Computer users are in big trouble, and the threat is faced by consumers and the business community alike, writes ARTHUR GOLDSTUCK.
Almost all users of online business sites and tools are potentially in big trouble – they just don’t know it.
When hackers broke into the most popular social network for professionals this year and the most popular file storage service a few years ago, they didn’t just make off with the passwords for their own use. They published their lists of stolen user names and passwords on hacker sites and on what is know as the Dark Web: an Internet underground that is accessed with specialised browsers.
The biggest problem is not so much that hackers managed to get to the passwords. The average person is simply not worth targeting by the hacker looking for a big payday.
There are two bigger issues, says Stefan Tanase, senior security researcher in Kaspersky Lab’s global research and analysis team. At Kaspersky’s annual Cyber Security Weekend in Malta last week, he offered a sobering perspective on just how easy the hackers have it.
First, he says, most people don’t change their passwords even when they have been compromised in this way – precisely because they feel these particular accounts wouldn’t interest anyone.
Second, once such details have been made available to others, there are armies of potential wrongdoers scouring these lists and testing accounts to exploit vulnerabilities. These can be as mundane as the opportunity to damage people’s reputation by posting vile content in their names.
But even if a password has been changed, a deeper threat remains.
“Since it is so difficult to keep track of one’s passwords across multiple sites, many people use the same standard password wherever they log on,” says Tanase. The sharp criminal mind – and there are many of those – uses publicly-posted stolen log-on credentials to try logging onto various other sites.
Sooner or later, they find their way into people’s Facebook, Twitter or Gmail accounts. Here they harvest profile information, combine it with the log-in credentials that have already proven fruitful, and proceed to break into anything from PayPal to online bank accounts. Where they have access to the victim’s email, it is a simple matter to alter security credentials, and begin transacting in that person’s name.
That is a worst-case scenario – but one that is all too real. There is a word for it: “pwned”. That’s hacker/youth/hipster slang for being “owned” by someone, or conquered.
Most of us have already been pnwed, but don’t know it. Visit the website https://haveibeenpwned.com and type in your email address. It will tell you exactly which stolen passwords lists include your details. If nothing comes up, you’ve kept your online registrations to a minimum. If something does come up, make sure you change your passwords on any sites mentioned – as well as on any other site where you use the same passwords.
“Whenever hackers publish a hacked database, the people at haveibeenpwned collect it and put it in a searchable database where the public can check for their email addresses,” says Tanase. “Don’t worry, it doesn’t make passwords available. But it includes an incredible number of accounts – from 152 leaked databases and 1,8-billion accounts ‘pwned’ by hackers.”
Tanase himself, an affable Romanian who has been analysing threats for Kaspersky Lab for much of this decade, admits he has been pwned.
“Even though I’m a security expert, and done everything right, I’ve been massively pwned. My information was leaked from at least five providers who were hacked.
“Even if you do everything right from a security standpoint, with two-factor authentication, complex passwords, don’t reuse passwords, don’t click on phishing links, you’re still vulnerable when a website gets compromised.”
There is little people can do to prevent one-off theft of passwords after an intrusion, but they can close the hole quickly by changing the password as soon as it has been compromised, If they don’t reuse passwords, then the blow to the ego of getting pwned will be the worst of the damage. If they do reuse passwords, then some serious maintenance suddenly becomes a priority.
For those who are deeply concerned about email and messaging privacy, Tanase has one simple piece of advice: “Crypto is your friend.” By this, he means that using encryption tools will generally safeguard you from personally targeted intrusions. “It is mathematics; it will never lie to you,” he says.
“There are tools you can use, you just need to know about them and also get your friends to use them because, if you’re the only one using it, its not encrypted.
“Let’s imagine every site you use is 100 per cent secure with 100 per cent customisable privacy controls, flawless platform with bulletproof protection. But what happens if one of your friends gets infected? They have access to your private emails sent to the friend, and access to all the information that contact has.
“I want to encourage people to explore the privacy and security settings that are available on all the big platforms, settings that were not available a few years ago, but you still need to enable them from your settings.
“Another important thing is two-factor authentication, where you need both a password and a device where you receive a one-time pin or password. It’s the easiest and quickest thing you can do to massively improve security of your online accounts, online banking security for your Facebook or email or Twitter account. It’s not available by default for simplicity sake, but if you really want security, look for it in the settings. The moment you do that, you make it twice as hard for hackers to access your account.
“Use a password manager to manage all your different passwords. And make sure you keep everything up to date to massively increase your level of security. If you want more security, you have to be okay with less convenience.”
- Arthur Goldstuck is founder of World Wide Worx and editor-in-chief of Gadget.co.za. Follow him on Twitter and Instagram on @art2gee
Sidebar: Compromised web sites, courtesy haveibeenpwned
Adobe: In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, encrypted password and a password hint in plain text. The password cryptography was poorly done and many were quickly resolved back to plain text. The unencrypted hints also disclosed much about the passwords adding further to the risk that hundreds of millions of Adobe customers already faced.
Compromised data: Email addresses, Password hints, Passwords, Usernames
Dropbox: In mid-2012, Dropbox suffered a data breach which exposed the stored credentials of tens of millions of their customers. In August 2016, they forced password resets for customers they believed may be at risk. A large volume of data totalling over 68 million records was subsequently traded online and included email addresses and salted hashes of passwords (half of them SHA1, half of them bcrypt).
Compromised data: Email addresses, Passwords
Last.fm: In March 2012, the music website Last.fm was hacked and 43 million user accounts were exposed. Whilst Last.fm knew of an incident back in 2012, the scale of the hack was not known until the data was released publicly in September 2016. The breach included 37 million unique email addresses, usernames and passwords stored as unsalted MD5 hashes.
Compromised data: Email addresses, Passwords, Usernames, Website activity
LinkedIn: In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data.
Compromised data: Email addresses, Passwords
Product of the Day2 weeks ago
Naspers invests R42-m in public transport
Product of the Day2 weeks ago
Opera launches Hype in SA
People 'n' Privacy2 weeks ago
POPI is NOT coming to get you
People 'n' Issues2 weeks ago
Loyalty points get tax break
Stream of the Day2 weeks ago
E3: What to expect from Ubisoft Forward
Cybersecurity2 weeks ago
Biometrics set to replace passwords
AppDate1 week ago
AppDate: Kaspersky teaches kids digital ethics
Cybersecurity1 week ago
Defend yourself from doxing