Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
I got an email as a vBulletin forum owner that their own forums had been hacked and that they reset all vBulletin.com members passwords.
 
Here we go with the hashing again. Why are you upset over the hashing method when in fact you admitted to being careless in using duplicate passwords for other sites/services, the fault is yours. If your MR login info was unique to MR exclusively, what can a malicious user do with it other than impersonate you on the forums until you change your password? As a user (which all of us are), you have a responsibility to maintain your own security by minimizing your risks, should a compromise occur.

Clearly you didn't read my post or you would have seen the part where I said "I'm not mad at the site.."

The breach to MR had nothing to do with hashes. As it was already stated numerous times by the mod(s), the method used was an account compromise which had mod/admin level privileges using a weak login/pass combo. Even with higher levels of encryption, a password such as abc123 or happycat2013 can be extracted with enough time.

Wrong. Cracking some of the more modern hashing algorithms will take more time than the age of the universe not to it is currently thermodynamically impossible. Of course that may change if a weakness is found in the algorithm but there you have it...

Clearly you absolutely have no idea what your talking about.
 
Did your password consist of dictionary words? 779 in this thread.

Part of it consisted of a dictionary word, but why would I want to remember or type a complicated password from my phone for a random forum that I am registered to? (That was my logic)
 
for what it's worth,

vBulletin.com got hacked as well. The hackers claim they got access to our moderator account due to that hack/breach.

http://www.vbulletin.com/forum/foru...7195-important-message-regarding-your-account

arn

LOOK HERE;

https://www.facebook.com/inj3ct0rs/posts/611793255548704

Inj3ct0r Team hacked vBulletin.com and Macrumors.com

Inj3ct0r Team hacked the big CMS vendor vBulletin.com

We got shell , database and root server. We wanted to prove that nothing in this world is not safe.

We found a critical vulnerability in vBulletin all versions 4.x.x and 5.х.x

We've got upload shell in vBulletin server, download database and got root.

All those wishing to buy a vulnerability and patch your forum : http://1337day.com/exploit/description/21518

proof image shell + database vBulletin.com:

http://1337day.com/img/exploits/4477f884c0f35e468c6a79d12a1ff663_1301380320.jpg

http://1337day.com/img/exploits/1b89aedb1ea392229094a73d12073b44_347699806.jpg

Macrumors.com was based on vBulletin CMS. We use 0day exploit on vBulletin, got password moderator. 860000 hacked too.

The network security is a myth
 
How am I supposed to know? Just coincidence that the email I use for this forum got hacked when I only use that email for this forum and my social media sites?

All the guy got was hashed passwords. If he cracked them in that amount of time, then we all have bigger problems to deal with in terms of internet security.

----------

Part of it consisted of a dictionary word, but why would I want to remember or type a complicated password from my phone for a random forum that I am registered to? (That was my logic)

Hey, did anyone ever say what the original password was for the admin who had his account hacked? Was it a very easy password to begin with? Maybe MR should make all admins use 20+ character passwords?

----------

https://howsecureismypassword.net

The password: doyouwanttoknowasecret

will only take 106 trillion years...

Note, I would never use a password I type online... just use for reference. Just string together some favorite numbers, some song lyrics, and your birthday. Everyone can have a password that will stand the test of eternity.
 
Clearly you didn't read my post or you would have seen the part where I said "I'm not mad at the site.."

I read your post thoroughly, on one hand you said you weren't "mad at the site being hacked...", then you followed up with "pissed at the weak password hashing" which involved how MR's was setup, so in essence you contradicted yourself. I for one wouldn't care if there wasn't any hashing involved and my pass for MR was stored in plain text, a compromise would only allow them to impersonate me here, as my login/pass combo isn't used anywhere else.

Wrong. Cracking some of the more modern hashing algorithms will take more time than the age of the universe not to it is currently thermodynamically impossible. Of course that may change if a weakness is found in the algorithm but there you have it...

I can tell you have no idea how encryption technologies work. What does thermodynamics have anything to do with what we're talking about here? Are you saying that the behavior of varying temperatures had something to do with hashing or your careless use of duping your login/pass elsewhere?

I've already stated that time is a key factor among others, in addition to available resources which I also stated.

Just because it'll take you years to extract the data you need because you're trying to do it on a Macbook Pro for example, doesn't mean there aren't better more effective machines that can actually do it. Even if a home user were to spend thousands building a top dollar, code cracking machine, it doesn't even compare to what some of the other powerhouses out there can do. There's a reason why cloud services exist for that purpose.

More time than the age of the universe? I see that you read this in some article or saw a message using a program somewhere, because those who work with encryption knows that simply isn't true. Encryption is all about protecting you now. For instance, top encryption methods back 10-15 years ago isn't as difficult to deal with today. 10-15 years from now, that'll likely be true about today's encryption methods.
 
Someone recently used your password to try to sign in to your Google Account ***********@gmail.com. This person was using an application such as an email, client or mobile device.

We prevented the sign-in attempt in case this was a hijacker trying to access your account. Please review the details of the sign-in attempt:

Sunday, 17 November 2013 11:37:03 o'clock UTC
IP Address: 113.243.146.18
Location: Chenzhou, Hunan, China


If you do not recognise this sign-in attempt, someone else might be trying to access your account. You should sign in to your account and reset your password immediately.

*facepalm well done macrumors. well done
 
Who said I did? Out of all of my accounts, only my gmail was the same as the forum and then they used the email to hack into everything else

The email is the most important one of all (with the exception of your bank account). It is the key to unlock all of your other services.

----------

Someone recently used your password to try to sign in to your Google Account ***********@gmail.com. This person was using an application such as an email, client or mobile device.

We prevented the sign-in attempt in case this was a hijacker trying to access your account. Please review the details of the sign-in attempt:

Sunday, 17 November 2013 11:37:03 o'clock UTC
IP Address: 113.243.146.18
Location: Chenzhou, Hunan, China


If you do not recognise this sign-in attempt, someone else might be trying to access your account. You should sign in to your account and reset your password immediately.

*facepalm well done macrumors. well done

*facepalm* well done Steve000, well done.

Seriously use a different password on your email to ALL of your other services. It's critical as it is the gateway to your other services.
 
Someone recently used your password to try to sign in to your Google Account ***********@gmail.com. This person was using an application such as an email, client or mobile device.

We prevented the sign-in attempt in case this was a hijacker trying to access your account. Please review the details of the sign-in attempt:

Sunday, 17 November 2013 11:37:03 o'clock UTC
IP Address: 113.243.146.18
Location: Chenzhou, Hunan, China


If you do not recognise this sign-in attempt, someone else might be trying to access your account. You should sign in to your account and reset your password immediately.

*facepalm well done macrumors. well done
Did you know about the MR breach before getting that email? If so why didn't you immediately change any passwords that you had reused on other sites?

It's a life lesson though and I'm glad it happened to me a few months ago when someone used a really old password from a defunct gaming forum to get into my PayPal (which I also rarely used). I now use LastPass to manage my more than 60 accounts all with unique passwords.
 
There's definitely something fishy going on.

I use Gmail and have used it since 2004. In that time, 98% of spam e-mails have gone straight to my spam box, skipping my inbox altogether. I get maybe one spam e-mail that actually gets in to my inbox maybe once every 2-3 months, if that.

The last 3-4 days, I have received around 8-10 spam e-mails all that went straight to my inbox - they weren't detected as spam.

Coincidence? Possibly... but I don't think I had 8-10 spam e-mails make my inbox in the past YEAR and now I have had that many in 3 or 4 days? It's a bit odd.

I don't open them so I'm alright on that front. I'm also less worried about security as I changed all my passwords to unique 32 character passwords using LastPass. I've also set up LastPass with a different e-mail account to the one I use everyday and won't be giving this address out to anyone or anything except LastPass.
 
Macrumors just informed me of this today, Nov 17, which is five days after the fact. This delay is unacceptable. To say that mass emails can't all be sent out at once is fine, but to take five days to get around to completing the task? Garbage.
 
The vBulletin attack seems to have been from October-ish, according to some posts (above). And not known about until now.

We do believe that our moderator account had a password taken from vBulletin.org and that was used to access MacRumors.

Given the lag time between October and now, it's very possible that many other forums have been hacked and simply don't know it yet. In fact, one of the files used in the MacRumors hack was hosted on another legitimate looking site, so we suspect they have been hacked as well. I contacted them, notifying them, but haven't heard back.

arn
 
And here I thought mac's were so secure

I guess that is just a rumor as well, the lack of security for a Mac... ha ha ha...:p
 
I guess that is just a rumor as well, the lack of security for a Mac... ha ha ha...:p

I've read that MacRumors is hosted on CentOS, an unbranded version of Red Hat Linux. Still, I doubt the vulnerabilities were in the OS itself.
 
I read your post thoroughly, on one hand you said you weren't "mad at the site being hacked...", then you followed up with "pissed at the weak password hashing" which involved how MR's was setup, so in essence you contradicted yourself. I for one wouldn't care if there wasn't any hashing involved and my pass for MR was stored in plain text, a compromise would only allow them to impersonate me here, as my login/pass combo isn't used anywhere else.



I can tell you have no idea how encryption technologies work. What does thermodynamics have anything to do with what we're talking about here? Are you saying that the behavior of varying temperatures had something to do with hashing or your careless use of duping your login/pass elsewhere?

I've already stated that time is a key factor among others, in addition to available resources which I also stated.

Just because it'll take you years to extract the data you need because you're trying to do it on a Macbook Pro for example, doesn't mean there aren't better more effective machines that can actually do it. Even if a home user were to spend thousands building a top dollar, code cracking machine, it doesn't even compare to what some of the other powerhouses out there can do. There's a reason why cloud services exist for that purpose.

More time than the age of the universe? I see that you read this in some article or saw a message using a program somewhere, because those who work with encryption knows that simply isn't true. Encryption is all about protecting you now. For instance, top encryption methods back 10-15 years ago isn't as difficult to deal with today. 10-15 years from now, that'll likely be true about today's encryption methods.


No. I am referring to the energy required to crack modern day hashing. The computational power required for some of them is against the laws of physics. Not even taking into account time. I think the weakest algorithm is what, O(^^256)? You are overestimating the capabilities of cloud computing when every computer working on the planet working toward cracking them currently take more time than the universe's age. Clearly you don't even remotely understand the mathematics involved.

Why are you taking about 10-15 years from now? You keep spinning around in circles more than Linda Blair in the exorcist!

I suggest you stop digging yourself deeper and deeper with your nonsensical posts.
 
Last edited:
Macrumors just informed me of this today, Nov 17, which is five days after the fact. This delay is unacceptable. To say that mass emails can't all be sent out at once is fine, but to take five days to get around to completing the task? Garbage.


You try sending over 800,000 emails at once. I guarantee your ISP will block your email account as a potential spammer. These things are done in batches and take time. And yes it does take that long when there are that many people to email.
 
Weakest Link

Any website is as secure as it's weakest link, and this case it seems to be an account with Admin/superuser privilages. This means that the owners of the site do not have security policies and/or do not carry out audit of their policies regarding security making it easy to get a bite of the :apple:
 
I really love reading your articles, I really do, but this seems to happen often, & I don't understand why our passwords are saved on your database like the poster below said. I will have to delete accounts if this happens again. Your fans & customers will not enjoy taking time out of their day to change & reset their passwords; this seems to be happening way too often it seems like there is no security!
 
I really love reading your articles, I really do, but this seems to happen often, & I don't understand why our passwords are saved on your database like the poster below said. I will have to delete accounts if this happens again. Your fans & customers will not enjoy taking time out of their day to change & reset their passwords; this seems to be happening way too often it seems like there is no security!

Just curious....

Prior to this most recent event...how often have you had to change your MR password?

And how long did it take you to accomplish that task?
 
Last edited:
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.