Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Neustar, Inc.
Protect your website & network
using real-time information & analysis

www.neustar.biz
Network Security
Register for a certification exam.
Average Rating:
Rate this article:  
Database Hack Puts Social Media, Webmail Users at Risk
Database Hack Puts Social Media, Webmail Users at Risk

By Jennifer LeClaire
December 5, 2013 10:31AM

    Bookmark and Share
It appears that Trustwave's SpiderLabs infiltrated a control server for the massive Pony botnet that was dumping credentials that it had harvested from compromised computers around the world. TrustWave’s SpiderLabs said that the Pony botnet let loose hundreds of thousands of Facebook, Twitter, Google and Yahoo accounts.
 



A massive hack has served up the user names and passwords of nearly 2 million Facebook, Twitter, Google and Yahoo accounts, among others. TrustWave’s SpiderLabs first reported the database breach, which it said was made possible by the Pony Botnet Controller.

“With the source code of Pony leaked and in the wild, we continue to see new instances and forks of Pony 1.9,” Daniel Chechik of SpiderLabs wrote in a blog post.

In addition to hundreds of thousands of Facebook, Twitter, Google and Yahoo accounts, SpiderLabs reports the breached database also let loose credentials for 1.58 million Web site log ins, 320,000 e-mail accounts, 41,000 FTP accounts, 3,000 remote desktops, and 3,000 shell accounts. But the leak itself is only one part of the story.

“In our analysis, passwords that use all four character types and are longer than eight characters are considered ‘excellent,’ whereas passwords with four or less characters of only one type are considered ‘terrible’,” Chechik said. “Unfortunately, there were more terrible passwords than excellent ones, more bad passwords than good, and the majority, as usual, is somewhere in between in the medium category.”

The Unreported Threat

We turned to Matthew Standart, director of threat intelligence at HBGary, the technology security division of ManTech International, to get his take on the database leak. He told us it appears that Trustwave infiltrated a control server for the massive Pony botnet that was dumping credentials that it had harvested from compromised computers around the world.

What hasn't been reported, he added, is that compromised endpoints are the actual threat and they should not be overlooked. As Standart sees it, the challenge comes in that many end users rely only on antivirus software products to detect and remove malware -- but today's sophisticated malware threats slip past sensors and aren't being regularly detected. For remediation to work, then, the first and most important step is to identify whether the system is compromised with malware.

“If so, the malware needs to be removed before the passwords -- which should be done periodically as standard personal security hygiene -- can be reset,” Standart said. “Resetting the passwords first is like putting the cart before the horse because the new passwords will be compromised over and over again. Today, there are powerful solutions on the market that detect sophisticated strands of malware where antivirus can't.”

A Focus on Data Management

We also asked Aaron Titus, CPO at Identity Finder, a breach prevention and risk management firm, to get his perspective on the attack. He told us this incident underscores the need for whole-lifecycle sensitive data management.

“Even though the scope of the hack is staggering, keylogging remains a somewhat inefficient method to harvest sensitive data,” Titus said. “The fact that even an inefficient hack can amass such an astounding cache of credentials should be a wakeup call that companies should focus their energies on internal sensitive data discovery, classification and remediation, because harvesting that information is typically much easier.”
 

Tell Us What You Think
Comment:

Name:

Herbie Dragons:

Posted: 2013-12-16 @ 4:28pm PT
The trouble with pass phrases is that they can be identified easily if they are, for instance, passages from a book. The alternative is to create a unique pass phrase which may become hard to remember.

MasterPassword:

Posted: 2013-12-05 @ 12:09pm PT
“In our analysis, passwords that use all four character types and are longer than eight characters are considered ‘excellent,’ whereas passwords with four or less characters of only one type are considered ‘terrible’".

Your analysis is terrible. There are no character types for a computing device. it is a fiction made to adapt sequences of bits to human circumnstances.

The best password are passPHRASES. very long sequences of bits, easy for humans to remember and difficult for computers to crack.

Unfortunately, the crackheads that program password protection do not give sufficient space (30+ characters) and force us to use &?#kIjy7769y that are difficult to remember and easy to crack.



You have the experience and skills, let an ISACA® certification demonstrate your value. Our certifications announce that you have the expertise and insight to speak with authority. ISACA certification is more than a credential; it's a platform that can elevate your career. Register for an Exam Today.


 Network Security
1.   Chinese Hackers Hit U.S. Officials
2.   Russian Hacker's Charges Revealed
3.   Another IE-Focused Patch Tuesday
4.   Russian Arrested in Hacking Case
5.   Most Networks Not Ready for IoT


advertisement
Android SMS Worm on the Loose
Malware lets bad actors cash in.
Average Rating:
Another IE-Focused Patch Tuesday
One critical for Internet Explorer.
Average Rating:
Most Networks Not Ready for IoT
But most enterprises are prepared.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Report: Chinese Hackers Hit U.S. Personnel Networks
Hackers from China broke into the computer networks of the U.S. Office of Personnel Management earlier this year with the intention of accessing the files of tens of thousands of federal employees.
 
Charges: Russian Stole Data from U.S. Restaurants, Zoo
A Russian man arrested on bank fraud and other charges hacked into computers at restaurants in Washington, hundreds of other retail businesses, and even the Phoenix Zoo, authorities say.
 
Another Month, Another IE-Focused Patch Tuesday
Microsoft rolled out 59 vulnerabilities for Internet Explorer in June. But the IE-patching party is not over yet. Redmond published six new security bulletins on Tuesday; two, critical; three, important.
 

Enterprise Hardware Spotlight
Another Day, Another Internet of Things Consortium Is Born
In the emerging Internet of Things, zillions of devices will be talking to each other. Samsung, Intel and Dell just formed a consortium to ensure each thing can understand what others are saying.
 
Gartner Sales Study Sees Tablets Up, PCs Down but Recovering
Are PCs on the comeback trail? That depends on how you define "comeback." While tablet sales remain strong, Gartner's latest study found PC shipments aren't dropping as fast as they did last year.
 
Review: Warming Up to Tablets with Keyboard Covers
If you've ever thought tablets with keyboard covers were just a poor excuse for a laptop, think again. Nokia's Lumia 2520 comes with an optional keyboard cover that just may change your mind.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.