Achtung LinkedIn Benutzer, Passwörter wurden verbummelt

Ulrich

Well-Known Member
Citizen
An meinem neuen Password koennen sie sich die Zaehne ausbeissen (am alten eigentlich auch). Viel problematischer finde ich, dass sie jetzt ein paar Millionen *verifizierte* E-mail Adressen haben, die sie an die einschlaegigen Spam-Schleudern verkaufen koennen. Mal gucken, wieviele zusaetzliche Angebote an Viagra Pillen und Penisverlaengerungen ich in den naechsten Wochen bekomme...
 

ollie

Well-Known Member
Ehe-GC
...oder unangenehme Ueberraschungen auf anderen Platformen, falls man die gleiche e-mail und Passwort zum Login verwendet, z.B. Facebook.
 

Ulrich

Well-Known Member
Citizen
Like LinkedIn, eHarmony is hacked; 1.5 million passwords stolen
By Salvador Rodriguez
June 6, 2012, 4:56 p.m.


EHarmony, the popular online dating site, was the target of a password hacking attack that resulted in 1.5 million stolen passwords, most of which have been cracked.

The attack is believed to be by the same hacker who stole 6.5 million passwords from LinkedIn, the career-oriented social network.

The hacker posted two lists containing the 8 million passwords on the website insidepro.com, on which the user goes by the name of "dwdm."

The larger list contained some passwords LinkedIn has now confirmed as belonging to its social network. and a significant number of the passwords on the smaller list contained the words "eHarmony" or "harmony," according to Ars Technica.

EHarmony has confirmed that some of its passwords were stolen. The company announced the news in a blog, but did not say how many passwords were stolen. The dating site reset passwords for compromised accounts and emailed those users with instructions on how to reset their passwords.

The user posted the list of hashed passwords online and asked peers for help cracking them. The passwords were not salted -- which is an extra form of security that can be added on top of hashing passwords -- allowing dwdm's peers to help crack the vast majority of the passwords. Ars Technica reports that only about 98,000 passwords are still secure.

Ars Technica reports that the lists only contains passwords and not actual logins, which makes the passwords useless even if cracked, but in all likelihood, the hacker also has the logins.

If you are a user of LinkedIn or eHarmony, your best bet is to change your password. If you also use the same login/password combination for any other sites, the most secure thing you can do is change your password on those sites as well.
Like LinkedIn, eHarmony is hacked; 1.5 million passwords stolen - latimes.com
 

Ezri

Adminchen
Administrator
Na da bin ich direkt froh, daß ich weder bei dem einen noch bei dem anderen bin :)
 

Admin

Administrator
Teammitglied
Administrator
An meinem neuen Password koennen sie sich die Zaehne ausbeissen (am alten eigentlich auch). Viel problematischer finde ich, dass sie jetzt ein paar Millionen *verifizierte* E-mail Adressen haben, die sie an die einschlaegigen Spam-Schleudern verkaufen koennen. Mal gucken, wieviele zusaetzliche Angebote an Viagra Pillen und Penisverlaengerungen ich in den naechsten Wochen bekomme...
An SPAM tragen vorallem die (unfähigen) Administratoren die Schuld (natürlich abgesehen von dem Versender); mit relativ wenig Aufwand und ein kluger Konfiguration, könnte weltweit der SPAM de fakto eliminiert werden.
 

Ulrich

Well-Known Member
Citizen
Und wo wir gerade dabei sind... :)

Another hack? Last.fm warns users to change their passwords

Social music site Last.fm announced an investigation into a user password leak this morning. In light of a recent leak involving large sites such as LinkedIn (where 8 million passwords could have been compromised) and eHarmony, Last.fm is asking users to change their passwords immediately.

Last.fm users can switch their passwords by logging in and accessing the "Settings" page, or by reporting their password as lost. In the site's announcement, Last.fm re-emphasized these are the only means for password changes: "We will never e-mail you a direct link to update your settings or ask for your password."

Last.fm will update the status of the leak in the site's user forums or through Twitter when more information is available. Until then, the site offered the warning above and advice on choosing a secure password through Google. The amount of passwords potentially leaked has not been announced at this time.
Quelle: Ars Technica
 

Ulrich

Well-Known Member
Citizen
Und um den Bogen zum Eingangsthema zurueck zu finden:

10 (or so) of the worst passwords exposed by the LinkedIn hack

"12345? That's the stupidest combination I've ever heard in my life. That's the kind of thing an idiot would have on his luggage."

Or, apparently, on LinkedIn. You've probably heard about the 8 million passwords leaked from LinkedIn and a dating site (likely eHarmony) that appeared on the Internet today. 12345 itself wasn't used, but that's only because LinkedIn requires passwords to be at least six characters. 123456, 1234567, and 12345678 were all leaked, as were the usual contenders for worst passwords such as, well, "password."

Every single member of the list of the 25 worst passwords of 2011 was leaked, along with others such as "ihatemyjob," "fuckmylife," "nobama," and "iwantanewjob." At least one unhappy job hunter apparently used "linkedinblows." Even the password "strongpassword" was leaked and cracked.

How do we know all this? The passwords were leaked in the form of cryptographic hashes, not all of which were deciphered by hackers. Shortly after the leak, a site called "LeakedIn" popped up to help users figure out if their passwords were leaked and/or cracked. While it's assumed that hackers have the usernames associated with the 8 million passwords, they were not released publicly.

If you type a password into LeakedIn's search box, you'll be told whether it was leaked and cracked. In some cases, you'll be told a password was leaked but not yet cracked. The site uses JavaScript to hash your passwords and then checks the hashed version against the leaked password lists. Hashes that have been cracked were prepended with "00000" by the people who run the site to tell them apart from those not cracked by hackers yet.

"linkedin" was used as a password, as well as "linkedinpassword," and "eharmony," but not "eharmonypassword."

"One of many implications of this is that there is now a (growing) list of hundreds of thousands of cracked passwords," writes website designer Chris Shiflett, who helped build LeakedIn. "You can be sure that these will be used to seed rainbow tables and will be an obvious choice for seeding a dictionary used to try to crack passwords the next time a leak happens. Even if the next leak is a bunch of salted hashes using a better algorithm, these cracked passwords will never be safe again."

If there's one positive, it's that typing awful passwords into LeakedIn and seeing what's been leaked is tremendous fun. My own LinkedIn password was leaked (OK, that's not so fun), as were others I might have conceivably used, such as "supermario," and "frodolives."

If you haven't already changed your LinkedIn password, go ahead and do that now. After you're done, feel free to search LeakedIn for a bit. What are the worst passwords you can find?

Quelle: Ars Technica
 

Ezri

Adminchen
Administrator
"12345? That's the stupidest combination I've ever heard in my life. That's the kind of thing an idiot would have on his luggage."

Das ist aber ein Zitat von Lord Helmchen von Spaceballs, hach ich liebe Spaceballs :totlach
 
Oben