6.5M LinkedIn Passwords Leaked Online

Time has come for password change on LinkedIn …. as millions of passwords are posted on a Russian hacker website.

Few details so far:

  • The data leaked is a file of SHA1 hashes
  • The data have been first posted on a Russian hacker website
  • There are 3,521,180 hashes that begin with 00000. Probably marked to cracked(reversed user’s password).
  • The file does not contain duplicates. LinkedIn claims a user base of 161m. This file contains 6.4m unique password hashes. That’s 25 users per hash. Given the large amount of password reuse and poor password choices it is not improbable that this is the complete password file.

 

Bitcoinica hacked close to $100k USD stolen

Bitcoinica has been shutdown until further notice, following a theft of 18,000 BTC.News of the hack was posted this morning by Bitcoinica’s founder, Zhoutong:

“Today, we have discovered a suspicious Bitcoin transaction that doesn’t seem to be initiated by any one of the company owners. Some of them are not online at the moment so this is not conclusive.

Suspicious transaction:

{
“account” : “”,
“address” : “182tGyiczhXSSCTciVujNRkkMw1zQxUVhp”,
“category” : “send”,
“amount” : -18547.66867623,
“fee” : 0.00000000,
“blockhash” : “00000000000003f6bfd3e2fcbf76091853b28be234b5473a67f89b9d5bee019c”,
“blockindex” : 1,
“txid” : “7a22917744aa9ed740faf3068a2f895424ed816ed1a04012b47df7a493f056e8″,
“time” : 1336738723
},

We have contacted Rackspace to suspend all our servers and lock down our accounts. All your trading and financial data is safe (as far as I know), apart from the Bitcoin loss. Thank you for your patience and understanding while we investigate this issue in detail.”

And in a follow-up post:

“Our data is kept inact. Any order placed before the shutdown will still be valid. However, no order execution will happen (no zhoutonging either).
If the market moves significantly, we will come up with a proposal to compensate disadvantaged customers once the investigation is complete.”

Bitcoinica was also the victim of a 43,000 BTC ($215,000 USD) heist back on March 1st.

It will be interesting to see how the market is affected by the inability of traders to take leveraged positions in either direction. Also, you should not surf to Bitcoinica.com, as the site has been redirected to a porn site.

Hack.lu 2012 8th edition

Call for Papers for hack.lu 2012 is now out! – You can register and submit your paper via the CFP website.

Hack.lu is an open convention /conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society. The aim of the convention…

 

The conference will take place in Luxembourg (that’s the 8th edition) the 23-25 October 2012 and everyone is welcome to submit a talk/paper to the conference on interesting security topics.

http://2012.hack.lu/cfp/

 

Compuer virus are 40 years old

Creeper was the very first computer virus, it used to gained access via the ARPANET and displayed the message “I’m the creeper, catch me if you can!” . The Creeper would start to print a file, but then stop, find another Tenex system, transfer to the other machine (along with its external state, files, etc.), and then start running on the new machine, displaying the message again etc …..

The program rarely if ever actually replicated itself; rather, it jumped from one system to another, attempting to remove itself from previous systems as it propagated forward.

 

Toshiba hacked,leaking 7,500 customers personal data

Toshiba Corp. has confirmed that its Toshiba American Information Systems Inc. server has been hacked in a press release.

Server had personal information for about 7,500 customers …681 customers’ email addresses and passwords may have been compromised or leaked during the process.

A Toshiba spokesperson noted that the company has not concluded when the hacking took place – partially why they could not comment on the matter sooner – but the U.S. unit first detected a problem on July 11 and then it was confirmed July 13 that it had, indeed, been hacked.

“On discovering the intrusion TAIS immediately took the server offline and initiated a comprehensive investigation,” said Toshiba in a statement. “Toshiba and its Group companies regard data security as a priority concern and will continue a thorough investigation of the incident. Toshiba will take all necessary precautions to avoid any recurrence of similar incidents and to ensure customer information remain secure.”

The company is still investigating the matter and customers have already been notified about the possibility that their personal data may have been affected, notes Thinq.

According to eSecurity Planet, the hacker, who identifies itself as V0iD, published the account information on two pastebin posts. The hacker claims that the leak contains 11 Toshiba administration officials’ email addresses and passwords using @tacp.com and a “top 3” list of an Air Force (@moody.af.mil), NASA (@nasa.gov) and state government official’s email login.

This is only 10 percent of the list and V0iD has promised more to come.


RSA SecurID officially compromised

RSA Security is admitting being compromised and is about to replace *virtually* (1) every SecurID tokens: 40 million device. This is the result of the hacking, successful hacking of the company which occur early this year(in march).

The EMC subsidiary issued a letter to customers acknowledging that SecurID failed to protect defense contractor Lockheed Martin, which last month reported a hack attempt, this attack were based on data stolen from the RSA hack. Defense contractors Northrop Grumman and L-3 Communications are both rumored to have faced similar attacks, with claims that Northrop suspended all remote access to its network last week.

For the few hackers, holding the data from RSA, SecurID was rendered equivalent to basic password authentication ….

(1) “for virtually every customer we have,” the company’s Chairman Art Coviello said in an interview

 

The Wall Street Journal article

France's Hadopi suspends service after leak

France’s official P2P monitoring firm hacked,Hadopi suspends service after leak

The French government has temporarily suspended its reliance on the company designated to monitor file-sharing networks for copyright scofflaws following reports that a hack on its servers may have leaked sensitive information.
Eric Walter, France’s secretary general of internet piracy, made the announcement over Twitter on Tuesday, saying that Hadopi, short for the High Authority for the dissemination of works and the protection of rights, was taking control of Trident Media Guard “following the leak of IP addresses.”
TMG monitors peer-to-peer networks under France’s three-strikes anti-piracy law. Under the program, illegal file-sharers receive three warnings and are then reported to a judge, who is authorized to mete out a variety of punishments, including disconnecting a person’s internet connection. UK lawmakers have mulled a similar monitoring system, although it currently doesn’t carry the threat of disconnection.
The TMG data leak was discovered by security researcher Olivier Laurelli, aka Bluetouff, and first reported on the French blog Reflets.info (Bing translation here).
It remains unclear just how serious the leak from TMG was. As a government-sanctioned collector of IP addresses trading music, pictures and other media over file-sharing networks, it could possess a wealth of sensitive information about French citizens. But according to news reports published on Tuesday (Google translation here) TMG has said “no personal data was disclosed” and that the hacked machine was a test server.”
Over the weekend, TorrentFreak reported that the TMG server leaked scripts, p2p clients to generate fake peers and internal IP addresses used in its datacenter. An update on Tuesday said that “as the contents of the leak were examined in more detail, it became evident that TMG had not only leaked out its own data, but that belonging to the subjects of their monitoring.”
The so-far unproven allegations that TMG leaked sensitive information are vaguely reminiscent of the hack on anti-piracy law firm ACS:Law of the UK, which resulted in fines being levied against the firm’s principal for leaking “sensitive personal details relating to thousands.”

Sony leaked 12,700 credit card account numbers

Following up on this morning’s news that Sony Online Entertainment servers were offline across the board, SOE announced that it has lost 12,700 customer credit card numbers as the result of the PSN attack, and roughly 24.6 million accounts may have been breached.

SOE has provided the following statement, in which it confirms that its user data was stolen as part of the original intrusion — not a second attack. “While the two systems are distinct and operated separately, given that they are both under the SONY umbrella, there is some degree of architecture that overlaps. The intrusions were similar in nature. This is NOT a second attack; new information has been discovered as part of our ongoing investigation of the external intrusion in April.”

Sony PlayStation Network data leaked and for sales

Whatever is going on over at the PSN (Sony PlayStation Network) seems pretty serious.As you may know, the PSN has been down for nearly a week.

 

Hacked and putted down

 

The Playstation Network has been down for a week due to an intrusion to their system. This is by far the worst downtime that ps3 users have ever experienced.

Hacked and users’ information being compromised
Since an estimated 77 million people have signed up for the service, the scope of the data leak is huge. This has lead to tons of rumors and speculation. And Sony confirmed Tuesday that hackers have managed to obtain personal information including name, address, password, login,email,telephone and possibly including credit cards(while those data were calimed encrypted by Sony).

Hacked for overall potential cost as being over $24 billion
Forbes cites data-security research firm The Ponemon Institute as estimating the “cost of a data breach involving a malicious or criminal act” was, on average, $318 per compromised account. Given the most recent PSN population estimate, that formula puts the potential cost as being over $24 billion.

Hacked and for sales: 2.2 million customers data with their creditcard

People from PSX-Scene forums are reporting that over 2.2 million customers’ names, addresses, phone numbers and credit card information is up for grabs to the highest bidder, including the crucial three digit CVV2 numbers. According to the forum post, rumors are spreading through underground trading forums and on Twitter that the database is for sale, “a large section of the PSN database containing complete personal details along…are being offer up for sale.”

“Supposedly the hackers selling the DB says it has: fname, lnam, address, zip, country, phone, email, password, dob, ccnum, CVV2, exp date”

 

Watchdog blackmailed by hacker: names home addresses and passwords leaked

South Korea’s financial watchdog launched an investigation into the leak of 420,000 customer’s personal information from South Korea’s Hyundai Capital, the consumer finance unit of Hyundai Motor Group.

The company, whose president returned to South Korea from an overseas trip earlier in the day, also began its own probe into the leak, which prompted the firm Friday to ask its 2 million customers to change their passwords to prevent further leaks.

The Seoul-based company, which specializes in personal loans, home mortgages and auto financing, said this week it was blackmailed by an unnamed hacker demanding money in return for not releasing the data.

The company, which stressed that key data required for financial transactions was not leaked, said names and home addresses of as many as 420,000 of its some 2 million customers were stolen. It remains unconfirmed whether their mobile phone numbers or e-mail addresses were disclosed as well.

“Investigators will be dispatched to look into the cause of the breach, the possibility of additional leaks and the contents of stolen information,” an official said.

Police said Sunday that a hacker likely used servers in the Philippines and Brazil.

 

More information from Reuters