I got an email as a vBulletin forum owner that their own forums had been hacked and that they reset all vBulletin.com members passwords.
I got an email as a vBulletin forum owner that their own forums had been hacked and that they reset all vBulletin.com members passwords.
Here we go with the hashing again. Why are you upset over the hashing method when in fact you admitted to being careless in using duplicate passwords for other sites/services, the fault is yours. If your MR login info was unique to MR exclusively, what can a malicious user do with it other than impersonate you on the forums until you change your password? As a user (which all of us are), you have a responsibility to maintain your own security by minimizing your risks, should a compromise occur.
The breach to MR had nothing to do with hashes. As it was already stated numerous times by the mod(s), the method used was an account compromise which had mod/admin level privileges using a weak login/pass combo. Even with higher levels of encryption, a password such as abc123 or happycat2013 can be extracted with enough time.
Did your password consist of dictionary words? 779 in this thread.
for what it's worth,
vBulletin.com got hacked as well. The hackers claim they got access to our moderator account due to that hack/breach.
http://www.vbulletin.com/forum/foru...7195-important-message-regarding-your-account
arn
Inj3ct0r Team hacked vBulletin.com and Macrumors.com
Inj3ct0r Team hacked the big CMS vendor vBulletin.com
We got shell , database and root server. We wanted to prove that nothing in this world is not safe.
We found a critical vulnerability in vBulletin all versions 4.x.x and 5.х.x
We've got upload shell in vBulletin server, download database and got root.
All those wishing to buy a vulnerability and patch your forum : http://1337day.com/exploit/description/21518
proof image shell + database vBulletin.com:
http://1337day.com/img/exploits/4477f884c0f35e468c6a79d12a1ff663_1301380320.jpg
http://1337day.com/img/exploits/1b89aedb1ea392229094a73d12073b44_347699806.jpg
Macrumors.com was based on vBulletin CMS. We use 0day exploit on vBulletin, got password moderator. 860000 hacked too.
The network security is a myth
How am I supposed to know? Just coincidence that the email I use for this forum got hacked when I only use that email for this forum and my social media sites?
Part of it consisted of a dictionary word, but why would I want to remember or type a complicated password from my phone for a random forum that I am registered to? (That was my logic)
Clearly you didn't read my post or you would have seen the part where I said "I'm not mad at the site.."
Wrong. Cracking some of the more modern hashing algorithms will take more time than the age of the universe not to it is currently thermodynamically impossible. Of course that may change if a weakness is found in the algorithm but there you have it...
Who said I did? Out of all of my accounts, only my gmail was the same as the forum and then they used the email to hack into everything else
Someone recently used your password to try to sign in to your Google Account ***********@gmail.com. This person was using an application such as an email, client or mobile device.
We prevented the sign-in attempt in case this was a hijacker trying to access your account. Please review the details of the sign-in attempt:
Sunday, 17 November 2013 11:37:03 o'clock UTC
IP Address: 113.243.146.18
Location: Chenzhou, Hunan, China
If you do not recognise this sign-in attempt, someone else might be trying to access your account. You should sign in to your account and reset your password immediately.
*facepalm well done macrumors. well done
Did you know about the MR breach before getting that email? If so why didn't you immediately change any passwords that you had reused on other sites?Someone recently used your password to try to sign in to your Google Account ***********@gmail.com. This person was using an application such as an email, client or mobile device.
We prevented the sign-in attempt in case this was a hijacker trying to access your account. Please review the details of the sign-in attempt:
Sunday, 17 November 2013 11:37:03 o'clock UTC
IP Address: 113.243.146.18
Location: Chenzhou, Hunan, China
If you do not recognise this sign-in attempt, someone else might be trying to access your account. You should sign in to your account and reset your password immediately.
*facepalm well done macrumors. well done
I bet if I said I was leaving everyone here would be glad.![]()
I figured it was just a rumor.
I guess that is just a rumor as well, the lack of security for a Mac... ha ha ha...![]()
I read your post thoroughly, on one hand you said you weren't "mad at the site being hacked...", then you followed up with "pissed at the weak password hashing" which involved how MR's was setup, so in essence you contradicted yourself. I for one wouldn't care if there wasn't any hashing involved and my pass for MR was stored in plain text, a compromise would only allow them to impersonate me here, as my login/pass combo isn't used anywhere else.
I can tell you have no idea how encryption technologies work. What does thermodynamics have anything to do with what we're talking about here? Are you saying that the behavior of varying temperatures had something to do with hashing or your careless use of duping your login/pass elsewhere?
I've already stated that time is a key factor among others, in addition to available resources which I also stated.
Just because it'll take you years to extract the data you need because you're trying to do it on a Macbook Pro for example, doesn't mean there aren't better more effective machines that can actually do it. Even if a home user were to spend thousands building a top dollar, code cracking machine, it doesn't even compare to what some of the other powerhouses out there can do. There's a reason why cloud services exist for that purpose.
More time than the age of the universe? I see that you read this in some article or saw a message using a program somewhere, because those who work with encryption knows that simply isn't true. Encryption is all about protecting you now. For instance, top encryption methods back 10-15 years ago isn't as difficult to deal with today. 10-15 years from now, that'll likely be true about today's encryption methods.
Macrumors just informed me of this today, Nov 17, which is five days after the fact. This delay is unacceptable. To say that mass emails can't all be sent out at once is fine, but to take five days to get around to completing the task? Garbage.
I really love reading your articles, I really do, but this seems to happen often, & I don't understand why our passwords are saved on your database like the poster below said. I will have to delete accounts if this happens again. Your fans & customers will not enjoy taking time out of their day to change & reset their passwords; this seems to be happening way too often it seems like there is no security!