Data Breach at Website with 45 Million Users Discovered During Academic Research

Haythem Elmir
0 1
Read Time2 Minute, 44 Second

A team of three researchers from the University of California, San Diego (UCSD) has created a tool that can detect when user-registration-based websites suffer a data breach.

The tool, named Tripwire, works on a simple concept. Researchers say that Tripwire registers one or more accounts on websites by using a unique email address that they do not use for anything else.

Each email account and the website profile used the same password. Tripwire would check at regular intervals if someone used this password to access the email account, which would indicate the website suffered a breach and an attacker used the stolen account data to log into the associated email account.

Tripwire finds 19 data breaches during test run

In a live test, researchers said they registered accounts at over 2,300 sites. At the end of the study’s period, scientists said that attackers accessed email accounts for 19 of these sites, including one with a userbase of over 45 million.

UCSD researchers reached out to each website, but to their astonishment, none notified users of the breach.

« I was heartened that the big sites we interacted with took us seriously, » said Alex C. Snoeren, professor of computer science at the Jacobs School of Engineering at the University of California San Diego, and one of Tripwire’s four authors together with Joe DeBlasio, Stefan Savage, and Geoffrey M. Voelker.

« I was somewhat surprised no one acted on our results, » Snoeren added, saying his team won’t disclose the websites’ names. « The reality is that these companies didn’t volunteer to be part of this study. By doing this, we’ve opened them up to huge financial and legal exposure. So we decided to put the onus on them to disclose. »

Tripwire can expose sites storing passwords in cleartext

But the research didn’t end here. The simple concept behind Tripwire also exposes when websites store passwords in plaintext, researchers said.

For example, researchers say someone could use Tripwire to record multiple honeytrap accounts on the same websites, some with a simple password, and others with very complex and lengthy passphrases.

If an attacker accesses both, this means the website stores password information in plaintext, or another easy-to-break password hashing system like MD5.

If only accounts with the simple passwords are accessed, this means the website stores passwords in a secure manner, and an attacker might have used a basic brute-force dictionary attack to guess some user passwords.

Tripwire open-sourced on GitHub

In addition, researchers said they also carried out extra tests to determine if the breach took place at the actual website or the email provider that hosted the email address.

They said they created more than 100,000 email accounts to serve as control accounts. If an attacker accessed only the email addresses associated with online profiles, but not any of the other 100,000 test accounts, then this meant the breach took place at the third-party website, and not the email provider.

UCSC researchers published the source code for the Tripwire tool on GitHub, and they hope that companies would deploy it internally as an additional breach detection system.
To read the original article:

https://www.bleepingcomputer.com/news/security/data-breach-at-website-with-45-million-users-discovered-during-academic-research/

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Laisser un commentaire

Next Post

Hackers Target Security Firm Fox-IT

Fox-IT, the Netherlands-based cybersecurity firm owned by NCC Group, revealed on Thursday that it had been the victim of a man-in-the-middle (MitM) attack made possible by DNS records getting changed at its third-party domain registrar. The incident took place back in September and Fox-IT decided to disclose it now after […]