Sony Breach Reveals Users Lax With Password Security

  /     /     /  
Publicated : 22/11/2024   Category : security


Sony Breach Reveals Users Lax With Password Security


Analysis of recent hacks finds that people commonly reuse logins and choose easy-to-crack passwords.



(click image for larger view)
Slideshow: 10 Massive Security Breaches
Whos got the better security, you or Sony?
Based on an analysis of SonyPictures.com users, half of passwords use fewer than eight characters, only 4% of passwords use more than three character types (uppercase, lowercase, numbers), and fewer than 1% of passwords use non-alphanumeric characters. Furthermore, two-thirds of people reuse their passwords on other websites.
Those findings come by way of software architect Troy Hunt, who analyzed the SonyPictures.com user account information recently released by the
LulzSec hacking group
. Based on that analysis users continue to apply lousy password practices, he said in a
blog post
. Sonys breach is Sonys fault, no doubt, but a whole bunch of people have made the situation far worse than it needs to be through reuse.
Indeed, while 17 different Sony websites may have been hacked in the past two months-- making the company, in the words of one
security industry watcher
, a laughing stock amongst the hacking community, most Sony website users dont have anything to laugh at.
How prevalent is password reuse? To find out, Hunt looked at two of the Sony databases released by LulzSec, and found that they contained over 2,000 identical email addresses, meaning that someone has registered on both databases, he said. But had they used different passwords? In fact, 92% of people used the same password. Perhaps, however, they were just reusing the same password on multiple Sony websites?
To find out, Hunt compared the 37,608 Sony passwords released by LulzSec, to data from last years
hack of Gawker
by the Gnosis group, which led to 188,000 Gawker users credentials being publicly disclosed.
Although there were only 88 email addresses found in common with Sony (I had thought it might be a bit higher but then again, theyre pretty independent fields), the results are still very interesting, said Hunt. Namely, 67% of people with accounts at both Sony and Gawker used the same password in both places. In other words, password reuse continues to be a problem.
Thankfully, people did at least choose relatively unique passwords. There werent a whole lot of instances of multiple people choosing the same password, said Hunt. In addition, the top 25 passwords seen--including seinfeld, password, and 123456--only accounted for 2.5% of all passwords, while 80% of passwords actually only occurred once. Some choices, however, are better than others. For example, 36% of passwords that people chose are simply a word that appears in the dictionary, meaning that it would be easily susceptible to a dictionary attack.
Poor password practices, and people selecting relatively simple and thus easy-to-crack passwords, are nothing new. But security researchers say another significant problem is that too many websites dont properly enforce strong passwords, or properly secure stored passwords. As a result, thanks to rampant reuse of passwords, an attacker can compromise a poorly secured website,
harvest user credentials
, then use them to access more secure websites.
Of course, then theres Sony, which simply failed to encrypt passwords stored on a publicly accessible Web server, for example by using a cryptographic hash function such as MD5. Sony has clearly screwed up big time here, no doubt, said Hunt. The usual process with these exploits is to berate the responsible organization for only using MD5 or because they didnt salt the password before hashing, but to not even attempt to obfuscate passwords and simply store them in the clear? Wow.
In this special retrospective of recent news coverage, Dark Reading offers a look at the lessons learned from the most common database security mistakes and big-time breaches, as well as tips for how to avoid them.
Download it now
. (Free registration required.)

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Sony Breach Reveals Users Lax With Password Security