Disqus confirms 2012 hack of its comments tool

(Image: file photo)Disqus has confirmed its web commenting system was hacked.
The company, which builds and provides a web-based comment plugin for news websites, said Friday that hackers stole more than 17.5 million email addresses in a data breach in July 2012.
INVESTIGATION
More “mega breaches” to come, as rival hackers vie for sales
Despite some success, patience and trust is now fading.
Read More
About a third of those accounts contained passwords, salted and hashed using the weak SHA-1 algorithm, which has largely been deprecated in recent years in favor of stronger password scramblers.
Some of the exposed user information dates back to 2007.
万通地产新老板又傍中植系 地产金融成最后希望
Many of the accounts don’t have passwords because they signed up to the commenting tool using a third-party service, like Facebook or Google.
The theft was only discovered this week after the database was sent to Troy Hunt, who runs data breach notification service Have I Been Pwned, who then informed Disqus of the breach.
The company said in a blog post, posted less than a day after Hunt’s private disclosure, that although there was no evidence of unauthorized logins, affected users will be emailed about the breach.
Users whose passwords were exposed will have their passwords force-reset.
The company warned users who have used their Disqus password on other sites to change the password on those accounts.
“Since 2012, as part of normal security enhancements, we’ve made significant upgrades to our database and encryption in order to prevent breaches and increase password security,” said Jason Yan, chief technology officer, in the post.
Yan said that the company changed its password hashing to bcrypt, a much stronger password scrambler, in late 2012, and made other upgrades to improve security.
在互联网上坏家伙们在偷窃,而好人们一定要携起手来,确保我们能走在他们的前面。
“Our team is still actively investigating this issue, but we wanted to share all relevant information as soon as possible,” said Yan.
Daniel Ha, chief executive, told ZDNet that the company was looking into all responsible and necessary disclosures, with customers and government authorities.
Ha added that the stolen data represents less than 10 percent of the company’s current user base. Since the breach, the number of website using its platform has increased by five-fold, he said.
Disqus joins several other companies, like LinkedIn, MySpace, and Yahoo, who have in the past year and a half revealed a historical data breach dating back to the turn of the decade.

Hunt, a security expert, praised the company’s response.
“In the space of less than 24 hours after first learning of the breach, Disqus has managed to assess the breach data, establish a timeline of events, reset passwords on impacted accounts, craft a very transparent announcement and liaise candidly with the press,” said Hunt.
“It’s a gold standard for responding to a security incident and sets a very high bar for others to aspire to in future,” he added.
Hunt added that 71 percent of email addresses were already in Have I Been Pwned’s database of more than 4.7 billion records.
Contact me securely
Zack Whittaker can be reached securely on Signal and WhatsApp at 646-755–8849, and his PGP fingerprint for email is: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.
Read More
ZDNET INVESTIGATIONS
Leaked TSA documents reveal New York airport’s wave of security lapses
US government pushed tech firms to hand over source code
At the US border: Discriminated, detained, searched, interrogated
Millions of Verizon customer records exposed in security lapse
Meet the shadowy tech brokers that deliver your data to the NSA
Inside the global terror watchlist that secretly shadows millions
FCC chairman voted to sell your browsing history — so we asked to see his
With a single wiretap order, US authorities listened in on 3.3 million phone calls
198 million Americans hit by ‘largest ever’ voter records leak
Britain has passed the ‘most extreme surveillance law ever passed in a democracy’
Microsoft says ‘no known ransomware’ runs on Windows 10 S — so we tried to hack it
Leaked document reveals UK plans for wider internet surveillance
移动终端将逐渐替代传统的电脑终端系统,成为安全厂商和黑客们竞争和角逐的新战场,这综合性的战争不仅仅是手机防病毒,您和您的组织有准备好吗?

猜您喜欢

大数据与信息安全(三)影像测量学与照片泄密
企业信息安全员工需知
学习管理系统LMS 学员操作演示
超模水中拍大片众人围观
DUODECIMLEHTI THENORTHADAMSTRANSCRIPT
电脑开着,人却不见了