Vulnerabilities / Threats
2/8/2012
11:13 AM
Connect Directly
RSS
E-Mail
50%
50%

Have Your Users' Passwords Already Been Hacked?

If employees use their same password at work and in their personal lives, another company's breach may weaken your security. Five steps to mitigate the risk.

Following the hack of the global intelligence firm Stratfor, hackers published the stolen password file containing the usernames and hashes for more than 860,000 accounts. An effort to use typical password breaking techniques on the file yielded quick results: About 1 in every 10 accounts had a trivial password.

While it's unknown how many account holders reused their passwords, many subscribers used e-mail addresses of their employer, suggesting the possibility that they reused their passwords as well. While real-world research is scarce, what little there is suggests that reuse is rampant. Following the breach of Sony's online sites last year, for example, an analysis connected a small subset of users to those whose passwords were leaked in another breach. Two-thirds reused their passwords.

For companies, password reuse weakens security and can cause a company to rely on the security of third-party firms whose security is questionable. While companies can attempt to cordon off their employees' work and personal lives, workers can inadvertently reconnect the two, said Sam Curry, chief technology officer for security giant RSA's identity and data protection business unit.

"The average person probably has one or two phones, and they probably have any number of consumer services they subscribe to and two or three machines they interact with," says Sam Curry, chief technology officer for RSA's identity and data protection business unit. "If the password is the same everywhere, then there are literally dozens or hundreds of places where their passwords might be cached or the hash of it might be cached."

While companies can set policy and educate their employees to use good passwords and not reuse the secret codes--especially between business and personal sites--information security specialists should seek other solutions, says Mark Joynes, director of product management for Entrust.

"Enterprises that are taking the matter of security seriously should not be relying on password mechanisms," says Joynes. "As a function of human nature, users will reuse passwords irrespective of the relative risk of the application."

Consider these five steps to mitigate the risk.

Read the rest of this article on Dark Reading.

It's no longer a matter of if you get hacked, but when. In this special retrospective of news coverage, Monitoring Tools And Logs Make All The Difference, Dark Reading takes a look at ways to measure your security posture and the challenges that lie ahead with the emerging threat landscape. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tonys3kur3
50%
50%
tonys3kur3,
User Rank: Apprentice
2/16/2012 | 6:53:14 PM
re: Have Your Users' Passwords Already Been Hacked?
Recent data breach news like Symantec, VeriSign, Nortel, and others all seem to be related to attacks that actually occurred far in the past and are just being discovered now. It's a little crazy.

I read an article recently (http://www.pcworld.com/article... that I think more organizations should read and follow. Don't implement security controls to check off boxes for a compliance audit. Implement the best possible security controls, and the compliance will happen by default.
Bprince
50%
50%
Bprince,
User Rank: Ninja
2/8/2012 | 11:54:08 PM
re: Have Your Users' Passwords Already Been Hacked?
In related news, Anonymous reportedly hacked the Syrian President's email. His password - "1,2,3,4,5."
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio