IT.COM

advice PSA: If you use the same password on multiple websites, change it now

NameSilo
A few months ago, NamePros started observing aggressive credential stuffing attacks. This marked a new chapter in security at NamePros. We have rather secure infrastructure, especially for a site of our size. However, we've been growing at a steady pace, which makes us a bigger target.

The credential stuffing attacks we're observing are simple, yet they're difficult to block without your help. They don't compromise the security of NamePros itself, but they do mean that attackers are able to gain access to certain NamePros accounts that have made the mistake of using the same password on other (sometimes less secure) websites, and there's very little we can do to stop it. This may sound surprising or counterintuitive, but it all stems from one simple fact: most people use the same password everywhere.

Here's how a typical credential stuffing attack works:
  1. Alice registers for an account at NamePros.com. She uses the same email address and password combination that she uses everywhere: [email protected] and password123, respectively.
  2. Another site on which Alice has an account, Acme.example, is compromised. Alice never realizes it, but the attackers abscond with her email address and password for Acme.example.
  3. Alice's email address and password are added to combo lists. These combo lists contain known email addresses and passwords for millions of users. They're distributed among hackers; sometimes in private marketplaces for a fee, sometimes publicly at no cost.
  4. Mallory, a hacker, obtains a combo list that contains Alice's username and password.
  5. Mallory uses automated tools to attempt to log into all the accounts in the combo list on NamePros.com.
  6. Most of the credentials don't work because they came from Acme.example, not NamePros.com. However, since Alice has an account at both websites with the same email address and password, Mallory successfully logs into Alice's account on the first attempt.
  7. Now that Mallory knows that Alice has poor security hygiene, in addition to gaining full access to Alice's NamePros account, Mallory can use the credentials on other websites that might be of interest to the a NamePros user. Registrar accounts are likely targets.
  8. Mallory uses the same credentials to log into Alice's registrar account and absconds with her domains.

NamePros isn't typically the target here, and this attack doesn't rely on weaknesses in NamePros' security, which makes it difficult for us to block.

This is especially problematic for a few reasons:
  • As far as Alice is concerned, it makes little difference which website leaked her password. From her perspective, she's now lost her domains, her NamePros account, and possibly countless other valuable accounts. It's utterly devastating.
  • NamePros can play a game of cat-and-mouse in an attempt to block some of the attacks, but that just encourages the attackers to be stealthier. Furthermore, it's not going to protect Alice's accounts elsewhere.
  • If an attacker guesses Alice's password correctly on the first try, we may never even know that Alice was hacked, or it may take years to discover.
  • NamePros itself isn't being hacked; we can't simply improve our security to stop these attacks.

When the attacks picked up, we doubled-down on our game of cat-and-mouse. Our mitigations are quite thorough; a naΓ―ve attack is likely to fail. However, attackers have been getting more creative. They're spreading their attack out over large numbers of IP addresses to circumvent rate limiting. They're making login attempts from residential connections in the US rather than datacenters, presumably using compromised consumer devices. Some of the connections come from companies that provide cheap labor, hinting that the attacks may even be capable of passing captchas.

Initially, we could at least determine with a moderate degree of certainty which accounts were compromised. They were invariably old, inactive accounts with almost no data. As time went on, we started seeing a small number of active accounts targeted.

We notice these attacks because they're noisy. If we see thousands of suspicious login attempts over the span of an hour, we're going to dig deeper. Likewise, if someone reports that their account has been hacked, we'll investigate.

When this happens, it's not unusual for the same account to be hacked by multiple actors; after all, these passwords are floating around the internet for anyone to grab. If we know an account has been targeted, it's not hard to manually dig through their login history and pick out anything unusual, then branch out from there.

Sometimes the attacks are quite sneaky. Several months ago, a multi-day investigation revealed that one NamePros member was hijacking other members as far back as 2019. They managed to evade detection for quite some time, during which time they posted from both a hijacked account and their real account. They were careful enough that there was no reasonable way an automated system could have detected this; it required hours of careful research by a professional. More concerning are the accounts they accessed but didn't hijack: how long were they lurking, reading direct messages and other sensitive information?

We can't combat this on our own--it's impossible. If someone knows your password and tries to log in from the same location as you, we have no way to tell that you've been hacked. We can block the majority of credential stuffing attempts, but some will inevitably slip through the cracks. The only real defense is to avoid using the same password across multiple websites.

Look, passwords are bad. Contrary to popular belief, if you can remember a password, it's a bad password. This is, of course, problematic: you are expected to remember your password, but if you do, it's a bad password, and you will get hacked. Various intelligent people have come up with fancy software known as "password managers" to get around this, although a simple paper notebook will suffice if you'd rather go that route. You need a random, unique password for every website. Not mydogisawesome@7, not Ilik3gr##nEggz&Ham, not myCoolPassword!NamePros, not something even remotely similar to any other password you have ever used. Don't take my word for it; see what Bruce Schneier has to say on the matter. Security professionals are working hard to replace passwords with human-friendly alternatives, but, for now, we're stuck with passwords.

Do you use the same password across multiple websites? Is your password mydogisawesome@7? Stop. There's little we can do to protect an account with poor security hygiene; it will get hacked eventually. Everyone likes to think it won't happen to them, but it will. Are you willing to risk your NamePros account? Your domains? Your livelihood?
  1. Get a password manager or a notebook.
  2. Change your password.
  3. Enable two-step authentication.
 
72
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
Thanks for the heads up. You'd be surprised the amount of people that do use same passwords, on all platforms, people don't suspect something will happen
 
0
•••
Bitdefender wallet is top-notch, but remember to use a master password for the wallet, then write everything down on a piece of paper.

imo
 
0
•••
I'd personally recommend taking it a step further and using a secure password manager such as LastPass, 1Password, Dashlane, etc. + setup 2-factor authentication on all your accounts.
Also, be sure to run frequent virus/malware scans on your computer to make sure you don't have keyloggers or other malicious programs. Use something like Windows Defender, Malwarebytes, AVG, etc. and run it at least once a week or so.
For anyone who'd like to combine all of these protections into a single tool:
  • ESET Smart Security has a password manager, antivirus, firewall, and more as an all-in-one piece of security software.
ESET is a leader in its field.
 
0
•••
Thanks for this.
Guess I'll be busy changing some passwords for a while. O_o
Maybe saved me a headache!
 
0
•••
A warning:

LastPass says employee’s home computer was hacked and corporate vault taken

Already smarting from a breach that put partially encrypted login data into a threat actor’s hands, LastPass on Monday said that the same attacker hacked an employee’s home computer and obtained a decrypted vault available to only a handful of company developers.

Although an initial intrusion into LastPass ended on August 12, officials with the leading password manager said the threat actor β€œwas actively engaged in a new series of reconnaissance, enumeration, and exfiltration activity” from August 12 to August 26. In the process, the unknown threat actor was able to steal valid credentials from a senior DevOps engineer and access the contents of a LastPass data vault. Among other things, the vault gave access to a shared cloud-storage environment that contained the encryption keys for customer vault backups stored in Amazon S3 buckets.


Read more:

https://arstechnica.com/information...yees-home-computer-and-stole-corporate-vault/
 
1
•••
Last edited:
0
•••
A warning:

LastPass says employee’s home computer was hacked and corporate vault taken

Already smarting from a breach that put partially encrypted login data into a threat actor’s hands, LastPass on Monday said that the same attacker hacked an employee’s home computer and obtained a decrypted vault available to only a handful of company developers.

Although an initial intrusion into LastPass ended on August 12, officials with the leading password manager said the threat actor β€œwas actively engaged in a new series of reconnaissance, enumeration, and exfiltration activity” from August 12 to August 26. In the process, the unknown threat actor was able to steal valid credentials from a senior DevOps engineer and access the contents of a LastPass data vault. Among other things, the vault gave access to a shared cloud-storage environment that contained the encryption keys for customer vault backups stored in Amazon S3 buckets.


Read more:

https://arstechnica.com/information...yees-home-computer-and-stole-corporate-vault/

Lessons to be learned from the LastPass data breach​

March 20, 2023

With over 33 million registered users and more than 100,000 business customers, LastPass is one of the world’s most popular password managers. After an escalating series of highly-damaging disclosures over the last few months, LastPass has now admitted that hackers have compromised its systems on more than one occasion, and have stolen a huge trove of highly sensitive customer data.

In this article, we examine the LastPass data breach and consider the lessons that can be drawn from it.


Read more:

https://proton.me/blog/lessons-from-lastpass
 
3
•••
Whoever thought online password managers are a good idea... If there's a single point of breach to all my accounts, I prefer it to be me rather than some sloppy program/website/company.
 
1
•••
Whoever thought online password managers are a good idea... If there's a single point of breach to all my accounts, I prefer it to be me rather than some sloppy program/website/company.
Exactly! I'm old fashioned and still use a pen/pencil + paper + waterproof/fireproof lock-box/safe = password protection.
 
4
•••
The safest way is store in your brain, the more you use it the faster you will remember no matter of how complex it is.
Also never save it in the browser Autofill, unless you have 2FA and you not use it on more than one websites.
 
Last edited:
0
•••
1
•••
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back