1

I have a strange case with my PayPal account and I wanted the community assistance on what can be done and how to spot the security hole.

I have a private PayPal which has been constantly attacked lately.
When I say attacked I mean some one tried and gained access to it.

Now, what I can't understand is how.

The Facts

  • I have 2 Factor Authentication (Access Key) in my PayPal account using my Phone.
    Namely if I want to log on I need to enter both my Password and the code I get on my phone.

  • I have very hard password, unique to the PayPal account.

  • I have my security questions answered using very long string (Not the answer to the question, just another password hard like string).
  • The password and the strings are memorized and not written anywhere.
  • From the talks with PayPal security team I understand the person accessed to my account using the password (Whether he used the SMS or not, is not known or at least I'm not being tolled).
  • I'm on Windows 10 no suspicious behavior seen what's so ever.
  • No suspicious activity seen on my Email's or any other site I log onto.

The first thing I though about is someone is key logging my computer.
Or any kind of MaleWare.

Actions Done

  • I tried any Maleware and Anti Virus out there. Including Security Disks and Rootkits Killers (Though feel free to give me more options to try). I tried Kaspersky, Avira, MalewareBytes, ClamWin, Microsoft Defender and BitDefender.
  • I changed passwords and security questions.

Still, yesterday he managed to get, again, access of my PayPal account.

I must say that PayPal has been, generally, great and everything is restored.
Yet I want to stop it as it happens once a week for the few last weeks.

What are the other options to find what security hole I have?

I don't have trouble to format my computer, I just need to understand what can guarantee it won't get back (This is why I think I must figured out how it is done before that)?

Any special tricks to really understand what is going on?

Thank You.

15
  • If you have 2FA turned on, how could they access your account without your phone? That is the question I'd be asking PayPal. That is exactly what 2FA is meant to prevent. Commented Dec 11, 2016 at 17:57
  • PayPal has been known to respond to calls to reset the password, by simply calling them, and answering information that can be gleaned from semi-private sites about you. The IRS has also done this, when they insisted on using a PIN that was only mailed to you. Unfortunately, anyone could call the IRS, answer some presumably "secret" questions, and they would reset your PIN. Make sure that Paypal has not been resetting your PW by someone else, just by calling support, (which I assume they are already doing with you today). How do they know and ensure that it is you?
    – DaaBoss
    Commented Dec 11, 2016 at 18:27
  • @JulianKnight, That is a good question which, as written above, I asked and not go answer to. Thank You.
    – Royi
    Commented Dec 12, 2016 at 3:06
  • @DaaBoss, I don't think they saw any indication a Password Reset was made through a phone. Do you have any other thought about it? Any idea how to locate the security hole here? Thank You.
    – Royi
    Commented Dec 12, 2016 at 3:07
  • 1
    @Royi, it didn't occur to this security researcher Krebs, that it had been Paypal themselves that had reset his PW using social engineering and the poor security practices by Paypal. The article then appealed to several companies, including the IRS and PayPal, to disallow and stop the practice of allowing the use of fairly easy to get information to authenticate verbally on the phone, and allow someone in support to manually override every single security measure you mentioned. When and who reset your PW, or was it not reset? I assumed you at least, did reset it.
    – DaaBoss
    Commented Dec 12, 2016 at 13:46

1 Answer 1

1

I strongly believe that your hacked account was strictly social engineering, and was not a technical failure at all. You are already dedicated to taking extremely good security procedures and practices. The specific failure is in our institutions, that are usually 10-20 years behind the bad guys. They simply cannot understand how to protect us by quickly adopting new procedures to new risks. The solution to your problem may require all of us to push for changes at PayPal and other institutions.

In PayPal's case, Krebs details exactly how his PayPal account was repeatedly hacked, despite being an expert in security and already using 2 factor authentication. His story should alert all of us to the significant dangers that currently exist, so we can start mitigating some of the risks.

2016 Reality: Lazy Authentication Still the Norm, by Brian Krebs

Your hack was likely a result of Paypal's practice to use STATIC information that is supposedly hard to come by. This definitely was how Krebs was repeatedly hacked. After verbally answering these questions, despite having a "locked account", PAYPAL GAVE the BADGUYS ACCESS to KREB'S ACCOUNT, REPEATEDLY. Krebs was already USING 2FA, and it did him no good. Also note that Krebs, being a security expert, had a much easier time getting the cooperation of PayPal's management, but that STILL didn't help enough.

Almost as troubling, is that the photos of "official documents" are used for KYC procedures, as part of many organizations' due diligence. They are easily and inexpensively forged. There are services available that will produce fraudulent documents for you for a small fee, anytime you'd like to "prove" you are someone that you are not.

Read through this whole article, and I think you will see that we all must start educating and forcing our institutions to completely overhaul our security procedures and practices, and then apply technology that actually works today.

But, what works today, may not work next month, and those procedures and technology will need to change often and quickly to adapt to new threats.

The problem is that our institutions themselves are specifically crafted so that they can never adapt quickly to any changes. This aspect must change, before we can expect them to adapt quickly. The larger the institution, the harder it is to change any procedure, no matter how stupid it becomes.

An example of several institutions' attempts to solve a security problem is social security numbers. Allowing the bad guys easy access to these SS#, and then maintaining systems that relies in this 1950s technology to protect your account has been a known problem for decades. In 2006, it was legislated to remove all SS# from Medicaid cards, and I believe Medicare cards as well. The agencies not only have yet to remove the numbers, the current plan is scheduled to be completed by 2027. No, that was not a typo--TWENTY ONE YEARS to remove a visible SS# from these cards! OF course, by then, the point will likely be moot. Without an overhaul of these organizations, no amount of technology will help protect us.

Understanding enough security to stay safe is increasingly difficult, even for experts. It requires our constant readjustment, learning, and adopting our own procedures that are cost effective in time, frustration, and cash outlay.

I believe this social solution is the only solution to his problem, even if it is not a technical one. This is not generally the place for any solution that is not an established fact-based technology solution. But there are some aspects of our technology that merge with policies and procedures that must also change, or we will never solve many of the new security problems. Security requires applied technology with policies and procedures. Without all three, there is no security.

2
  • I read the article. Great reading. I can see the weaknesses of PayPal, but how can I make sure I'm not leaking anything. What can I do on my side? Thank You!
    – Royi
    Commented Dec 15, 2016 at 22:47
  • Just start working with PayPal, and first, learn how you are, or could be attacked. Then see if there's a way to get them to change so you won't be attacked, and then try to influence them to change for everyone. Finally, report both here and on Krebs what changes they've made and how we can all protect ourselves with at least PayPal.
    – DaaBoss
    Commented Dec 16, 2016 at 14:01

You must log in to answer this question.

Not the answer you're looking for? Browse other questions tagged .