Introduction
Overview
This case study explores real world failures in password management and social engineering defenses. It examines incidents such as the leaks of Mark Zuckerberg's personal passwords, the compromise of Michelle Obama's passport through a hacked contractor account, and the Yahoo breach affecting billions of users. These examples illustrate the pervasive human vulnerabilities and weak password practices that attackers exploit through phishing, guessing, and recovery system abuse.
Vulnerability Details
Common password related issues included the reuse of simple, guessable passwords across multiple platforms, failure to enable two-factor authentication, and insecure storage of credentials. Social engineering tactics exploited password recovery processes by using publicly available personal data, as demonstrated in the Sarah Palin email hack. The study emphasizes implementing strong, unique passwords, educating users through phishing simulations, and enforcing 2FA to further account protection. It also highlights best practices and the usability/security tradeoffs involved in password and authentication policy design.
Learning Objectives
- Explain social engineering attacks
- Explain best practices in password management
- Explain what can be done to prevent social engineering attacks