SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Gawker Hacked - Database Exposed
Hackers have gotten a hold of the database containing usernames and passwords of roughly 1.4 million users
who have posted a comment to the Gawker website or any of its popular affiliates, including lifehacker.com,
gizmodo.com, jalopnik.com, jezebel.com, kotaku.com, deadspin.com and others.

They are not keeping this database to themselves either. They‟ve uploaded the entire thing to the public torrent
tracker thepiratebay.org, including their rough analysis of the database, plaintext credentials for a number of
Gawker employees, 200,000 decrypted passwords they‟ve cracked, as well as the entire 1.4 million encrypted
usernames, email addresses, and encrypted passwords.




Technical details on the hack are fairly slim at the moment, but the hacking group Gnosis has claimed
responsibility for it. This little tidbit was included in the upload of the database to thepiratebay.org:

“F@#$ you gawker, hows this for “script kids”?
Your empire has been compromised, Your servers, Your database‟s, Online accounts and source code have all
be ripped to shreds!
You wanted attention, well guess what, You‟ve got it now!”

It appears that Gnosis was able to guess the password of Gawker founder Nick Denton for his account on the
Campfire team-collaboration portal that Gawker uses for internal communications and real-time chat amongst
staff. Once Gnosis had access to this they were able to obtain a wealth of information from the reported 4
gigabytes of chat logs.

It seems that the password for the MySQL database was also disclosed somewhere in these logs. With the SQL
credentials in hand, it was a trivial matter for Gnosis to dump large amounts of information, including
usernames, email addresses, and encrypted passwords. Unfortunately the encryption used to protect the
passwords was the ancient and deprecated Data Encryption Standard (DES) which uses a measly 56 bit
encryption key.



                       WEB                            PHONE                          EMAIL

               WWW.REDSPIN.COM                    800-721-9177                INFO@REDSPIN.COM
Due to this poor encryption scheme, any password over 8 characters is truncated to 8 before being stored in the
database. Users with a password greater than 8 characters will not have the entire thing compromised, but
access to their account will still be possible with the first 8 characters if cracked. Gnosis has cracked roughly
200,000 of the 1.4 million passwords contained in the database they dumped. All of the hashes are available for
cracking by anyone who‟s interested and has some spare CPU power.

A rough analysis of the passwords cracked is pretty horrifying. Some gems:

       2000 passwords were „password‟
       150,000 passwords consisting of all lowercase letters
       3000 passwords were „123456‟
       Nick Denton had a password consisting of all numbers

If you‟ve ever made a comment on any of the Gawker sites then your information has likely been compromised
as a result of this breach. Also, due to clowns using the same password on multiple sites there are reports of a
number of twitter accounts and other social media sites having those accounts compromised as well.

Don‟t use the same password for everything. This can‟t be stressed enough. Use a different password, or a
variation of the same password.

Slate has rigged up a little widget on their site that claims to check email addresses against the compromised
database to see if you‟re a victim.

Find it here http://www.slate.com/id/2277768/

Written by Redspin Engineer, Mark Marshall, aka fulg0re




                      WEB                            PHONE                         EMAIL

               WWW.REDSPIN.COM                   800-721-9177                INFO@REDSPIN.COM

Contenu connexe

Plus de Redspin, Inc.

Plus de Redspin, Inc. (18)

Redspin Webinar - Prepare for a HIPAA Security Risk Analysis
Redspin Webinar - Prepare for a HIPAA Security Risk AnalysisRedspin Webinar - Prepare for a HIPAA Security Risk Analysis
Redspin Webinar - Prepare for a HIPAA Security Risk Analysis
 
Redspin Webinar Business Associate Risk
Redspin Webinar Business Associate RiskRedspin Webinar Business Associate Risk
Redspin Webinar Business Associate Risk
 
Redspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP Template
 
Mobile Device Security Policy
Mobile Device Security PolicyMobile Device Security Policy
Mobile Device Security Policy
 
Financial institution security top it security risk
Financial institution security top it security riskFinancial institution security top it security risk
Financial institution security top it security risk
 
Managing Windows User Accounts via the Commandline
Managing Windows User Accounts via the CommandlineManaging Windows User Accounts via the Commandline
Managing Windows User Accounts via the Commandline
 
Redspin February 17 2011 Webinar - Meaningful Use
Redspin February 17 2011 Webinar - Meaningful UseRedspin February 17 2011 Webinar - Meaningful Use
Redspin February 17 2011 Webinar - Meaningful Use
 
Redspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach Report
 
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT SecurityRedspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
 
Email hacking husband faces felony
Email hacking husband faces felonyEmail hacking husband faces felony
Email hacking husband faces felony
 
Meaningful use, risk analysis and protecting electronic health information
Meaningful use, risk analysis and protecting electronic health informationMeaningful use, risk analysis and protecting electronic health information
Meaningful use, risk analysis and protecting electronic health information
 
Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011
 
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David ShawBeginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
 
Ensuring Security and Privacy in the HIE Market - Redspin Information Security
Ensuring Security and Privacy in the HIE Market - Redspin Information SecurityEnsuring Security and Privacy in the HIE Market - Redspin Information Security
Ensuring Security and Privacy in the HIE Market - Redspin Information Security
 
Mapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information SecurityMapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information Security
 
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Gawker Hacked – Database Exposed

  • 1. Gawker Hacked - Database Exposed Hackers have gotten a hold of the database containing usernames and passwords of roughly 1.4 million users who have posted a comment to the Gawker website or any of its popular affiliates, including lifehacker.com, gizmodo.com, jalopnik.com, jezebel.com, kotaku.com, deadspin.com and others. They are not keeping this database to themselves either. They‟ve uploaded the entire thing to the public torrent tracker thepiratebay.org, including their rough analysis of the database, plaintext credentials for a number of Gawker employees, 200,000 decrypted passwords they‟ve cracked, as well as the entire 1.4 million encrypted usernames, email addresses, and encrypted passwords. Technical details on the hack are fairly slim at the moment, but the hacking group Gnosis has claimed responsibility for it. This little tidbit was included in the upload of the database to thepiratebay.org: “F@#$ you gawker, hows this for “script kids”? Your empire has been compromised, Your servers, Your database‟s, Online accounts and source code have all be ripped to shreds! You wanted attention, well guess what, You‟ve got it now!” It appears that Gnosis was able to guess the password of Gawker founder Nick Denton for his account on the Campfire team-collaboration portal that Gawker uses for internal communications and real-time chat amongst staff. Once Gnosis had access to this they were able to obtain a wealth of information from the reported 4 gigabytes of chat logs. It seems that the password for the MySQL database was also disclosed somewhere in these logs. With the SQL credentials in hand, it was a trivial matter for Gnosis to dump large amounts of information, including usernames, email addresses, and encrypted passwords. Unfortunately the encryption used to protect the passwords was the ancient and deprecated Data Encryption Standard (DES) which uses a measly 56 bit encryption key. WEB PHONE EMAIL WWW.REDSPIN.COM 800-721-9177 INFO@REDSPIN.COM
  • 2. Due to this poor encryption scheme, any password over 8 characters is truncated to 8 before being stored in the database. Users with a password greater than 8 characters will not have the entire thing compromised, but access to their account will still be possible with the first 8 characters if cracked. Gnosis has cracked roughly 200,000 of the 1.4 million passwords contained in the database they dumped. All of the hashes are available for cracking by anyone who‟s interested and has some spare CPU power. A rough analysis of the passwords cracked is pretty horrifying. Some gems: 2000 passwords were „password‟ 150,000 passwords consisting of all lowercase letters 3000 passwords were „123456‟ Nick Denton had a password consisting of all numbers If you‟ve ever made a comment on any of the Gawker sites then your information has likely been compromised as a result of this breach. Also, due to clowns using the same password on multiple sites there are reports of a number of twitter accounts and other social media sites having those accounts compromised as well. Don‟t use the same password for everything. This can‟t be stressed enough. Use a different password, or a variation of the same password. Slate has rigged up a little widget on their site that claims to check email addresses against the compromised database to see if you‟re a victim. Find it here http://www.slate.com/id/2277768/ Written by Redspin Engineer, Mark Marshall, aka fulg0re WEB PHONE EMAIL WWW.REDSPIN.COM 800-721-9177 INFO@REDSPIN.COM