Iâve had better Sundays.
It was Easter, April 16, 2017. I had just finished a homemade dinner with my husband. It was time to chill and finally enjoy a few hours of downtime, compliments of the latest binge-worthy craze on Netflix. Little did I know, I was about to star in my own real-life drama that was much more cringe-worthy instead.
My cell lit up and I looked down at the display. It was a text from Chatelle, our chief human resources officer (CHRO). Chatelle and I were close. We had just teamed up to help McAfeeâs spinout from Intel as one of the worldâs largest independent cybersecurity companies 12 days prior. Seeing a text from her on Easter wasnât unusual, assuming it was the type of well-wishing that happens between friends on a holiday. This was not that type of text.
- You need to check out our social media page. Itâs bad.
I immediately felt my blood pressure surge as I opened McAfeeâs company page on a very prominent social media platform, the name of which I have redacted from this true story. I was horrified.
Someone had deliberately defaced the social profile of our newly minted, 12-day-old company with the most obscene and offensive language directed at nearly every walk of life. This would be bad for any company. But let me try to express how desperately bad this was for us.
The offensive epithets were in stark contradiction to everything our company represented. We had just relaunched our brand with a new tagline, âTogether is power,â reflecting our belief that it takes all kinds to protect our world from cyber threats. We had just unveiled new values to all employees upon our companyâs launch, one of which espoused inclusive candor and transparency. And we were a leader in cybersecurity. How would customers feel about our ability to safeguard their most precious digital assets if we couldnât even protect our own companyâs profile on one of the largest social media platforms? And, to top it off, my teamâthe marketing organizationâwas responsible for managing our company profile across all social channels, including the debased one staring me in the face.
I jumped into action. I had to get to the leader of our digital team to figure out what was going on. I reached her immediately and didnât even have to explain that the call wasnât to wish her a Happy Easter.
- âI know why youâre calling. Weâre on it. Our account was hacked. Weâre talking to the [social media platform company] to get it resolved.â
I started to think the worst. A hacked social media profile was one thing. What if this was a coordinated attack against McAfee with a much bigger prize at stake, with hackers diverting our attention to this fire drill while they seeped in through our companyâs systems?
She immediately reassured me that our chief information security officer (CISO) was already on the case, confirming our systems were good. Relief washed over me for a momentâuntil I realized I needed to make another call. Our CEO needed to know what was going on. And I preferred he hear the news from me. I was about to ruin his Easter Sunday. He picked up the phone almost instantly:
- âChris, one of our social media accounts has been hacked.â
- His response was measured. âHow bad is it?â
- âOur corporate servers are fine, Chris. Itâs our corporate page on a social media site thatâs been hacked.â
I explained to him just what had happened. Our social media manager, Gavin, was the first to discover the attack. Gavin had been at home, doing what social media geeks do on holidaysâhe was online. Around 5 p.m. he saw a status update on the social media platform with a bunch of random letters in it. He figured someone on his team had butt-dialed the update. Gavin deleted the random post.
He then pinged his team to see who might have accidentally created that post. No one knew anything about it. Soon, another meaningless post showed up. This was now not random.
Gavin logged into the social media platform and went to the account settings area. All the names were familiar of the people who had administrative privileges for the account. Even so, to be on the safe side, Gavin started to delete all other admins.
As he was doing that, his page refreshed, and Gavin was locked out.
There was now no doubt that this was malicious. In a moment, Gavin realized that his deleting the weird posts had alerted the hacker that McAfee was aware of the defacement. It was like the classic race in tech crime dramas with fingers flying on keyboards, spinning icons as processes complete and messages flashing as only Hollywood can bring to the screen. Gavin and our hacker were racing online to do the same thing. Even without the pulsing soundtrack, the tension was every bit as fraught with drama. Gavin said, âI was trying to delete all the other admins, and the hacker was doing the same thing. He beat me.â
Before I hung up with our CEO, I had one more piece of disappointing news to share.
- âOh and Chris, when you go to our social profile page, youâll now see not just the offensive posts, but also our company logo has been replaced with an image that looks like a bird. Look closer. Itâs not a bird at all. Itâs. Um. Itâs body parts.â
Itâs common in the hacker community to deface sites with obscene drawings to indicate that someone got âpwned,â hacker slang for being defeated in a humiliating wayâfor being âowned.â Now that the hacker knew we were locked out and he was in control for the time being, he added an obscene image to replace our new company logo, just for good measure.
My team frantically engaged the social media platform company to remediate the issue. But . . . things donât happen quickly on holidays. And since this was now later in the evening, we were relegated to working with the companyâs Asia-Pacific (APAC) group, making it seem as if time itself had to physically cross the ocean separating us and the support team. Minutes slowed to a crawl.
We waited for what seemed like an eternity. Because it was not our servers that were hacked, there was no big team from McAfee I could put on the third-party problem to fix it. We could only check in with the companyâs support team every few minutes, only to be told they were âon it.â
After about 30 minutes, we received news that the social media company had locked out all admins from our company page, and only they had access now. That was the good newsâat least no more damage would be done.
The bad news? They did not have a means to simply roll back the page to what was there 30 minutes before. Their procedure was to lock the page, so no further changes could be made, and then to follow a validation and analysis procedure: For validation, they wanted to make sure that we were who we said we were, and not a hacker calling up pretending to be McAfee (How ironic!). Then the analysis part kicked in, where they wanted to study the extent of the hack before taking any further action.
But what about the obscene image? It was still up on our corporate page. To make matters worse, the way this social media provider worked was that all employees who had personal pages on this platform and who said they worked for McAfeeâtheir personal pages now sported the obscene image in place of our logo, too!
Including mine.
On the next update I received, the support team said they werenât yet done with their âprocedures.â They said the only way to roll back the page was first to reactivate the accountâunlock itâand they were not going to do that until they finished their security review.
Seriously? How was this happening? Nothing could be done about our company page until they were done with their review. We were at their mercy. The most our employees could do was to delete any mention of McAfee on their own personal pages, which some who were aware of the event did.
But that wasnât sufficient. I continued to ruin Easter Sunday for others as I alerted our executive team of the event. We had ensured our companyâs servers were safe, but that didnât mean McAfee wasnât under attack through other social channels. And we certainly didnât know whether our own executive membersâand their social profile personasâwerenât the next target.
I took to email and group texts to sound the alarm, instructing our executive team to enable multifactor authentication on their personal profiles immediately on all social networking sites (more on multifactor authentication in a moment).
I followed my own advice and began frantically enabling the security feature on my personal profile pages wherever I could, that is, until I hit a very popular social networking platform where I became stumped. Iâm not sure if my body was in the full throes of fight-or-flight (where the body redirects blood flow to major muscle groups to help one flee a threat or stand ready to combatâin other words, not the prefrontal cortex) or if the social media platform could have done a better job of not obscuring the safety capability. It was probably a bit of both. In either case, panic consumed me, and I resorted to a desperate measure: I deleted my personal profileâand all its historyâon the social media platform altogether.
An hour stretched to two, then three, then four. I was regularly calling our CEO with the requisite, but annoying, status updates about our increasingly embarrassing vandalized company profile page. Calls that went something like:
- âChris, weâre still working with them. They havenât finished their security review. Weâre hoping it will be resolved in 30 minutes.â
Lather, rinse, repeatâevery 30 minutes.
It was on one of these calls that our CEO pulled a rabbit out of his hat.
- âAllison, I know of someone at the company and Iâm tired of waiting on them to take action. Iâm calling him.â
- âExcellent, Chris. Weâll keep the heat on the APAC team in the meantime.â
Chris made the connection and pleaded our case. Within 30 minutes of the call, the page was restored to its original state. I donât know whether Chrisâs call mattered, or whether the investigation simply had run its course and was completed. I just knew that the situation was now contained.
On Monday morning, we posted an article on our intranet site, letting every employee know what happened over the wee...