Showing posts with label computer security. Show all posts
Showing posts with label computer security. Show all posts

Sunday, September 13, 2015

When you think the Ashley Madison thing couldn't get worse...

It gets worse.

Initial reports of the Ashley Madison hack suggested they did one thing right. If I'm reading this report from Ars Technica correctly, they managed to screw even that up by having a second password table with MD5-hashed passwords.

Why is that bad? cryptographic hash functions create unique "signatures" from electronic data. They come in two different varieties. "Fast" algorithms are used to verify the authenticity of gigabytes of data. They're used to check the integrity of almost everything sent over the internet. They're designed to be run millions of times a second with minimal memory.

Standard practice for storing passwords is to store a hash "signature" instead of the raw (plaintext) password. You log into a site, it runs the hash function, and compares the signature with the signature stored in its database.

While fast hash algorithms like MD5 are great for checking things like Windows 10 or streaming video. They're bad for storing passwords. The state of the art in breaking passwords involves making millions of guesses. With MD5 and a graphics card, a password cracker can try over a billion guesses a second.

"Slow" hash functions such as bcrypt or PBKDF2 are designed to take an arbitrary length of time. Instead of a billion guesses per second, a cracker is limited to a few hundred.

While Ashley Madison used bcrypt for their primary password table, they had a second password table with millions of passwords in MD5. As of yesterday, 11.7 million passwords have been hacked.

Not that a matters that much. Users chose really bad passwords. The top 10:

  • 123456
  • 12345
  • password
  • DEFAULT
  • 123456789
  • querty
  • 12345678
  • abc123
  • pussy
  • 1234567

The rest of the top 100 seems to combine numbers, sex, and wishful thinking. Sometimes in one password.

Wednesday, August 26, 2015

Windows 10 turns Parental Monitoring on by Default

"This weekend we upgraded my 14-year-old son's laptop from Windows 8 to Windows 10. Today I got a creepy-ass email from Microsoft titled 'Weekly activity report for [my kid]', including which websites he's visited, how many hours per day he's used it, and how many minutes he used each of his favorite apps."

-- Windows 10 automatically spies on your children and sends you a dossier of their activity - Boing Boing

Useful feature for parents, boo for making it a default settings change.

Wednesday, June 10, 2015

Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks @ Ars Technica

Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks @ Ars Technica

Developers planted several false flags in the malware to give the appearance its origins were in Eastern Europe or China. But as the Kaspersky researchers delved further into the 100 modules that encompass the platform, they discovered it was an updated version of Duqu, the malware discovered in late 2011 with code directly derived from Stuxnet. Evidence later suggested Duqu was used to spy on Iran's efforts to develop nuclear material and keep tabs on the country's trade relationships. Duqu's precise relation to Stuxnet remained a mystery when the group behind it went dark in 2012. Now, not only was it back with updated Stuxnet-derived malware that spied on Iran, it was also escalating its campaign with a brazen strike on Kaspersky.

Waking up in the wrong science fiction future.