Truax.org Home

 

 

back to [Mail Settings]

Password Stolen Issue
6/24/10

One of our family members reported that their Hover account was compromised.  Someone had gotten their password and changed some of the settings, including forwarding.  They noticed because they hadn't gotten email for awhile, then when trying to get in they were locked out.  Hover had shut down the account because there was excessive spam being sent through the outgoing account.

There was some concern that this may have compromised other family accounts, but upon investigation, that is unlikely.  Only one account out of 16 reported trouble, and the individual accounts don't have access to the admin control panel for the overall account.  The most likely cause was either spyware or botware on the affected computer.

The issue drew attention to the security options.  You can enable SPA (Secure Password Authentication), or SSL (Secure Socket Layer), but those features only offer limited protection.  Using a strong password and occasionally changing it advisable, but if you do so, please have a system in place to be able to find your password.  I personally don't write my critical passwords down anywhere.  I have variations for different requirements and use code to remind me which variations are implemented.  If you loose your password I can reset it from the admin panel.

The Ticket number for this issue with Hover was 249834.  The tech support number was (416) 538-5498 based out of Toronto.


10/2012 2nd Stolen Password Issue

We had another occasion in October where a the login information to an account was compromised and a third party was using the account to send spam, which resulted in the server shutting down to access to the outgoing server.  The account will re-set automatically after about a day, but in this case Hover Tech Support was contacted and the max limit was temporarily raised to permit using the outgoing server without waiting for an auto reset.  The password was changed and the problem did not re-occur.  In this case, the problem was initially noticed due to bounce messages from email that was not sent by the user.  The user's computer was scanned for viruses but no problems were found, so it is not known how the password was compromised.

This issue was documented under Ticket Number 602480.