Following Disqus Breach, Expert Discloses More Old Breaches

Disqus issued an Oct. 6 breach notification, warning that data on 17.5 million users was stolen in 2012.
The commenting platform Disqus is resetting all users’ passwords after discovering a password database breach that dates from 2012. That is just one of several older breaches in which stolen data has only now surfaced, and more belated breach discoveries are in the pipeline, says one security expert.
See Also: Effective Cyber Threat Hunting Requires an Actor and Incident Centric Approach
Disqus is a commenting platform that lets websites build a database of users and track engagement. The company says its software is used by millions of publishers, comprising some 17 billion page views a month. In fact, the publisher of this site, Information Security Media Group, uses Disqus for commenting, but did not begin using the service until 2013, which is after the breach occurred.
Whoever breached Disqus obtained a snapshot of its database, circa 2012, with information on 17.5 million users going back to 2007, writes Jason Yan, the CTO and co-founder of Disqus. The breach exposed email addresses, salted password hashes, usernames, sign-up dates and last login dates.
“We sincerely apologize to all of our users who were affected by this breach,” Yan writes. “Our intention is to be as transparent as possible about what happened, when we found out, what the potential consequences may be and what we are doing about it.”
Troy Hunt, who runs the Have I Been Pwned data breach notification service, notified Disqus of the breach. Hunt loaded the data into his service, which sends emails to registered users when their email appears in a data breach. One ISMG reporter received a Disqus breach alert from Hunt’s service on Saturday.
Disqus breach alert from Troy Hunt’s Have I Been Pwned service.
Hunt says he received the data from a source he declined to name.
抢装潮再度来袭 港股光伏企业步入看涨行情
Yan at Disqus says it doesn’t not appear that the stolen data has been widely distributed or is readily available.
Breach-Notification Kudos
Hunt says Disqus “actually did a sensational job handling” the breach.
About one day after learning of the breach, Disqus had posted Yan’s blog post. Disqus is also resetting passwords for all users. Yan writes that there hasn’t been any evidence of unauthorized logins leveraging the breached data. But he recommends that users who’ve reused their Disqus password on other sites change all of them immediately.
Breach-notification timeline published by Disqus on Oct. 6.
The Disqus passwords were hashed using the SHA1 algorithm, which security experts have long warned – well before 2012 – was not a secure way to hash passwords. Hashing is the process by which a plaintext password is processed by an algorithm to generate a cryptographic representation, which is safer for service providers to store.
Disqus passwords also had “salt,” an additional security measure that makes it more difficult guess the plain text.
SHA1 Alert
Modern computing power allows attackers to calculate hashes and then check if the hashes match the leaked one. Some hardware rigs, specifically configured for password cracking, can generate hashes for possible SHA1 passwords up to 8.5 billion times a second, in an attempt to generate a hash that matches, thus allowing the password cracker to recover the plaintext password that was originally hashed.
Hunt says there’s a good chance that at the least the weak passwords hashed with the SHA1 algorithm could be cracked or have already been cracked. More complicated passwords, however, might have been harder to crack.
“Salt or not salt, if you’re using MD5 or any SHA variant … then it’s basically useless,” Hunt says. “And when we say useless, we mean a large percentage will be cracked in a very short time.”
Disqus notes that it moved to the bcrypt algorithm to hash passwords in late 2012, which is what many security experts have long advocated. The bcrypt algorithm, provided it is correctly implemented, is regarded as being an extremely secure way to hash passwords, as it takes attackers much longer to generate bcrypt hashes. The aforementioned password-cracking hardware setup, for example, can only generate around 13,000 bcrypt hashes per second, compared with 8.5 billion SHA1 hashes.
Trio of Old Breaches
Disqus is not alone in seeing an old breach come to light. On Wednesday and Thursday, Hunt added several other breaches to Have I Been Pwned, including breaches of Reverb Nation, Kickstarter and Bitly. All of the companies disclosed those breaches in the first half of 2014.
Hunt says the same source who passed him the Disqus data gave him the data from these three other breaches. Hunt says the source passed him the data of concern for the safety of those sites’ users.
The Bitly breach, disclosed by the company in May 2014, encompassed 9.3 million accounts. It included compromised email addresses, encrypted passwords, API keys and OAuth tokens.
After Hunt tweeted that the Bitly data was in Have I Been Pwned, Bitly responded that the breach came as a result of a compromise of a third-party service – something it did not note in its original notification. “No current security threat; No action required,” Bitly tweeted.
RE: 3rd-party service recently shared a data compromise that affected Bitly in 2014. No current security threat; no action required. pic.twitter.com/kcHSuseAYS— Bitly (@Bitly) October 6, 2017

Kickstarter said in February 2014 that it suffered a breach affecting 5.2 million unique email addresses, usernames and salted SHA1 hashes of passwords. In September 2015, ReverbNation, which is a service for helping musicians, gave notice of a breach of 7 million accounts, including email addresses and hashed SHA1 passwords with a salt.
More Breaches Coming
公司的敏感信息数据和员工的私人密码或在线银行帐户信息一样重要,IT管理者必须向员工灌输这样的意识。
Old, big breaches only now coming to light harks back to last year. That’s when data stolen from such major companies as Yahoo, LinkedIn, MySpace and Twitter started circulating on the cybercrime underground, years after the actual breaches occurred (see ‘Historical Mega Breaches’ Continue: Tumblr Hacked).
Hunt says he’s also received data from three additional breaches, comprising around 22 million records. Affected companies are being notified directly; Hunt says they will be added to Have I Been Pwned.
These old breaches, only now coming to light, are a reminder that there are so many breaches “out there which we just do not know about, that we have not heard about, and the companies that have lost it don’t know and it could have been from years ago too,” Hunt says.
Executive Editor Mathew Schwartz also contributed to this story.
公司应该根据国家与监管部门有关外包与采购规定,结合风险控制和实际需要,建立有效的外包和采购内部评估审核流程与监督管理机制。

猜您喜欢

2017年9月计算机四级信息安全工程师考试答案
包括安全疏散与逃生等在内的在线EHS视频培训课程
网络安全法培训短片
刘永宏公益爱心惠及十万多近视孩子
VREME NEATLINKS
网络安全公益短片个人信息保护实战