Zomato, DocuSign Breaches Reveal Common Security Risks

The past week has been particularly busy in the cyber-security world and not just because of the WannaCry ransomware worm outbreak.

A pair of other, non-ransomware related breaches impacting electronic signature vendor DocuSign and restaurant rating app Zomato highlight ongoing security risks.

On May 15, DocuSign publicly confirmed that its’ systems had been breached, helping to fuel a widespread phishing campaign against users.

“A complete forensic analysis has confirmed that only email addresses were accessed; no names, physical addresses, passwords, social security numbers, credit card data or other information was accessed,” DocuSign stated.

DocuSign breach

“No content or any customer documents sent through DocuSign’s eSignature system was accessed; and DocuSign’s core eSignature service, envelopes and customer documents and data remain secure.”

DocuSign operates a secure signing services called eSignature, which has not been breached. That said, the attackers did get email addresses from DocuSign and the phishing campaign was sending fraudulent DocuSign branded emails with an embedded link that when clicked deploys malware.

DocuSign has not publicly stated at this time how its’ systems were breached and it’s not known how many users may have clicked on one of the phishing emails.

The Zomato restaurant guide publicly disclosed on May 18 that it was the victim of a data breach and unlike DocuSign, Zomato has revealed how many accounts were stolen.

According to Zomato, 17 million user records were stolen in the breach, including email addresses and hashed passwords. Hashing is an approach to encrypting passwords, making it unlikely that the attackers will be able to easily decrypt the passwords.

Zomato made contact with the hacker that breached its systems and was able to get full details on weaknesses in the Zomato network, which have now been patched. Zomato engineer Gunjan Patidar commented in a blog post that the hacker has been very cooperative.

“He/she wanted us to acknowledge security vulnerabilities in our system and work with the ethical hacker community to plug the gaps,” Patidar  wrote. “His/her key request was that we run a healthy bug bounty program for security researchers.”

Zomato is now planning on launching a bug bounty program with HackerOne. Also of note in the Zomato breach is the fact that the majority of Zomato’s users don’t actually have a username and password to access the service.

Rather, 60 percent of Zomato’s users login via OAuth single sign on from identity providers including Google and Facebook. Zomato has however reset passwords and is advising users that if they use the same password on other sites, they should change them.

Password and Email Risks

The DocuSign and Zomato breaches are just two more breaches in a long line of security breaches that have happened in recent years that expose users to risk.

There likely isn’t a single reader of this story that hasn’t had at least one email address tied up in at least one breach that has occurred in recent years. Given the massive scope and regular occurrence of data breaches, which almost always seem to include email addresses, it is seemingly unavoidable to get caught.

Attackers use email addresses, as demonstrated in the DocuSign breach, to fuel phishing campaigns. Certainly there are other ways that attackers can get your email address, but when an email comes from an alleged source that a user is familiar with, it is somewhat more likely they will click.

That’s why trusted email authentication approaches like DMARC (Domain Message Authentication Reporting and Conformance) are important, to help limit risk. Unfortunately DMARC adoption is far from universal at the present time, which is why for now user vigilance remains a primary line of defence. Simply put, think twice before clicking on links in email and if a popup window asks for permissions to run a macro, err on the side of caution and don’t allow it.

Beyond the issue of having validated email lists that hackers use in phishing attacks is the long-standing issue of password re-use. While at this point it doesn’t look likely that either the DocuSign or Zomato attackers got access to passwords, both sites have recommended that users reset their passwords. It’s unfortunately all too common that users re-use the same password on more than one site.

Reality today is that your email address and likely at least one password you have used at one point or another, is in a breached data dump somewhere. Remain vigilant, be wary of clicking on links on email, use Two-Factor Authentication and don’t re-use passwords. The next data breach is just around the corner, so rather than being fearful, be prepared.

Originally published on eWeek

Quiz: What do you know about cybersecurity in 2017?

Sean Michael Kerner

Sean Michael Kerner is a senior editor at eWeek and contributor to TechWeek

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago