未加星标

Dual Data Leaks of Blur, Town of Salem Impact Millions

字体大小 | |
[网络安全 所属分类 网络安全 | 发布者 店小二04 | 时间 2019 | 作者 红领巾 ] 0人收藏点击收藏

Password-manager Blur and role-playing game Town of Salem both disclosed data breaches this week that impacted a combined 10 million.

The new year has started off with the disclosure of two high-profile data breaches exposing the personal and password data of millions of people.

Popular role-playing game Town of Salem saw the email addresses and passwords of more than 7.6 million players hacked; while a separate database issue with password-manager Blur exposed personal data of approximately 2.4 million users.

While 2018 was crazy year for data breaches MarriotttoQuoraand everything in-between- these latest breaches disclosed just in the first few days of 2019 show that the pace of hacks won’t be slowing anytime soon.

“Breaches will inevitably occur all around and it is important for companies to be as transparent as possible when they happen, in order to allow researchers and reporters to do their job at communicating the downstream implications of such breaches,”Jarrod Overson,director of engineering at Shape Security, told Threatpost.

Town of Salem Breach

The data breach of Town of Salem a popular browser-based game owned by BlankMediaGames was first discovered on Dec. 28 when the compromised database was anonymously sent to DeHashed, a hacked database search engine.

According to DeHashed, 7,633,234 unique email addresses were exposed the most-represented of the email providers being Gmail, Hotmail and Yahoo.com.

Also exposed were usernames, hashed passwords, IP addresses, and some payment information (including full names, billing and shipping addresses, IP information and payment amount). Credit-card numbers were not exposed.

A Town of Salem developer addressed the security incident Wednesday on the game’s online forum . According to the developer, three separate, maliciousphp files, which render HTML content for viewing in the browser, were the point of entry.

“We have found and removed three different PHP files from our web server that allowed the hacker to have a backdoor into the server,” the developer said. “Rackspace is also running a malware check on all of our servers. We believe we have stopped their ability to continue gathering data, but we are in the process of contacting security auditing firms and potentially discussing reinstalling all of our servers from scratch just to be 100 percent sure.”

The developer advised game players to change their passwords especially if they use the same credentials on any other site. It will also change up its password-hashing approach: “We are making plans to replace PHPBB with a more secure forum such as Vanilla, and moving to a more secure hashing algorithm,” according to the developer. “Since we didn’t store plaintext passwords, we can’t easily update everyone’s hashes to a new algorithm, but we are investigating our options.”

BlankMediaGames did not respond to a request for comment from Threatpost.

Video game services are a hot target for attackers because in the gaming industry, user experience overpowers security measures, which add friction and can cost the game users, said Shape Security’s Overson.

“Combine this with the increasing value of digital goods in games like Fortnite and you have incredibly attractive targets with comparatively weak defenses,” Overson told us. “It appears that the Town of Salem’s database was hashing passwords with the PHPBB3 algorithm, which is relatively weak and presents little barrier to cracking. It should be assumed that all passwords are exposed and all users who have reused passwords should change them across all services ASAP to limit their vulnerability to the credential-stuffing attacks that will likely occur in the future.”

Blur Data Exposure

A separate data exposure of password-manager Blur, discovered on Dec. 13 and disclosed Dec. 31, disclosed an array of personal information for millions of users.

An spokesperson with parent company Abinetold Threatpost that approximately 2.4 million users were potentially affected. The issue was a misconfigured Amazon S3 storage bucket that was being used for data processing, the spokesperson told us.

Exposed information includes unique email addresses, first and last names, password hints, user’s last and second to last IP addresses and encrypted Blur passwords for users who registered their accounts before Jan. 6, 2018.

“These encrypted passwords are encrypted and hashed before they are transmitted to our servers, and they are then encrypted using bcrypt with a unique salt for every user,” according to a security notice by Abine, the owner of Blur. “The output of this encryption process for these users was potentially exposed, not actual user passwords.”

Abine stressed there is no evidence that user’s critical data including payment information or usernames stored in Blur was compromised.The company also stressed that user’s should change their Blur password as well as on any other service if they’ve reused it.

“These two data breaches illustrate that no website or app is entirely immune to cyber crooks always on the alert for vulnerabilities that they can exploit,” Mike Bittner, digital security and operations manager at The Media Trust, told Threatpost. “If you have an app or a website, you are constantly under threat of an attack getting hacked is just a matter of time. Since many attacks involve third parties who support these digital assets and have weak security measures, companies should revisit the complex web of third through nth parties they work with and take a verify-first-trust-later approach.”

本文网络安全相关术语:网络安全工程师 网络信息安全 网络安全技术 网络安全知识

代码区博客精选文章
分页:12
转载请注明
本文标题:Dual Data Leaks of Blur, Town of Salem Impact Millions
本站链接:https://www.codesec.net/view/628459.html


1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
技术大类 技术大类 | 网络安全 | 评论(0) | 阅读(72)