names and phone numbers and publishing them in a database, which is exactly what hackers did this week.

In studying the Gibson findings, Dehlawi said the mistakes that led to the compromise reflect the difficulty developers, even seasoned ones, have in implementing cryptographic technology in mobile applications.

"Any application that uses cryptography should undergo third-party code audits by security experts to identify security vulnerabilities," Dehlawi said.

"Second, companies should also ensure that their backend APIs (application programming interfaces) are secure by undergoing third-party security audits and following strict coding guidelines."

The backend of applications often get shortchanged because developers assume it is not as vulnerable as the frontend, Dehlawi said.

Wolfgang Kandek, chief technology officer for Qualys, said he was not surprised Snapchat was having trouble with securing its APIs.

"I think this is almost normal for a company at their stage that is focused mainly on scalability and functionality," he said. "I am sure they will pay more attention to abuse and security issues in the future."

With Microsoft-owned Skype, the Syrian Electronic Army, a hacker activist group sympathetic with the Assad regime, hacked the Web-calling service's blog and posted the headline "Hacked by Syrian Electronic Army.. Stop Spying!" the Chicago Tribune reported.

On the Skype Twitter account, the SEA posted contact info for retiring Chief Executive Steve Ballmer and the message, "You can thank Microsoft for monitoring your accounts/emails using this details. #SEA," the newspaper said.

SEA is notorious for defacing the Web sites and social media accounts of major media it views as unfavorable to President Bashar al-Assad in the Syrian civil war. The defacements appear to refer to revelations last year that Skype calls were monitored by the U.S. National Security Agency.

Kandek said the compromise seemed to involve credential theft. If that's the case, then having two-factor authentication in place might have prevented the hackers from accessing the accounts on computers not recognized by the sites.

Security breaches are inevitable for most organizations, so the strongest defense is to follow best practices and security standards relevant to the business, Larry Slobodzian, senior solutions engineer for LockPath, said.

In addition, a data audit should be done, so security measures can be reinforced around the most sensitive information, and an up-to-date plan should be in place that describes how to respond when a system is hacked.

"It's a proactive approach before the breach happens," Slobodzian said.

Join the CSO newsletter!

Error: Please check your email address.

Tags SnapChatsecurity

More about MicrosoftNational Security AgencyQualysSkype

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts