MacRumors Hacker Promises Stolen Passwords Are Safe

  /     /     /  
Publicated : 22/11/2024   Category : security


MacRumors Hacker Promises Stolen Passwords Are Safe


Hacker grabbed 860,000 passwords for fun, but promises not to leak or use them to harm people.



The hacker behind Mondays breach of an Apple-related rumor and news website has promised to not leak any of the 860,000 passwords he stole.
But the hacker -- known as lol -- said that any users whod reused the same password on other sites had only themselves to blame. Were not terrorists, he said. Stop worrying, and stop blaming it on Macrumors when it was your own fault for reusing passwords in the first place.
The MacRumors website
disclosed the breach
Tuesday, saying that an attacker accessed a moderator account for the vBulletin software -- sold by Internet Brands -- that runs its online forums, then managed to escalate their access privileges, and dump a database containing usernames, email addresses and passwords, which were hashed and salted. The site recommended that all users immediately change their password for MacRumors, as well as any other site for which theyd used the same password.
We sincerely apologize for the intrusion, and are still investigating the attack with the help of a third-party security researcher, said MacRumors god Arn Kim. We believe that at least some user information was obtained during the attack, including passwords, he added. They are vBulletins standard md5 hashed and salted. Which is not that strong, so assume that your password can be determined with time.
In a series of MacRumors forum posts, Lol confirmed Wednesday that hed dumped the forum database and obtained usernames, email addresses, and salted and hashed passwords for 860,106 users. As proof that he was behind the hack, lol also published the first 16 bits of Kims old password hash, as well as the salt used for the password. But lol promised not to leak or even crack the passwords, or use the information to hack into peoples Gmail, Apple, Yahoo or other accounts, unless we target you specifically for some unrelated reason.
Consider the malicious attack friendly, said lol. The situation could have been catastrophically worse if some fame-driven idiot was the culprit and the database were to be leaked to the public.
Why hack the site? To test myself,
he said in an online post
. I never defaced the site, I never bragged about it anywhere, I just got in and got out.
In response to criticism that he should have alerted the website administrator to the flaw, rather than simply stealing the passwords, lol said that he sometimes contributes in a less black hat fashion to the greater good. Outside of this hobby, *cough*, I do partake in whitehat activities and try to contribute to some open source projects etc. he said.
Interestingly, lol also lauded MacRumors for quickly warning users about the breach, and detailing precisely what happened. Many other huge companies and corporations, probably some that youre all registered to, have taken days, weeks, or even never, to report a compromise. You should be thankful, he said.
Tripwire security researcher Ken Westin echoed that assessment. The straightforward approach that MacRumors has taken with regards to the breach is to be commended, he said in a blog post. Instead of attempting to cover up the breach, or make assumptions regarding the level of security the hashed passwords provided, they were quite up front with their community.
The MacRumors breach is a reminder to never reuse passwords across different websites. Facebook, amongst other sites, recently revealed that it has been
watching for users who reuse passwords
-- by mining plaintext data dumps from hackers or third-party researchers with access to stolen data -- and forcing them to verify their identity and change their password when next they log in.
To help manage distinct passwords for every website, you can use a password manager such as Lastpass, 1Password or iCloud keychain in Mavericks, said Kim at MacRumors.
This isnt the first hack to involve vBulletin software. Notably, the forum software was compromised earlier this year in a
hack of Apples developer portal
. In that case, a hacker named Sput who claimed credit likewise promised not to crack or leak the stolen passwords. You dont have to worry about a DB leak. That isnt how I like to do things, he said in an online post.
In the case of MacRumors, however, lol said that the vBulletin software wasnt to blame for the breach, saying instead that the fault lied within a single moderator. That suggests that a MacRumors moderator chose an insecure password, which lol either guessed, or matched using a dictionary attack, which attempts to guess passwords by using an exhaustive list of likely matches.
On the other hand, MacRumors breach disclosure said the hack attack appeared to be similar to a July hack of the Ubuntu forums. According to
Ubuntus attack postmortem
, the hacker gained access to a moderators account, then tricked another moderator with higher privileges into looking at a post on the site that likely contained a cross-site scripting attack that grabbed the other administrators vBulletin cookie. Once the attacker had the cookie, then he had full access to the entire site. The Ubuntu forum administrators said theyd made a number of changes to the default vBulletin site to help prevent repeat attacks.
Another defense against lols hack would have been to secure all MacRumors moderator accounts using two-factor authentication. A vBulletin spokesman didnt immediately respond to an emailed request for comment about whether two-factor authentication can be used with the forum software, but multiple posts to vBulletins forums suggest this isnt currently possible.

Last News

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
MacRumors Hacker Promises Stolen Passwords Are Safe