Go Back  FlyerTalk Forums > Travel&Dining > Travel Technology
Reload this Page >

compromised GMail account

Community
Wiki Posts
Search

compromised GMail account

Thread Tools
 
Search this Thread
 
Old Apr 11, 2009 | 6:24 pm
  #1  
Original Poster
FlyerTalk Evangelist
 
Join Date: Mar 2004
Location: Under an ORD approach path
Programs: DL PM, MM. Coffee isn't a drug, it's a vitamin.
Posts: 12,935
compromised GMail account

My daughter was poking around her gmail settings and noticed that forwarding was enabled. Her address uses a combination of her initial and name, and the forwarding was to the same with the number 2 after the name. She never set that up, and that isn't her account.

She immediately disabled it and changed her PW, but we have no idea how long that has been enabled, or whether that other address is a valid non-bouncing address.

Is there any way to contact GMail tech/security support? We spent 10 minutes digging through their site, finally found a contact form for lost passwords. We want to find out:
A. is that a valid account which has rec'd copies of all her e-mails?
B. how long has this been going on?
Gargoyle is offline  
Old Apr 11, 2009 | 6:56 pm
  #2  
15 Years on Site
 
Join Date: Jan 2006
Location: Dillon, CO
Programs: AA EXP 4MM
Posts: 496
Sorry to hear.. Not sure if Google provides any telephone support.

If your daughter is using a mail client like Outlook on Windows or Mail on the Mac, is she using SSL (secure sockets layer) for her connection? She might also consider using IMAP instead of POP.
http://mail.google.com/support/bin/t...en&topic=12806
altaskier is offline  
Old Apr 11, 2009 | 7:10 pm
  #3  
Original Poster
FlyerTalk Evangelist
 
Join Date: Mar 2004
Location: Under an ORD approach path
Programs: DL PM, MM. Coffee isn't a drug, it's a vitamin.
Posts: 12,935
Originally Posted by altaskier
Sorry to hear.. Not sure if Google provides any telephone support.

If your daughter is using a mail client like Outlook on Windows or Mail on the Mac, is she using SSL (secure sockets layer) for her connection? She might also consider using IMAP instead of POP.
http://mail.google.com/support/bin/t...en&topic=12806
No, she's on a PC and using webmail, not pop.

There were a couple occasions at work when people maybe could have accessed it, but none of the possibilities make sense. We tried thinking through all the possibilities.

The address it was being forwarded to is a valid address. It could have gotten set up accidentally at one point (when someone else was working with her on a different work related gmail account, and could have been logged on to her personal one by accident) but that's still a stretch.
Gargoyle is offline  
Old Apr 11, 2009 | 10:04 pm
  #4  
 
2M
All eyes on you!
25 Years on Site
 
Join Date: Nov 2000
Location: Upcountry Maui, HI
Posts: 13,708
Change your daughter's gmail settings so the browser connection is always using https by default.

It's on the bottom of the first settings page on the web interface.

-David
LIH Prem is offline  
Old Apr 11, 2009 | 10:27 pm
  #5  
TA
10 Countries Visited
20 Countries Visited
30 Countries Visited
All eyes on you!
 
Join Date: Nov 1999
Location: if it's Thursday, this must be Belgium
Programs: UA 1K MM
Posts: 6,579
I doubt you will get much help from the Gmail admin staff. From an outsider's perspective, you could be anyone, claiming that your mail was forwarded without your knowledge, requesting information about an account that isn't yours, which would be violating that other account's privacy.

Without knowing anything else and just a guess, it's probably someone who she knows, who had a few seconds to access her computer while it was left on, or when she didn't sign out completely when using a different computer. Ever leave her laptop unattended, where someone could have done this? Probably, if she's like most people. Also, check at the bottom of her Gmail home page -- make sure that "Last account activity" shows only sessions you/she remember. That will tell you (somewhat) if the account is continuing to be compromised. (although you say the password has been changed, which should prevent this)

I doubt it was random -- but that might be the best hope, that it was someone completely random who the information would mean little to. Otherwise, it's someone she knows who wants to know what her life is about.

Unfortunately, I doubt there is much you can do, and it is a serious invasion of privacy. But certainly give the admin/security angle a try to see if they have any procedures for this.

Last edited by TA; Apr 11, 2009 at 10:37 pm
TA is offline  
Old Apr 11, 2009 | 11:14 pm
  #6  
A FlyerTalk Posting Legend
10 Countries Visited20 Countries Visited30 Countries Visited20 Years on Site
 
Join Date: Apr 2001
Location: PSM
Posts: 69,232
Wirelessly posted (BlackBerry8830/4.2.2 Profile/MIDP-2.0 Configuration/CLDC-1.1 VendorID/105)

Originally Posted by LIH Prem
Change your daughter's gmail settings so the browser connection is always using https by default.

It's on the bottom of the first settings page on the web interface.

-David
Why?

SSL doesn't really change anything with respect to the problem at hand, unless you think that the account was compromised because someone sniffed the PW from a session at one point, and that is a longshot.

Yes, using SSL is theoretically better, but it doesn't really address the situation at hand, I don't think.

To the OP, I doubt you will ever find anyone at google to actually answer that question for you. Sorry.
sbm12 is offline  
Old Apr 11, 2009 | 11:57 pm
  #7  
 
2M
All eyes on you!
25 Years on Site
 
Join Date: Nov 2000
Location: Upcountry Maui, HI
Posts: 13,708
Originally Posted by sbm12
Wirelessly posted (BlackBerry8830/4.2.2 Profile/MIDP-2.0 Configuration/CLDC-1.1 VendorID/105)

Why?
I don't know if it's still the default, but it used to be the default was to use http only, unless you specifically typed in https or used a bookmark with https. If you change the default, passwords, etc, won't ever be sent in the clear. The OP said his daughter already changed her password, but if they didn't change that setting also she is leaving herself exposed to needless risk. It's a simple setting and the right thing to do, lest you dissuade somebody from doing that with your post. (Is there any reason in the world not to do it?)

But you are correct and I didn't mean to imply in any way that that would help OPs daughter figure out who hijacked her email account.

-David

Last edited by LIH Prem; Apr 12, 2009 at 12:11 am
LIH Prem is offline  
Old Apr 12, 2009 | 10:22 am
  #8  
Original Poster
FlyerTalk Evangelist
 
Join Date: Mar 2004
Location: Under an ORD approach path
Programs: DL PM, MM. Coffee isn't a drug, it's a vitamin.
Posts: 12,935
Originally Posted by LIH Prem
But you are correct and I didn't mean to imply in any way that that would help OPs daughter figure out who hijacked her email account.

-David
It is a good change and we did that this morning, thanks.

I can think of two situations where someone could have accessed her computer and done it. One would actually have been inadvertent (he thought it was logged into their work mailbox and wanted to set that to copy to her personal mail and didn't really know what he was doing) but the other would have been an eavesdropper.

So, in the first case it is accidentally forwarding to a third party, in the later she was being spied on.
Gargoyle is offline  
Old Apr 13, 2009 | 8:00 pm
  #9  
FlyerTalk Evangelist
Conversation Starter
All eyes on you!
20 Years on Site
 
Join Date: Aug 2002
Location: Department of Homeland Sincerity
Programs: WN Platinum, UA 1k, AA EP, Marriott Plat
Posts: 12,319
Check for key loggers on her PC. Any suspects like ex-boyfriends?
UALOneKPlus is offline  
Old Apr 13, 2009 | 8:14 pm
  #10  
Original Poster
FlyerTalk Evangelist
 
Join Date: Mar 2004
Location: Under an ORD approach path
Programs: DL PM, MM. Coffee isn't a drug, it's a vitamin.
Posts: 12,935
Originally Posted by UALOneKPlus
Check for key loggers on her PC. Any suspects like ex-boyfriends?
no, only logical suspect is one former coworker... a stretch, but possible. I discussed that with her.
Gargoyle is offline  
Old Apr 13, 2009 | 8:58 pm
  #11  
 
Join Date: Jun 2007
Programs: *Gold, Amex Plat
Posts: 122
a friend of mine had a similar program, and after some research it turned out that he caught a Trojan (from a co-worker), which was embedded in a pdf my friend was sent.

There are trojans that, once opened and activated, can start key-logging and transmitting that information to the originator of the Trojan.
crimson2k6 is offline  
Old Apr 13, 2009 | 9:36 pm
  #12  
Original Poster
FlyerTalk Evangelist
 
Join Date: Mar 2004
Location: Under an ORD approach path
Programs: DL PM, MM. Coffee isn't a drug, it's a vitamin.
Posts: 12,935
Originally Posted by crimson2k6
There are trojans that, once opened and activated, can start key-logging and transmitting that information to the originator of the Trojan.
But with that they'd get the PW to the gmail acct., and could access it whenever they wanted. Instead, someone went into the account settings, enabled forwarding, and entered an email address which was her address ([email protected]) with the number "2" added after the last name. That address ([email protected]) is a valid functioning address.

So, copies of all inbound mail were forwarded to that address.

Doesn't seem like a trojan type result. We see two scenarios:
1. a former coworker (she left that job in the past week or two) who wanted to spy.
2. (and she can confirm this one this week)... she was working with her (then future) now current boss, there is a gmail address which is a work address which she needs full access to, the boss (who doesn't really know what he's doing on 'puters) might have thought they were logged into the work account and wanted to make sure she got copies of everything. Since they were logged into her account, gmail wouldn't accept [email protected] in the forwarding field so he put the alternate [email protected]. Far fetched, but possible.

In the former case, the ex coworker could have then set up the target address. In the later case, it goes to someone somewhere in the world.
Gargoyle is offline  
Old Apr 17, 2009 | 4:55 pm
  #13  
 
Join Date: Apr 2009
Posts: 85
I don't think GMail can be of much help in this case. =(

At least you can check if the email address is valid by simply sending an email from any account and see if it bounces. If it does not bounce, it's valid.

GMail marks forwarded emails... it might be possible that all auto.fwd emails are marked as such, so you could track the first one.

Just sharing what I would do... hope it helps.
ragde77 is offline  
Old Apr 22, 2009 | 4:25 am
  #14  
 
Join Date: Sep 2007
Location: Ether
Programs: Some, not all.
Posts: 1,603
I had a similar problem about a month ago.

I noticed that between Thursday evening and Friday morning I had not received any e-mails, and when Mrs 21H said she'd sent me something that failed to turn up I started to check the settings. My account had been changed to forward all mail to a yahoo.co.uk address, and the delete it.

Immediately changed my password and then started changing all my other passwords, starting with banking and credit cards. Nothing had been affected apart from my paypal account (same logon/password, yep I know...) which had been used to buy a macbook in Indonesia. I filed claims with Paypal and MBNA and both reversed the transaction.

The scary thing is that if the settings had not been changed to delete the mail, I probably would not have noticed until I saw the charge on my credit card.
21H21J is offline  
Old Apr 22, 2009 | 6:23 am
  #15  
5M
100 Nights
All eyes on you!
25 Years on Site
 
Join Date: Feb 2001
Location: London
Programs: AA EXP, SPG Plt
Posts: 2,613
The most common occasion for this happening is on shared terminals. Has she used an internet cafe/hotel lobby/airport lounge PC since she's had the account? I'd venture to guess yes, at some point, right? Keyloggers there can lie dormant until the thief decides to parse out her password.

Speaking as an ex-employee, you'll never find a human at Google for this sort of problem. Your daughter has already fixed it by deleting the filter, so there's nothing Google can do at this point that wouldn't involved mining server logs, etc. That's not going to happen without a subpoena and proof of a crime (at the least).

If it had _just_ happened, she could learn more from the "last logged in" details at the bottom of the Gmail page, but that's likely much more recent than the original filter creation.

FYI, for those of you that need to use a shared terminal, use HTTPS (as above, which limits what network sniffers can get at) and also use this method for logging in:

for (each pwd character){
Give focus to anywhere but the pwd field;
Type some random characters;
Give focus to the pwd field;
Type the next character of the pwd}
Submit;

As a bonus, type the password out of order by using the mouse to position your cursor in different places. So for "password" type "ord", click to the left, type the "ssw", click to the end, type nonsense, click to the left, type "pas", go to the end, delete the nonsense, then hit submit.

(See this paper for more details on the method and how it defeats most keyloggers: http://cups.cs.cmu.edu/soups/2006/po...r_abstract.pdf )
BobbySteel is offline  


Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service -

This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.