Palin E-Mail Hacker Claims Google Search Helped Find Password
Though the posted account is no longer available, some content of the Alaska governor's messages has been republished on several blog sites.
The hacker who broke into Republican vice presidential candidate Sarah Palin's Yahoo Mail account appears to have done so by requesting a password reset and answering the challenge questions with the help of Google and Wikipedia.
According to a purported first-person account of the hack posted on 4chan.org, an online forum, "Rubico," the person claiming responsibility, initiated a password change on Palin's account and then supplied the Alaska governor's birthday and her home ZIP code, with the help of "Wikipedia and Google to find the info."
That left the so-called security question: "Where did you meet your spouse?"
After further Internet searching, "Rubico" entered "Wasilla High" and was allowed to change the account's password.
The text supposedly authored by "Rubico" was supplied to Malkin by an unidentified individual who claims to have monitored the 4chan board where the discussion took place.
A determination about the authenticity of this information will fall to law enforcement officials and the legal system, if the case gets that far.
The reproduced account of the hack indicates that "Rubico" posted the changed password and screenshots from Palin's in-box to the 4chan forum. After that, others supposedly copied the information and posted it to Wikileaks and elsewhere before moderators could delete it.
According to Wired News, the handle "Rubico" has been linked by bloggers to a college student in Tennessee, whose father is a Democratic state representative.
The Register reports that Gabriel Ramuglia, the operator of the Ctunnel proxy service presumably used by "Rubico," has been contacted by the FBI and plans to provide the agency with his log files. Because one of the screenshots of Palin's Yahoo account shows part of a Ctunnelled URL, the FBI stands a good chance of figuring out the IP address of the person who took that screen shot from Ramuglia's log files.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.