(Image: file photo)Disqus has confirmed its web commenting system was hacked.
The company, which builds and provides a web-based comment plugin for news websites, said Friday that hackers stole more than 17.5 million email addresses in a data breach in July 2012.
More “mega breaches” to come, as rival hackers vie for sales
Despite some success, patience and trust is now fading.
About a third of those accounts contained passwords, salted and hashed using the weak SHA-1 algorithm, which has largely been deprecated in recent years in favor of stronger password scramblers.
Some of the exposed user information dates back to 2007.
Many of the accounts don’t have passwords because they signed up to the commenting tool using a third-party service, like Facebook or Google.
The theft was only discovered this week after the database was sent to Troy Hunt, who runs data breach notification service Have I Been Pwned, who then informed Disqus of the breach.
The company said in a blog post, posted less than a day after Hunt’s private disclosure, that although there was no evidence of unauthorized logins, affected users will be emailed about the breach.
Users whose passwords were exposed will have their passwords force-reset.
The company warned users who have used their Disqus password on other sites to change the password on those accounts.
“Since 2012, as part of normal security enhancements, we’ve made significant upgrades to our database and encryption in order to prevent breaches and increase password security,” said Jason Yan, chief technology officer, in the post.
Yan said that the company changed its password hashing to bcrypt, a much stronger password scrambler, in late 2012, and made other upgrades to improve security.
“Our team is still actively investigating this issue, but we wanted to share all relevant information as soon as possible,” said Yan.
Daniel Ha, chief executive, told ZDNet that the company was looking into all responsible and necessary disclosures, with customers and government authorities.
Ha added that the stolen data represents less than 10 percent of the company’s current user base. Since the breach, the number of website using its platform has increased by five-fold, he said.
Disqus joins several other companies, like LinkedIn, MySpace, and Yahoo, who have in the past year and a half revealed a historical data breach dating back to the turn of the decade.
Hunt, a security expert, praised the company’s response.
“In the space of less than 24 hours after first learning of the breach, Disqus has managed to assess the breach data, establish a timeline of events, reset passwords on impacted accounts, craft a very transparent announcement and liaise candidly with the press,” said Hunt.
“It’s a gold standard for responding to a security incident and sets a very high bar for others to aspire to in future,” he added.
Hunt added that 71 percent of email addresses were already in Have I Been Pwned’s database of more than 4.7 billion records.
Contact me securely
Zack Whittaker can be reached securely on Signal and WhatsApp at 646-755–8849, and his PGP fingerprint for email is: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.
Leaked TSA documents reveal New York airport’s wave of security lapses
US government pushed tech firms to hand over source code
At the US border: Discriminated, detained, searched, interrogated
Millions of Verizon customer records exposed in security lapse
Meet the shadowy tech brokers that deliver your data to the NSA
Inside the global terror watchlist that secretly shadows millions
FCC chairman voted to sell your browsing history — so we asked to see his
With a single wiretap order, US authorities listened in on 3.3 million phone calls
198 million Americans hit by ‘largest ever’ voter records leak
Britain has passed the ‘most extreme surveillance law ever passed in a democracy’
Microsoft says ‘no known ransomware’ runs on Windows 10 S — so we tried to hack it
Leaked document reveals UK plans for wider internet surveillance