Archive by date | writer | category Send us a suggestion | Subscribe by RSS | Email In excess of thirty,000 people are element from the Sophos community on Facebook. Why not join us on Facebook to find out with regards to the most current world wide web and Facebook safety threats. X Hi fellow Twitter consumer! Comply with our crew of safety experts on Twitter for that most recent news about net protection threats. X Don't forget you may subscribe for the SophosLabs YouTube channel to search for all our latest movies. X Hello there! If you are new here, you may desire to subscribe to the RSS feed for updates. X Filed Underneath: Data reduction, Privacy Be aware: I've developed some edits for accuracy based mostly upon input from my colleagues and commenters.
Earliest the lousy new. On Monday, Mozilla, the developer of well-liked open source programs like Firefox and Thunderbird,
Genuine Windows 7, announced that a database that contains usernames and password hashes belonging to customers of addons.mozilla.org had been posted publicly by accident. If you happen to registered for an account on addons.mozilla.org so you are among the 44,
Office Standard,000 users who may are already impacted by this accidental disclosure, you already should really have received an e-mail notification through the Mozilla security crew.
Is this only one more tale of info leakage inside of a sea of misplaced usernames and passwords? Not precisely. Mozilla stored passwords set earlier than April 9th,
Office 2007 Keygen, 2009 as MD5 hashes. While MD5 can be used to securely retail outlet passwords, it can be unclear how MD5 was used the Mozilla infrastracture. The good thing is, Mozilla didn't retail store passwords in plain text.
The good news? Mozilla audited their logs and determined that the only person exterior of Mozilla who accessed the content material was the man or woman who disclosed the accidental publication to them as a result of their web bounty program. Mozilla has deleted the passwords of all 44,000 accounts which were stored in MD5 format from your addons web site irrespective of irrespective of whether they were exposed or not.
Freshly crafted passwords won't be as vulnerable to a comparable disclosure. Considering that April nine, 2009, Mozilla has employed SHA-512 with per-user salts to shop password hashes. This hashing algorithm supplies a substantial development in security for addons.mozilla.org account holders.
If you have been among the unlucky recipients of among these emails, ensure you were not applying precisely the same password at Mozilla when you are at other online sites. When Mozilla is fairly assured nobody other than the man or woman who noted the incident had entry for the file,
Microsoft Office 2007, if they're incorrect or even the discloser is absolutely not trustworthy, your other accounts will probably be at possibility. Do not forget, exceptional passwords really are a requirement, not a luxurious.
I commend Mozilla for their response to this incident,
Windows 7 32 Bit, nevertheless it does leave a couple of situations we have to consider. How did they accidentally publish files made up of usernames and password hashes? I asked the security staff and was referred to the blog page submit explaining their response.
Mozilla created the proper determination in 2009 to begin working with a more secure product (SHA-512 with per-user salts) shifting ahead, but in hindsight could possibly have prompted all of their users to migrate for the even more safe hash just before this incident.
This is certainly remarkable, and perhaps even very important, nonetheless it nevertheless doesn't excuse or explain how the account particulars have been compromised in the primary site. Account databases, even these that contains strongly salted and hashed passwords, aren't supposed to be earth readable.
Oh, and if you do acquire an e mail warning you that your password will probably are compromised, no matter whether from Mozilla or everyone else, you should not click on any backlinks in the electronic mail to go and update your password. That is a scammer's trick. Normally remember to create your own strategy to the applicable password-change page.
Resourceful Commons picture of Jacob Appelbaum's (<-- It's safe to bypass this warning, promise!) t-shirt from 25C3 courtesy of Security4All's Flickr photostream.