Ramblings of an old Doc

 

 
At the end of December 2010, somebody broke into Gawker.com and stole 1.3 million account names, e-mail addresses, and passwords — and then posted all the booty on the Internet.

 Think you're immune because you've never used Gawker? Not necessarily so. If you've spent any time at all on Lifehacker.com or Gizmodo.com — and I bet you have — your passwords may be running around with a giant "kick me" sign on their backs.

A group calling itself Gnosis broke into the Gawker.com servers and stole the site's source code, and much more.

If that were the whole story, you probably wouldn't need to give it a second thought. But Gawker Media Network, owner of Gawker.com, also runs two widely used tech sites: Lifehacker.com and Gizmodo.com. The Gawker crackers picked up user info about everyone who has an account at any Gawker Media site.

In addition to user names and e-mail addresses (used to confirm the registration), the stolen data includes Data Encryption Standard (DES) encrypted passwords.

Weak password security can be costly

If there's the remotest chance you've posted a comment on Lifehacker.com or Gizmodo.com, go immediately to Duo Security's "Did I get Gawkered" site and enter your e-mail address.  If your name's on the list, change your passwords! 
 

Enter your e-mail address into Duo Security's "Did I get Gawkered" site and find out if your address and password are compromised.

 
Now would be a good time to review the strength of all your passwords.

We’ve already discussed that subject, right?

Source: http://tinyurl.com/4j2pv5q

 


Comments
on Jan 21, 2011

Nice post. luckily I don't sign up for every site I visit often. I only do so when I am interested in receiving information from them and that is not often. I try to keep my passwords hard to figure out but also easy for me to remember so I use combinations I know I can remember.

I tried using those password creation programs like lastpass that create very difficult to figure out and remember passwords and it became a problem when I didn't have access to lastpass and could not access my emails or sites because the passwords were just waaaay to complicated to remember.

My password system is fine for me. I simply steer clear of the usual passwords that some idiots out there use line 123456 or password.

on Jan 21, 2011

most sites store your password as a hash - so that it cannot be reversed - and why they cannot give it to you should you forget it.  I am surprised that gawker did not store them that way.  That is lazy and stupid.

on Jan 21, 2011

The damage would only have been "smaller" were that the case, hashes would not protect you. Obviously DES is outdated, but if people have such shitty passwords as 12345 then I wouldn't even need to run bruteforce checks against the hash if I had the source as well (which they did).

Edit: just to be clear. If you store passwords as hashes then there is no need to reverse it anyway, all you need to do is come up with something that produces the same hash, as the source cannot tell the difference.

on Jan 21, 2011

Person enters email address.

Site response - "Nope, you didn't get gawkered"

Person breathes sigh of relief.  "Well, I didn't get hit so I don't have to change my password, thank gosh, because I like using the same password on every site I got to since it's easier for me to remember and I also don't have to have, like, a billion sticky notes hanging around my computer with all the different passwords on them."

Meanwhile, behind the facade of this innocent looking bookstore, "hey, another dummy put their address in, lets see what we've got..."

on Jan 21, 2011

DES is easily cracked.

on Jan 21, 2011

No problem here as I've never visited either one let alone give any info out. Good heads up though to those who have. Gawker imo is a weird name.

on Jan 21, 2011

Crap, I've been gawkered! Thanks Doc, now to go change my password!

on Jan 21, 2011

You're welcome, karmat!

This post would have been worth it anyway....but knowing it helped you makes it extremely gratifying.

on Jan 21, 2011

Heavenfall
The damage would only have been "smaller" were that the case, hashes would not protect you. Obviously DES is outdated, but if people have such shitty passwords as 12345 then I wouldn't even need to run bruteforce checks against the hash if I had the source as well (which they did).

DES is encryption, not a hash.  MD5 is the weaker of the 2 most popular ones, SHA-1 being the better of the 2.  Encryptions are susceptible to decoding, HASHes are not since there is no way to get back to the original string.

on Jan 21, 2011

Edit: just to be clear. If you store passwords as hashes then there is no need to reverse it anyway, all you need to do is come up with something that produces the same hash, as the source cannot tell the difference.

Which is the same as brute force - which everything is susceptible to - given enough time.