Millions of e-mail addresses and passwords may have been stolen from Trapster, an online service that warns iPhone, Android and BlackBerry owners of police speed traps, the company announced yesterday.
California-based Trapster has begun alerting its registered users and has published a short FAQ on the breach. "If you've registered your account with Trapster, then it's best to assume that your e-mail address and password were included among the compromised data," the FAQ stated.
But in the next breath, Trapster downplayed the threat, saying it wasn't sure that the addresses and passwords were actually harvested.
"While we know that we experienced a security incident, it is not clear that the hackers successfully captured any e-mail addresses or passwords, and we have nothing to suggest that this information has been used," Trapster said.
And when replying to follow-up questions today, Trapster claimed that not all its 10 million users were at risk.
"Only a portion of our users were affected," a company spokesman said via e-mail. "We are choosing not to provide a specific figure, but a majority of our users who download the app do not register, which means they did not provide an e-mail address, as it is not a requirement. So the figure is well below the 10 million users which has been reported."
Users must register with Trapster, and provide an e-mail address and password for the new account, in order to report speed traps. According to the Trapster site , more than 5,300 speed traps have been reported to the service so far today.
If criminals did collect the service's complete user list, the breach would be 25 times larger than the Gawker hack last month, when details of more than 400,000 Gawker accounts were published on the Internet.
Assuming just one-in-10 users registers with Trapster, the number of compromised passwords could still be two-and-a-half times bigger than Gawker's.
Trapster provides free apps for the iPhone, Android-based smartphones, the BlackBerry, Windows Mobile phones, and Garmin and TomTom GPS devices. The apps display a map with suspected speed traps -- the traps are reported by users of the service -- and warn when drivers are approaching a potential radar zone.
The danger posed to users is not limited to their Trapster accounts, a security expert pointed out today.
"You may not care very much if your credentials on Trapster have been compromised and may think that not too much harm can come from that," said Graham Cluley, a senior technology consultant with U.K.-based Sophos, in a post Thursday to the security company's blog. "But what if you use the same e-mail address/password combination on other Web sites such as your Twitter account, or Web e-mail address?"
Today, the head of Twitter's Trust and Safety team told Trapster users to change their passwords pronto. "Don't use the same password on multiple sites!" said Del Harvey in a tweet at 1:30 p.m. Eastern.
Some of the usernames and passwords obtained last month in the Gawker hack were quickly used to commandeer Twitter accounts that had been protected by the same passwords. The Twitter accounts were then used to launch a spam campaign on the micro-blogging service.
Another security professional said everyone should simply assume that their Internet passwords will be compromised at some point.
"People really should be changing their passwords twice a year," said Andrew Storms, the director of security operations for nCircle Security, in an instant message interview. "Not because someone could have compromised it, but because someone has compromised it. Maybe we should all just assume all public site passwords will be compromised and accept it as a new fact of life."
Many companies require workers to change their e-mail passwords on a regular basis; Storms argued that the tactic makes sense for everyone.
"We usually get push back about password changes and the answer is typically, 'But it could be compromised,'" he said. "Now we are getting more and more evidence that it has been compromised."
Trapster said it has rewritten the service's code to prevent similar attacks in the future, and has "implement[ed] additional security measures to further protect your data." The company did not spell out what those measures were, however.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.