Breach of nearly 2.7 billion records underlines password flaws
Potentially the biggest personal data breach to date from thousands of sources, some possibly breached as far back as 2008, illustrates the deeply flawed nature of password-based authentication, say industry commentators
A leak of 87GB of 772.9 million emails, 21.2 million passwords and 1.1 billion unique combinations of email addresses and passwords, has been revealed by security researcher Troy Hunt, who also manages the Have I Been Pwned service, which enables users to check if their personal data has been compromised.
The data leak, dubbed Collection #1, comprises 2.6 billion rows of data from 12,000 files and is being shared on hacking forums, Hunt revealed in a blog post.
The data presents a huge threat because cyber criminals can use the email and password combinations to test them across all online accounts using a technique called credential stuffing. This is enabled by the common practice of using the same email and password combination for multiple online and business application accounts.
“People take lists like these that contain our email addresses and passwords, then they attempt to see where else they work,” said Hunt. “The success of this approach is predicated on the fact that people reuse the same credentials on multiple services.”
He said this is a “serious problem” for anyone affected by the breach who has used the same password for multiple accounts.
Sergey Lozhkin, security expert at security firm Kaspersky Lab, warned that this collection can be easily be turned into a single list of emails and passwords. “Then all that attackers need to do is to write a relatively simple software program to check if the passwords are working,” he said.
“The consequences of account access can range from very productive phishing, as criminals can automatically send malicious emails to a victim’s list of contacts, to targeted attacks designed to steal victims’ entire digital identity or money or to compromise their social media network data.”
Hunt encouraged anyone affected by the breach to sign up to a password manager if they are not already using one.
“A password manager provides you with a secure vault for all your secrets to be stored in,” he said, adding that a password manager is also “a rare exception to the rule that adding security means making your life harder – for example, logging on to a mobile app is dead easy”.
Anyone affected by the breach is also advised to change all exposed passwords and ensure that each online account has a unique password.
Of the 2.2 million people who use the Have I Been Pwned service, 768,000 are affected by this breach, said Hunt.
Robin Tombs, CEO and co-founder of London-based technology firm Yoti, said the breach shows just how flawed passwords are for protecting online accounts.
“Millions of people will now have the worry and stress of whether their details are part of this data collection,” he said.
With the average person having 191 passwords, Tombs said convenience often trumps security and many people reuse the same password across different websites.
“While using the same easy-to-remember password makes life easier for individuals managing an ever-growing number of online accounts, it makes it equally simple for hackers to strike,” he said.
Like Hunt, Tombs said password managers store login details securely and eliminate the need to remember passwords. “Crucially, they can be secured with your unique biometrics rather than a master password – meaning only you can access and use your passwords,” he said.
The biggest breach of 2018 exposed the data of half a billion customers of the Marriott hotel group’s Starwood properties, including the St Regis, Westin, Sheraton, Aloft, Le Meridien, Four Points and W Hotel brands.
The second-largest breach was at Twitter, affecting 330 million users when a software bug exposed passwords in plain text. Twitter said there was an issue with its password hashing system, which failed to encrypt passwords and was saving them in plain text.
Industry: Cyber Security News
- IDAM Business Analyst - Home based
- Upto £500 per day
IDAM Business Analyst is required for a global retailer who are currently going through a global transformation of their IDAM solution This would be a rolling 3 month contrat estimated to be at least for 12 months YOu will be responsible for Creating process roadmaps and company strategy for Identity Management. Analysing and defining the client's needs and conducting a gap analysis to define areas of improvement/weakness in order to provide solutions that are in line with security best practices. Managing stakeholders from both the business (application owners) & Technology (IT Risk, Audit). * IAM subject matter expertise. Creat process diagrams to explain and demonstrate the IAM framework to end-users. We are looking for an experienced Business Analyst who has been involved in an IAM transformation where they have moved the business from one vendor to a new vendor. Experience with any of these vendors would be advantageous, Saviyant, Sailpoint, Okta, OR IBM
- REMOTE Cyber Security Operations Engineer. UK
- United Kingdom
CH8196 REMOTE Cyber Security Operations Engineer. UK Internal opportunity. New position. Exclusive to DCL Search. You will be the hands on technical eyes and ears of the Cyber security capability actively working to ensure and enhance the adherence to ISO27001 and SOC 2 controls. You role will touch on the following o Security Monitoring- Threat Analysis, Maturing monitoring capability. Utilising SIEM tools o Vulnerability Management- Identifying threats to internal assets- working with internal teams to patch. § Cloud based vulnerability tool experience preferred. o Access Control Management- Mature policy and process of RBAC. Ideally AWS KMS experience. o Vulnerability Testing- Aiding with Pen test scoping in line with identified vulnerabilities. Working internally to plan and track remediation actions. o Security Incident Management- Triaging alerts, evidence capture, escalation, diagnose and fix. o Working within a Cloud based environment. Ideally AWS. o Security Patch Management Support & Assistance – Approach methods, solutions, and policy alignment. o Disaster Recovery planning o Change Management Any CLOUD SIEM experience highly desirable. Contact me today for more information Chris.Holt@dclsearch.com / 07884666351
- Senior Product Developer, Microsoft.NET, Remote working
- Upto €80,000 plus benefits
- Senior Product Developer, Microsoft.NET, Remote working
- Upto 65,000 plus benefits