Hackers crack more than 60% of breached LinkedIn passwords
Speed of hackers to crack passwords shows weakness of security scheme used by LinkedIn, researchers say
More than 60% of the unique hashed passwords that were accessed by hackers from a LinkedIn password database and posted online this week have already been cracked, according to security firm Sophos.
It's very likely the remaining passwords have also been cracked, said security researcher Chester Wisniewski late Wednesday.
In all, a total of 6.5 million hashed password believed to belong to LinkedIn members was posted on a Russian hacker forum earlier this week. The crooks posted the data in an effort to get help in cracking the passwords.
Sophos said it identified about 5.8 million hashed passwords as unique.
Based on an analysis of the 118MB password dump, Wisniewski said close to 3.5 million of the unique passwords had been cracked and made available in plain text by late last night. It's only a matter of time before the remaining passwords are similarly cracked using automated password guessing tools, he added.
The speed at which so many hashed passwords were cracked underscores the weakness of the passwords protection scheme used by LinkedIn, Wisniewski said.
The breached LinkedIn member passwords were all hashed, or masked, using a hashing protocol known as SHA-1.
Though SHA-1 offers a degree of protection against password cracking attempts, the protocol is by no means foolproof.
Therefore, many organizations theses day use a process known as salting -- where a random string of characters are appended to a password before it is hashed-- to make password cracking much harder. The process ensures that even if two passwords are identical, their hashes will be unique.
Salting is considered something of a best practice for protecting passwords, especially those used by employees of large companies.
That LinkedIn apparently chose to protect passwords using just SHA-1 is disappointing, Wisniewski said. "They chose a moderate security method. For an organization as large as LinkedIn, I would expect better," he said.
The worst policy for companies is to store passwords in clear text, experts say.
Storing them in hashed form with no salting is nearly as bad, considering the availability of SHA-1 hash cracking tools, Wisniewski said. Tables that contain pre-computed hashes for billions of passwords are easily available. Almost anyone can use these tables to decrypt almost any SHA-1 hash and recover it in plain text in in a matter of minutes.
In response to widespread reports about the breach, LinkedIn yesterday admitted that "some" of its passwords might have been compromised. So far, the company has not indicated how the breach occurred or how many passwords may have been compromised.
In a carefully worded blog post LinkedIn director Wednesday Vicente Silveira said that the company had disabled all the compromised passwords and was instructing affected members how to access their accounts to reset their passwords.
- Hackers steal user data from the European Central Bank website, demand money
- Arrests made after international cyber-ring targets StubHub
- SQL injection flaw opens door for Wall Street Journal database hack
- Goodwill Industries probes possible payment card breach
- Aloha point-of-sale terminal, sold on eBay, yields security surprises
- The biggest data breaches of 2014 (so far)
- Blue Shield discloses 18,000 doctors' Social Security numbers
- PF Chang's says breach was 'highly sophisticated criminal operation'
- Breaches exposed 1 in 7 US debit cards in 2013
- New malware program targets banking data
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different.... All Cybercrime and Hacking White Papers | Webcasts