Hope this isn’t a repeated submission. Funny how they’re trying to deflect blame after they tried to change the EULA post breach.

  • capital@lemmy.world
    link
    fedilink
    English
    arrow-up
    71
    arrow-down
    14
    ·
    11 months ago

    The data breach started with hackers accessing only around 14,000 user accounts. The hackers broke into this first set of victims by brute-forcing accounts with passwords that were known to be associated with the targeted customers

    Turns out, it is.

    What should a website do when you present it with correct credentials?

    • Thann@lemmy.ml
      link
      fedilink
      English
      arrow-up
      40
      arrow-down
      5
      ·
      11 months ago
      1. IP based rate limiting
      2. IP locked login tokens
      3. Email 2FA on login with new IP
      • Umbraveil@lemmy.world
        link
        fedilink
        English
        arrow-up
        15
        arrow-down
        1
        ·
        edit-2
        11 months ago

        IP-based mitigation strategies are pretty useless for ATO and credential stuffing attacks.

        These days, bot nets for hire are easy to come by and you can rotate your IP on every request limiting you controls to simply block known bad IPs and data server IPs.

      • CommanderCloon@lemmy.ml
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        1
        ·
        11 months ago
        1. The attackers used IPs situated in their victims regions to log in, across months, bypassing rate limiting or region locks / warnings

        2. I don’t know if they did but it would seem trivial to just use the tokens in-situ once they managed to login instead of saving and reusing said tokens. Also those tokens are the end user client tokens, IP locking them would make people with dynamic IPs or logged in 5G throw a fuss after the 5th login in half an hour of subway

        3. Yeah 2FA should be a default everywhere but people just throw a fuss at the slightest inconvenience. We very much need 2FA to become the norm so it’s not seen as such

        • unphazed@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          11 months ago

          2 factor beats the hell outta that “match the horse with the direction of the the arrow 10x” bs

    • KairuByte@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      30
      arrow-down
      10
      ·
      11 months ago

      So… we are ignoring the 6+ million users who had nothing to do with the 14 thousand users, because convenience?

      Not to mention, the use of “brute force” there insinuates that the site should have had password requirements in place.

      • capital@lemmy.world
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        6
        ·
        11 months ago

        Please excuse the rehash from another of my comments:

        How do you people want options on websites to work?

        These people opted into information sharing.

        When I set a setting on a website, device, or service I damn sure want the setting to stick. What else would you want? Force users to set the setting every time they log in? Every day?

        • KairuByte@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          2
          ·
          11 months ago

          I admit, I’ve not used the site so I don’t know the answers to the questions I would need, in order to properly respond:

          • Were these opt-in or opt-out?
          • Were the risks made clear?
          • Were the options fine tuned enough that you could share some info, but not all?

          From the sounds of it, I doubt enough was done by the company to ensure people were aware of the risks. Because so many people were shocked by what was able to be skimmed.

          • capital@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            3
            ·
            11 months ago

            I’m convinced that everyone pissed at the company for users reusing passwords has a reading comprehension problem because I definitely already answered your first question in the comment you responded to.

            I haven’t used the service either - I don’t want more of my data out there. So I can’t answer the other questions.

            Users were probably not thinking about the implications of a breach after sharing but it stands to reason that if you share data with an account, and that account gets compromised, your data is compromised.

            We’ve all been through several of those from actual hacks at other companies (looking at you, T-Mobile). I refuse to believe people aren’t aware of this general issue by now.

      • platypus_plumba@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        2
        ·
        edit-2
        11 months ago

        It was credential stuffing. Basically these people were hacked in other services. Those services probably told them “Hey, you need to change your password because our database was hacked” and then they were like “meh, I’ll keep using this password and won’t update my other services that this password and personally identifiable information about myself and my relatives”.

        Both are at fault, but the users reusing passwords with no MFA are dumb as fuck.

    • jimbo@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      11 months ago

      by brute-forcing accounts with passwords that were known

      That’s not what “brute force” means.