Risk
10/2/2012
00:36 AM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Leaked Account Notification May Be Worth The Warning

PwnedList provides companies and consumers with warnings of any account names that have been leaked to the public. Such services can help firms find out when an account could be in jeopardy, but coverage remains spotty

In March, a hacker broke into free-to-play gaming site Gamigo servers. The hacker took usernames, e-mail addresses, and passwords for an undisclosed number of users, posting a smattering of the data on the company's forums.

Three months later, someone posted the more than 8 million records on a password cracking forum, including accounts connected to employees with e-mail addresses from major companies such as IBM, Deutsche Bank, and ExxonMobil. Such leaks have become more common, leading a group of security experts to compile such public lists into a service, PwnedList. While the basic service -- checking to see whether an account linked to a single e-mail address -- is free, companies can benefit by checking to see whether their employees or their users have compromised accounts, says Steve Thomas, co-founder of the Austin, Texas-based PwnedList.

"We monitor for domains for companies that are worried about their internal security and their employees, but we have had quite a bit of push from people that we have been talking to -- corporations -- to enable them to monitor their end users," he says. "They can use us as their stolen credential blacklist."

The company has had no shortage of leaked account lists to collect. Founded in July 2011, the firm had gathered data from less than 400 leaks at the end of last year. Nine months later, the company has account lists from more than 1,000 leaks and is adding 150 new lists every month. Known sites for dumping account lists are checked every 10 minutes, while new ones are hunted down every hour.

While no leaks have been nearly as big as Gamigo -- even Sony's massive breach of up to 75 million records "only" resulted in 1 million leaked accounts -- hacktivism made 2011 a banner year for leaked account data, accounting for more stolen data than organized crime.

For companies, keeping track of the leaks and collating the data on their own is difficult, but they also might miss harvesting some of the data. The data on Gamigo's users, for example, has been taken down and is no longer available. Frequently, leaks posted to Pastebin get removed quickly as well.

"We get access to data leaks that the vast majority of hackers don't know about," Thomas says. "We can never say that we have 100 percent coverage. But in terms of a really reliable source, we are beating out the harvesting capabilities of quite a few security teams out there."

[ Three major online consumer services have acknowledged that their systems were breached and passwords leaked -- a litany of incidents that should remind companies to take another look at how they are managing and monitoring the access to their systems. See Keep Watch On Accounts For Stolen Passwords. ]

The service has gotten the jump on other breach-related services, such as AllClearID and Lifelock, which tend to offer services to consumers worried about their identities, but are more popular as a one-stop shop for companies that have already been breached.

In September, identity and password management service LastPass announced it would be using the PwnedList service to identify its users of potentially stolen accounts. In the future, all identity and access management services will likely start using such offerings, says Amber Gott, a spokeswoman for LastPass.

"A percentage of our users are active in the security space and might be able to scan these [known] forums for the lists, but the average user or IT manager is not going to want to do that," she says. "This is a way to take important aggregated information and alert the user almost immediately."

While the service can protect employees and customers from attackers who use published lists to hack, the coverage of the list is fairly sparse. Hacktivists tend to publish credentials they uncover in their attacks, but cybercriminals only sell the lists on underground markets, which won't be collected by PwnedList. In 2011, hacktivists stole 100 million of the estimated 174 million account records documented by Verizon Data Breach Investigations Report.

"It's not a problem that anyone can deal with with conventional means," Thomas says. "We're really going after the main problem of all these credentials that are leaked -- tens of millions each year. We are trying to help people understand if they are impacted."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web