Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Is this why searching has been disabled?
People are always yelling at me for not searching the forums... But it still says searching is disabled! ;)
 
Explain me how anyone can unconditionally translate a hash to a plain text password? That is, of course you can get a string which maps to the same user's password hash, but you can't determine if that string is effectively the user's password.

It's more like matching a hash to an input that generates that hash.

For example:
user: macfanboy
pass (not stored in the database): imamacfanboy
md5 hash (stored in the database): 811016fb8de4e4abfdbf84a3a50b38a6

If you assume it's not salted, then yeah. However, they are salted, so that's not what's stored in the database.

Of course there are ways to crack this and get a string which maps to that hash, but you can't assume that guessed string will effectively be "imamacfanboy" since md5 is not a invertible function. In short, in most cases you can just guess a character sequence that fits a hash but not the user's intended character sequence (the effective password).

Well, what you would typically do in the offline brute forcing is using a dictionary combined with some rules (i.e. replace all instances of 'e' with '3' in the input string), then hash the input, then check the table of passwords to see if it matches. If it does, then you know that that was probably that user's plaintext password. While it's theoretically possible that you found a hash collision, the chances are astronomically small and you'd be more likely to stub your toe on a solid gold bar when you're walking to the bathroom.

This said, hackers will be able to log into other forums which use the same hash function (e.g. md5(md5(...)), but logging into sites that use different hash schemes will be a harder work.

Well, only if they use the same salt, too. Again, not likely.

There are other md5 tricks that allow hackers to infer the effective string employed by the user as a password (e.g. using dictionaries) but this is an issue only for single-word, very easy passwords. But easy passwords are an issue no matter what hash is used.

Not really. There are programs like oclhashcat, wherein one of the defined rules for generating an input string to hash is combing words, or other input phrases.
 
Why isn't this story top of the list?
If the website was compromised and users personal info / passwords taken MacRumors should make it a priority to let everyone know. But now this is just moving down the list like every other story here.
 
Why isn't this story top of the list?
If the website was compromised and users personal info / passwords taken MacRumors should make it a priority to let everyone know. But now this is just moving down the list like every other story here.

There is a statement at the top of the page, with a read this link.

It's done. It can happen again of course, but a change of password and a little care is all that the average user can do. For those with issues with keychain, open the app, click on iCloud, look for the MacRumors entry, and delete it.

Log out, empty your browser cage and open the login page again....all login fields should now be blank.
 
It's more like matching a hash to an input that generates that hash.



If you assume it's not salted, then yeah. However, they are salted, so that's not what's stored in the database.



Well, what you would typically do in the offline brute forcing is using a dictionary combined with some rules (i.e. replace all instances of 'e' with '3' in the input string), then hash the input, then check the table of passwords to see if it matches. If it does, then you know that that was probably that user's plaintext password. While it's theoretically possible that you found a hash collision, the chances are astronomically small and you'd be more likely to stub your toe on a solid gold bar when you're walking to the bathroom.



Well, only if they use the same salt, too. Again, not likely.



Not really. There are programs like oclhashcat, wherein one of the defined rules for generating an input string to hash is combing words, or other input phrases.

Well, actually we're basically agreeing about the MR security leak: it's not a big issue in most cases (except with easy dictionary predictable passwords, including combination of simple terms and/or replacing letters with their "hacker" counterparts, i.e. "o" to "0", "i" to "1" and so on).
 
Happened to me here until I logged out of here, and then logged back in (don't just change your password; log out after changing password). Upon logging back in, I was asked if I wanted to update my password in keychain.

But how do I log back in if I don't have my new password? Safari won't let me copy the generated password.
 
No, MD5 is not that "strong", but it's still a one-way hash. If you have a password like "efjwelkfwlkj3233423!!!2dsjdsd,..23328432747234" (okay, maybe not that crazy), the chance if it being cracked is pretty small. You'd have to had a very very large rainbow table to do that, which would take enormous time to make
 
Last edited:
Was very nice, participating in the MacRumor forums. But I do not want to participate, anymore :(
Bye!

I hope all you people that are leaving because of this, leave your bank, leave your credit card company, leave your car loan, leave all social media because this happens to even the most secure companies so don't act like MacRumors is the devil

----------

Shouldn't macrumors be held responsible or pay some kind of restitution for punitive damages?

Yes, definitely. They made you sign up and use a non-unique password. Definitely sue them for all their worth

----------

I was going to avoid this, but I decided to use LastPass to change my password. Looks like I won't logging onto MacRumors much in the future in my mobile devices. :(

if you use icloud the moment you go on the site it will save in your keychain and then be available on your mobile. I did it yesterday. It was very cool.
 
Last edited:
Shouldn't macrumors be held responsible or pay some kind of restitution for punitive damages?

If your life depended on it or was in peril - possibly. Lol

It's a freaking message board. Who gives a crap. You probably have more stuff readily accessible on Facebook and you're worried about a simple password/account you have here that may or may not have been divulged? Ugh.

PRIORITIES!

Example - you live in Queens right?
 
If your life depended on it or was in peril - possibly. Lol

It's a freaking message board. Who gives a crap. You probably have more stuff readily accessible on Facebook and you're worried about a simple password/account you have here that may or may not have been divulged? Ugh.

PRIORITIES!

Example - you live in Queens right?

why are you worried about where i live ? thats not the point here
 
I'm finding odd behavior on AppShopper.com.

When I go to the MyApps or Wishlist tab it shows me as logged on as another user.

Starting to get worried...
 
Why weren't the passwords encrypted?

I find it absurd that MacRumors.com moderators spend so much time policing views and ideas -- particularly those critical of Apple, rather than actually spending more time on improving the security of the site.

Maybe the mods and arn as the owner can take a step back and reflect about their lapses.

Encrypting passwords is entry level stuff. Any decent site should have done it already.

And if the article is to be believed, the hack was similar to a previous hack -- so why weren't security measures taken to patch the site? After all, it is not an unknown issue.
 
Last edited by a moderator:
I'm finding odd behavior on AppShopper.com.

When I go to the MyApps or Wishlist tab it shows me as logged on as another user.

Starting to get worried...

In my experience, whenever a consumer is notified about a security incident from one provider, the consumer tends to naturally link any subsequent anomaly with that incident (and tends to look for other anomalies). However, there is rarely any connection. More likely what you are seeing is entirely coincidental and unrelated.
 
Someone has already used this password to get into my Steam account. Changed both, but don't know yet what else might be compromised.
 
Why weren't the passwords encrypted?

I find it absurd that MacRumors.com moderators spend so much time policing views and ideas -- particularly those critical of Apple, rather than actually spending more time on improving the security of the site.

Maybe the mods and arn as the owner can take a step back and reflect about their lapses.

Encrypting passwords is entry level stuff. Any decent site should have done it already.

And if the article is to be believed, the hack was similar to a previous hack -- so why weren't security measures taken to patch the site? After all, it is not an unknown issue.

They were all hashed. Read the text!
 
Last edited by a moderator:
why are you worried about where i live ? thats not the point here

Sure it is. I'm making a point. You live in Queens. You went to Costa Rica and Cancun a few years back. You also invest. Should I go on? No, I won't. ;)
 
As unfortunate as this is, it really speaks as much to vBulletin's poor security (using MD5, albeit a double md5 with salt) as it does MR's decision to use vBulletin (even though it's hard to migrate a massive vBulletin to something else).

I would hope that in light of two high-profile hacks like this that vBulletin consider switching hashing algorithms, at the very least, and I think it would be a straightforward patch to make. phpass these days uses blowfish, then extended des, then md5 only as a last resort.
 
As unfortunate as this is, it really speaks as much to vBulletin's poor security (using MD5, albeit a double md5 with salt) as it does MR's decision to use vBulletin (even though it's hard to migrate a massive vBulletin to something else).

I would hope that in light of two high-profile hacks like this that vBulletin consider switching hashing algorithms, at the very least, and I think it would be a straightforward patch to make. phpass these days uses blowfish, then extended des, then md5 only as a last resort.

MacRumors was/is using a version of vBulletin that was 'End of Lifed' in March 2011. Subsequent versions of vBulletin are...poor (to put it VERY mildly).

In this instance only MacRumors is to blame - they've had almost 3 years to move to better software.

----------

Someone has already used this password to get into my Steam account. Changed both, but don't know yet what else might be compromised.

Assume everything is - that's usually the best policy. Change passwords for everything, even if you don't use the same password.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.