Hackers crack more than 60% of breached LinkedIn passwords
Speed of hackers to crack passwords shows weakness of security scheme used by LinkedIn, researchers say
More than 60% of the unique hashed passwords that were accessed by hackers from a LinkedIn password database and posted online this week have already been cracked, according to security firm Sophos.
It's very likely the remaining passwords have also been cracked, said security researcher Chester Wisniewski late Wednesday.
In all, a total of 6.5 million hashed password believed to belong to LinkedIn members was posted on a Russian hacker forum earlier this week. The crooks posted the data in an effort to get help in cracking the passwords.
Sophos said it identified about 5.8 million hashed passwords as unique.
Based on an analysis of the 118MB password dump, Wisniewski said close to 3.5 million of the unique passwords had been cracked and made available in plain text by late last night. It's only a matter of time before the remaining passwords are similarly cracked using automated password guessing tools, he added.
The speed at which so many hashed passwords were cracked underscores the weakness of the passwords protection scheme used by LinkedIn, Wisniewski said.
The breached LinkedIn member passwords were all hashed, or masked, using a hashing protocol known as SHA-1.
Though SHA-1 offers a degree of protection against password cracking attempts, the protocol is by no means foolproof.
Therefore, many organizations theses day use a process known as salting -- where a random string of characters are appended to a password before it is hashed-- to make password cracking much harder. The process ensures that even if two passwords are identical, their hashes will be unique.
Salting is considered something of a best practice for protecting passwords, especially those used by employees of large companies.
That LinkedIn apparently chose to protect passwords using just SHA-1 is disappointing, Wisniewski said. "They chose a moderate security method. For an organization as large as LinkedIn, I would expect better," he said.
The worst policy for companies is to store passwords in clear text, experts say.
Storing them in hashed form with no salting is nearly as bad, considering the availability of SHA-1 hash cracking tools, Wisniewski said. Tables that contain pre-computed hashes for billions of passwords are easily available. Almost anyone can use these tables to decrypt almost any SHA-1 hash and recover it in plain text in in a matter of minutes.
In response to widespread reports about the breach, LinkedIn yesterday admitted that "some" of its passwords might have been compromised. So far, the company has not indicated how the breach occurred or how many passwords may have been compromised.
In a carefully worded blog post LinkedIn director Wednesday Vicente Silveira said that the company had disabled all the compromised passwords and was instructing affected members how to access their accounts to reset their passwords.
- US agencies to release cyberthreat info faster to healthcare industry
- UPS now the third company in a week to disclose data breach
- Healthcare organizations still too lax on security
- Why would Chinese hackers want US hospital patient data?
- About 4.5M face risk of ID theft after hospital network hacked
- Supervalu breach shows why move to smartcards is long overdue
- Grocery stores in multiple states hit by data breach
- Update: Payment cards with chips aren't perfect, so encrypt everything, experts say
- U.S. agencies halt background checks by contractor after cyberattack
- Five unanswered questions about massive Russian hacker database
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts