Vulnerabilities / Threats
11/14/2013
09:46 AM
50%
50%

MacRumors Hacker Promises Stolen Passwords Are Safe

Hacker grabbed 860,000 passwords for fun, but promises not to leak or use them to harm people.

The hacker behind Monday's breach of an Apple-related rumor and news website has promised to not leak any of the 860,000 passwords he stole.

But the hacker -- known as "lol" -- said that any users who'd reused the same password on other sites had only themselves to blame. "We're not terrorists," he said. "Stop worrying, and stop blaming it on Macrumors when it was your own fault for reusing passwords in the first place."

The MacRumors website disclosed the breach Tuesday, saying that an attacker accessed a moderator account for the vBulletin software -- sold by Internet Brands -- that runs its online forums, then managed to escalate their access privileges, and dump a database containing usernames, email addresses and passwords, which were hashed and salted. The site recommended that all users immediately change their password for MacRumors, as well as any other site for which they'd used the same password.

"We sincerely apologize for the intrusion, and are still investigating the attack with the help of a third-party security researcher," said "MacRumors god" Arn Kim. "We believe that at least some user information was obtained during the attack," including passwords, he added. "They are vBulletin's standard md5 hashed and salted. Which is not that strong, so assume that your password can be determined with time."

In a series of MacRumors forum posts, Lol confirmed Wednesday that he'd dumped the forum database and obtained usernames, email addresses, and salted and hashed passwords for 860,106 users. As proof that he was behind the hack, lol also published the first 16 bits of Kim's old password hash, as well as the salt used for the password. But lol promised not to leak or even crack the passwords, or use the information to hack into people's Gmail, Apple, Yahoo or other accounts, "unless we target you specifically for some unrelated reason.

"Consider the 'malicious' attack friendly," said lol. "The situation could have been catastrophically worse if some fame-driven idiot was the culprit and the database were to be leaked to the public."

Why hack the site? "To test myself," he said in an online post. "I never defaced the site, I never bragged about it anywhere, I just got in and got out."

In response to criticism that he should have alerted the website administrator to the flaw, rather than simply stealing the passwords, lol said that he sometimes contributes in a less black hat fashion to the greater good. "Outside of this hobby, *cough*, I do partake in whitehat activities and try to contribute to some open source projects etc." he said.

Interestingly, lol also lauded MacRumors for quickly warning users about the breach, and detailing precisely what happened. "Many other huge companies and corporations, probably some that you're all registered to, have taken days, weeks, or even never, to report a compromise. You should be thankful," he said.

Tripwire security researcher Ken Westin echoed that assessment. "The straightforward approach that MacRumors has taken with regards to the breach is to be commended," he said in a blog post. "Instead of attempting to cover up the breach, or make assumptions regarding the level of security the hashed passwords provided, they were quite up front with their community."

The MacRumors breach is a reminder to never reuse passwords across different websites. Facebook, amongst other sites, recently revealed that it has been watching for users who reuse passwords -- by mining plaintext data dumps from hackers or third-party researchers with access to stolen data -- and forcing them to verify their identity and change their password when next they log in.

"To help manage distinct passwords for every website, you can use a password manager such as Lastpass, 1Password or iCloud keychain in Mavericks," said Kim at MacRumors.

This isn't the first hack to involve vBulletin software. Notably, the forum software was compromised earlier this year in a hack of Apple's developer portal. In that case, a hacker named "Sput" who claimed credit likewise promised not to crack or leak the stolen passwords. "You don't have to worry about a DB leak. That isn't how I like to do things," he said in an online post.

In the case of MacRumors, however, lol said that the vBulletin software wasn't to blame for the breach, saying instead that "the fault lied within a single moderator." That suggests that a MacRumors moderator chose an insecure password, which lol either guessed, or matched using a dictionary attack, which attempts to guess passwords by using an exhaustive list of likely matches.

On the other hand, MacRumors breach disclosure said the hack attack appeared to be similar to a July hack of the Ubuntu forums. According to Ubuntu's attack postmortem, the hacker gained access to a moderator's account, then tricked another moderator with higher privileges into looking at a post on the site that likely contained a cross-site scripting attack that grabbed the other administrator's vBulletin cookie. Once the attacker had the cookie, then he had full access to the entire site. The Ubuntu forum administrators said they'd made a number of changes to the default vBulletin site to help prevent repeat attacks.

Another defense against lol's hack would have been to secure all MacRumors moderator accounts using two-factor authentication. A vBulletin spokesman didn't immediately respond to an emailed request for comment about whether two-factor authentication can be used with the forum software, but multiple posts to vBulletin's forums suggest this isn't currently possible.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
majenkins
50%
50%
majenkins,
User Rank: Apprentice
11/14/2013 | 7:48:15 PM
re: MacRumors Hacker Promises Stolen Passwords Are Safe
I am with you ThomasClaburn. Anyone that trusts this person not to disclose or use this information is being very naive, and I just happen to have a nice bridge I will sell them real cheap.
Kelly22
50%
50%
Kelly22,
User Rank: Apprentice
11/14/2013 | 7:44:56 PM
re: MacRumors Hacker Promises Stolen Passwords Are Safe
I'm with you on that. After news of this "friendly" attack, I'll definitely be making a few password changes. I guess it could have been worse, but I'd still feel uneasy with my info under lol's control.
jameane
50%
50%
jameane,
User Rank: Apprentice
11/14/2013 | 7:38:37 PM
re: MacRumors Hacker Promises Stolen Passwords Are Safe
I guess it is time to update my Macrumors password. I joined so long ago, I don't have that username anywhere else!
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Moderator
11/14/2013 | 7:24:57 PM
re: MacRumors Hacker Promises Stolen Passwords Are Safe
Somehow that promise not to leak the passwords isn't very comforting.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?