
‘Time capsule’ app Timehop has revealed that it made a boo-boo when it initially shared details over the weekend of a data breach involving millions of users’ names, email addresses, and phone numbers.
An updated advisory from the firm reveals that the hackers, who initially struck last December but made off with the organisation’s data on July 4th, also purloined users’ dates of birth, gender, and country codes.
The company has also provided a breakdown of the breached Personally Identifiable Information (PII), noting that the figures should be considered separately of one another and are not additive. The total number of breached records was approximately 21 million, says Timehop.
| Type of Personal Data Combination | # of Breached Records | # of Breached GDPR Records |
|---|---|---|
| Name, email, phone, DOB | 3.3 million | 174,000 |
| Name, email address, phone | 3.4 million | 181,000 |
| Name, email address, DOB | 13.6 million | 2.2 million |
| Name, phone number, DOB | 3.6 million | 189,000 |
| Name and email address | 18.6 million | 2.9 million |
| Name and phone number | 3.7 million | 198,000 |
| Name and DOB | 14.8 million | 2.5 million |
| Name total | 20.4 million | 3.8 million |
| DOB total | 15.5 million | 2.6 million |
| Email addresses total | 18.6 million | 2.9 million |
| Gender designation total | 9.2 million | 2.6 million |
| Phone numbers total | 4.9 million | 243,000 |
No company relishes the idea of updating a security advisory to detail that the situation is actually worse than initially thought, but Timehop should be applauded for its openness and transparency.
I’m impressed that after realising it had been breached on July 4th Timehop took prompt action, and has been upfront in both its customer advisory and the technical security report it has published.
No one disagrees, however, that this breach should never have happened in the first place.
A hacker first broke into a third-party cloud service used by Timehop in December 2017 using an administrator’s password. That account should have been protected with multi-factor authentication, but wasn’t.
The hacker was then able to create his or her own admin account, meaning even if the original breached account’s password was changed they still had access to Timehop’s cloud services. Those cloud services provide the hacker with anything of value on subsequent visits, until…
“In April, 2018, Timehop employees migrated a database with personally identifiable information into the environment. The attacker saw this when they logged in on June 22, 2018. The unauthorized user then logged in again on July 4, 2018, when the database containing PII was stolen.”
So, yes it’s good that Timehop is being transparent in how it communicates its breach, and it no doubt is conscious that its openness may be taken into consideration in any future GDPR fine. Other companies can learn from this.
But other companies can also take the opportunity to learn from the mistakes Timehop made to get themselves into this mess in the first place. If you’re responsible for securing your company, be sure to read Timehop’s technical report on what occurred, and the steps it took in response.
By the way, the Timehop data breach was one of the topics discussed in this week’s edition of the “Smashing Security” podcast, recorded before the company updated its security advisory with the additional information.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Visit smashingsecurity.com/vote, and vote for Smashing Security in the People's Choice and Technology categories.
Yes, you have to create an account at the Podcast Awards website to vote for us.
Yes, that's a pain, but it's nothing compared to the pain I could do to your eardrums if I decided to sing la la lee diddle lee da da da.
So, smashingsecurity.com/vote if you know what's good for you.
Hello, hello, and welcome to another episode of Smashing Security. Security number 86. My name is Graham Cluley.
What's hilarious though is I only agreed to do the conference because they were doing the fantasy super cosplay wrestling, but I said in the notes, please don't book me when the wrestling is going on because I want to see it.
I was really explicit about it. So on Saturday night, as they're doing their big event, I have my panel.
Did you ever hear the story where he was on the set of Lincoln and he only would be referred to as Mr. President?
And when Sally Field had to talk to him, she would have to text him as Lincoln's wife. And that was the only way he would respond to her.
That, let alone your personal life and all the stuff you have there, all the chess and Doctor Who stuff you have.
They wouldn't be very good passwords though, would they?
The international effort to rescue them.
Thankfully, just before we started recording today's episode, word came through that all 12 boys and their coach had been rescued from the flooded cave. 17 days.
I was upset when they were first lost, then I was upset when they were found, and I thought, oh my goodness, how are they going to get them out?
And then the rain came down and so they went deeper into the cave. They found that their way out was trapped and so they just kept on going deeper and deeper in.
I mean, for instance, some people said, well, let's drill a hole from the top and get down to them.
Let's teach them how to dive underwater in a cave with no visibility, or let's leave them there for 4 months while they wait for the end of the rainy season.
And one person who was approached for an idea was Elon Musk. He's got over 22 million people following him on Twitter, and someone said to him, have you got any ideas?
You know, you're Elon Musk, right? You're the founder of SpaceX and Tesla, and you're basically Iron Man.
And Elon Musk came up with a couple of ideas, and one of them was this tiny sort of submarine— well, it wasn't really a submarine, it was this skinny airtight capsule that they thought maybe other divers could guide through narrow space and just big enough for a kid to squeeze inside.
And he posted up videos and they tested it in swimming pools and they raced it out to Thailand and it turned out it wasn't needed, but he left it there just in case, thinking it might be useful in future.
Maybe just didn't want to lug it back to the airport. I don't know.
But anyway, he left it there and there was a message posted in on this thread on Twitter from Elon Musk saying, even if it's not going to be used, it won't harm to have it on hand for any emergencies.
Also remembered my promise from yesterday. And I was reading this Twitter thread and I thought, I wonder what Elon Musk's promise was the day before.
Yeah. All you have to do, said the webpage, is send either 0.1 to 5 bitcoins and you will get 1 to 50 bitcoins back.
So you're basically what, you're multiplying your investment by 10. Send us some bitcoins, we'll send you much more back. And this is Elon Musk telling people they can do this.
Of course, it's not really Elon Musk's Twitter account. It's Elobecusk, you know, slight variant of Elon's name.
The only clue that this is not the real Elon Musk is that there is no blue verified tick.
So if you were following this conversation and there were further messages as well saying, take a quick look and the submarine will be useful even if not immediately, you get taken to this webpage, which appears to be from Tesla.
So what crypto scammers are doing is they are leaping onto conversations initiated by people with high followings, pretending to be those people, and their messages are getting hundreds and sometimes thousands of likes.
They're getting replies, and people think that they're speaking to the real high-profile person, and sometimes they're being duped into clicking on these links, and sometimes they are undoubtedly giving money because they think, well, it does sound too crazy to be true, but this is Elon Musk.
He's got bags of money. Maybe he would do something like this.
If you're following a thread and it appears this guy is talking about what the initial person spoke about and his account ID avatar and his name is the same, I think you just assume it's something else.
That's the best that you can really hope for, even if you have a large amount of followers. We're not talking a significant chunk of them that would click through on it.
And it wasn't even the only one in the thread. There was another one just a few pages down I saw from a different fake Elon Musk.
Saying, again, give us some of your bitcoins and we will give you a free Tesla car just by handing over some bitcoin or Ethereum.
So crypto scammers are taking advantage of celebrities. Elon Musk is not the only one. We've also seen journalists. We've also seen some of the bitcoin exchanges as well.
In some cases, they've actually had their legitimate verified accounts hacked.
So this appears to be a real problem, and Twitter isn't handling it terribly well.
Although it is shutting down lots of bogus accounts, it's so easy to create brand new ones, and it seems these devious tricks, which aren't really that sophisticated, are enough to fool people into believing that they are reading a genuine message from a tech guru, a journalist, or a celebrity.
So they're stopping them quite early.
And I have seen people who've actually responded to some of these fake bitcoin scammers who are posting these messages. They reply saying, this is obviously a scammer.
And within a matter of minutes, a brand new account has been created in the name of that user who has been calling them out, posting, of course, another bitcoin scam.
So, you know what was happening though? Some people were saying, oh, he's just jumping on the publicity wagon. You know, he's doing this as a PR stunt.
And that kind of annoyed me a bit. I thought, yeah, obviously Elon Musk is in some ways an utterly odious person just from what I've read.
You know, I just think, oh, he just sounds vile in every way.
And all those people whinging about, oh, look at him sending his little submarine to Thailand and it wasn't really wanted.
But you guys have sort of broken that down. Because I'm kind of like, wouldn't you just leave how you came in? And I didn't realize.
But when you dig into the actual article of how they're going to stop it, they're not talking about their platform at all.
Instead, what they're talking about is these videos featuring YouTube influencers to promote critical thinking.
We've got the Google News initiative and google.org and we got, you know, all these critical thinking videos we're going to make and that's what's going to solve the problem.
But you never hear them stop and go, hey, maybe there's a problem with the algorithm and the way our system works. And that's the thing that we should fix.
They never talk about that. Instead, you've got these weird pseudo Band-Aid things that they trot out.
So they said that they're going to, you know, they're building sustainable video operations and that's what the grants are for, for the $25 million.
But nowhere do they talk about the problems with the platform. And as long as they allow that to continue, we're just going to continue having these issues.
That's what it says, that they will be creating videos to raise awareness about digital literacy and help educate teens about— because that's the problem, right?
Teens and not your 65-year-old father who watches right-wing propaganda. Yeah. Educate teens about identifying legit sources of news information.
So that's the crazy thing to me is that, you know, we talked about the grossness of the crypto world, but when it comes to tech, they don't want to take responsibility.
They'd just rather pass the buck. And so that's sort of how they're going to do it.
You know, I don't know if any of them are still alive, but let's have the surviving members of Steely Dan come in. And say, hey, the thing you just read is probably BS.
That's the people that we should be looking at, because in the United States, those are the people that voted for Trump, and those are probably the people that voted for Brexit.
So you're absolutely right, the teens aren't the problem. They know this stuff is BS. It's the older, the baby boomers who could really use this.
Instead, hire the surviving members of Steely Dan to come out of retirement to advise the silver generation about fake news. That's basically your advice.
Basically, get humans to do this.
And I just sit there going, just hire people, you know, as many as you can to help police this and train your algorithms so that this stuff doesn't happen.
But if you're not gonna do that, then yes, absolutely. I think the surviving members of Lynyrd Skynyrd would be perfect.
If we could find them, let's find the corpse of Richard Nixon and maybe try him out for a couple of videos because if that's what they're going to do to solve it.
Maybe BJ, when your book was published, you went around on all your social channels going, "Woohoo!" Or when we won the award, Graham, right?
And this is exactly what this app TimeHop does in a nutshell. Its raison d'être is to rekindle fond memories of your past social media posts.
Now, don't go and install this app just yet because TimeHop disclosed this week that it has just been hacked. The hack took place on Independence Day.
And despite wild efforts to stop the breach in action, they did it for 2 hours, the baddies did get away with some of the spoils.
21 million people had their email addresses stolen and usernames, and 5 million lost their phone numbers. They use their mobile phone numbers to log in.
And so what it does, it pops up after maybe a year or something saying, oh, do you remember this from 5 years ago?
You know, happy memories of the time Graham quit Facebook, you know, and let you do what you wanted.
Now, way back in December, an unauthorized person used an admin's credential to log into TimeHop's cloud computing service where all the information is stored.
Question is, how were they able to actually achieve this feat? It turns out they didn't have two-factor authentication turned on.
But to make sure that they continued to have access, they created a new secret admin account.
Enter TimeHop's cloud computing account, which wasn't protected, transferred data and attacked the production databases.
It's timehop.com/security. I think they've done quite a good job because of course, under new GDPR rules, you need to get all your information out pretty darn quick to users.
And I want to explain why they're focusing on the mobile number users. This is basically a warning against things called port scams.
This is where a fraudster who may have collated enough information about you, maybe your date of birth or social security or last digits of your social security number, your postal address, and they might have gotten these from different breaches.
And what the whole point is to pull all this together and try and dupe your telephone carrier into thinking they are you.
And if they're successful, they will try and authorize on your behalf the number porting over to an account or device in the fraudster's control.
Ironically, this is all about two-factor authentication. That's what they're looking for.
They're looking to have your number so that if you access your bank, right, the two-factor authentication code gets sent to your phone, they get the message and they can log in on your behalf.
I think a lot of people think that they're safe when actually their information is lurking somewhere in some old paste bin.
So yes, I mean, correlating that with other data breaches, they may well be able to find out all sorts of information about you.
This is a fancy way to say they have a passcode or PIN number that has to be used. The fraudster won't know that PIN and therefore will not be able to get the port changed.
You may also, if you're changing or if you're getting a new mobile phone, profile phone or changing carriers, ask them what information they would require in order to authenticate your identity.
If it's just publicly available info, maybe go find someone else. And lastly, don't assume you've never been breached.
You can go to sites like haveibeenpwned.com, which is run by a friend of the show, Troy Hunt, and put your email addresses in and see if you come up on any lists that have been potentially scooped up by baddies.
And in those cases, make darn sure you change those passwords to unique, long, great ones.
You can just press a button and presto, you've got a 25-character, 50-character password that's impossible to guess.
It could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they like.
It doesn't have to be security related necessarily.
I love nothing more than hiking in the mountains, going down the valleys, you know, going to festivals, camping, the great— oh, wonderful.
They've divided the whole world into a grid of 3-meter by 3-meter squares. And you may be asking yourself, why have they bothered to do that?
Well, they've done that because they have given a name to every 3-meter-by-3-meter square, they've given it 3 words, a unique address made up of 3 words.
Rather than giving someone your latitude and longitude, which is going to be impossible— who on earth would do that? You just give them 3 little words.
And if you give them those 3 little words, they can find out your precise location, which could be handy if you're trying to tell the pizza delivery guy to deliver to a particular place, or if you're trying to give the location of your picnic spot, or where you want the drone to land.
Or if you're at a festival and there's thousands and thousands of horrible tattooed people there.
Maybe it's built up enough momentum that loads of people are now using What3Words. Come on, we've got to use this thing.
Because, okay, if you're getting a pizza delivered to your home, the pizza delivery guy's not gonna have much trouble. But what if, Carole, what if you are on a campus?
What if you're at your place of work and it isn't obvious which building?
The other day I was out on a gig, I was doing some speaking, and I was in one building and I wasn't in the other one and my taxi driver went to the wrong building.
There was all this hoo-ha and hassle. Well, which building you're at? I'm at this building. No, you're not at this building. Blah, blah, blah, blah.
If I had been able to give him my What3Words, then maybe he'd be able to find me. Or what if you are at a concert or a festival or something that and you're trying to find your—
And by the way, this works without a data connection, which is handy. Oh, now you're impressed. How about this one? With harp person will take you to the Oval Office.
And one time they got lost in the woods for over 3 hours and found themselves in front of a state penitentiary.
And had they not found that prison, they probably would've died out there.
So, you know, I can't, I'm joking about it, but I can absolutely see instances of, all right, this could be good because you could get really lost up there and not have any other way to be found unless you have with harp person to enter into an app.
It really does a great job of portraying the American South in a way that you don't often see.
We kind of have all the stereotypes, but when you watch the show, you kind of understand, oh, this is how bad hairpiece got elected. These people still think it's the 1870s.
And so I think that the show, they should totally bring it back and rebrand it as Trump Country.
I really recommend people watch it.
And I kept getting these texts from her, have you listened yet? Have you listened yet? And finally I listened and then I immediately saw why she was recommending it.
Dear Joan and Jericha is played by two UK comedy stars. And it's basically agony aunts, which is my dream job, as you both know.
So the comedy stars are Julia Davis and Vicki Pepperdine.
They're kind of radio, kind of local radio agony aunts, but with this wacky, cringy twist, because no matter what problem they're discussing, it's always the woman's fault.
And to an absolute extreme, it's a little bit edgy. This is not for children. It's very adult.
I think the whole concept is they're trying to crack each other up by being more and more edgy, and it's blush-worthy, a bit like The Office. Okay, here, I'll play a bit for you.
Dear Joan and Jericha, my baby's been born with white hair and a full set of teeth.
You know, this may be incidentally a pregnancy from when she was first having periods.
So as The Guardian say, this is not for the faint-hearted, but if you're into absurd toxic relationship advice, serve the slice, you know, faux sincerity, this is the one to check out.
So thank you, Anna, for Dear Joan and Jericho.
BJ, if people want to follow you online or find out more about you, what's the best way that they can do that?
So I've been doing a ton of podcasts, and people ask me, "Do you have any trouble giving out your phone number?
Do people send you dick pics?" And so I'm pleased to say that most people are very well behaved. What I get instead, if someone wants to be cheeky, is a picture of Richard Nixon.
Yes, so my actual cell phone number is 646-331-8341. If you text me the word sheetrock, I will send you a free copy of—
If you want to grab some stickers or t-shirts or mugs and things like that, you can go to smashingsecurity.com/store. And thanks for tuning in.
If you like the show, please rate us on Apple Podcasts. It helps new listeners discover the show, and you can find new episodes as well at smashingsecurity.com.
Until next time, cheerio. Bye-bye. Bye-bye.
Psst, if you're still listening, remember, please visit smashingsecurity.com/vote so that you can register your vote for Smashing Security in the upcoming Podcast Awards.
We need your help, guys. Thanks.

