IT.COM

advice PSA: If you use the same password on multiple websites, change it now

NameSilo
A few months ago, NamePros started observing aggressive credential stuffing attacks. This marked a new chapter in security at NamePros. We have rather secure infrastructure, especially for a site of our size. However, we've been growing at a steady pace, which makes us a bigger target.

The credential stuffing attacks we're observing are simple, yet they're difficult to block without your help. They don't compromise the security of NamePros itself, but they do mean that attackers are able to gain access to certain NamePros accounts that have made the mistake of using the same password on other (sometimes less secure) websites, and there's very little we can do to stop it. This may sound surprising or counterintuitive, but it all stems from one simple fact: most people use the same password everywhere.

Here's how a typical credential stuffing attack works:
  1. Alice registers for an account at NamePros.com. She uses the same email address and password combination that she uses everywhere: [email protected] and password123, respectively.
  2. Another site on which Alice has an account, Acme.example, is compromised. Alice never realizes it, but the attackers abscond with her email address and password for Acme.example.
  3. Alice's email address and password are added to combo lists. These combo lists contain known email addresses and passwords for millions of users. They're distributed among hackers; sometimes in private marketplaces for a fee, sometimes publicly at no cost.
  4. Mallory, a hacker, obtains a combo list that contains Alice's username and password.
  5. Mallory uses automated tools to attempt to log into all the accounts in the combo list on NamePros.com.
  6. Most of the credentials don't work because they came from Acme.example, not NamePros.com. However, since Alice has an account at both websites with the same email address and password, Mallory successfully logs into Alice's account on the first attempt.
  7. Now that Mallory knows that Alice has poor security hygiene, in addition to gaining full access to Alice's NamePros account, Mallory can use the credentials on other websites that might be of interest to the a NamePros user. Registrar accounts are likely targets.
  8. Mallory uses the same credentials to log into Alice's registrar account and absconds with her domains.

NamePros isn't typically the target here, and this attack doesn't rely on weaknesses in NamePros' security, which makes it difficult for us to block.

This is especially problematic for a few reasons:
  • As far as Alice is concerned, it makes little difference which website leaked her password. From her perspective, she's now lost her domains, her NamePros account, and possibly countless other valuable accounts. It's utterly devastating.
  • NamePros can play a game of cat-and-mouse in an attempt to block some of the attacks, but that just encourages the attackers to be stealthier. Furthermore, it's not going to protect Alice's accounts elsewhere.
  • If an attacker guesses Alice's password correctly on the first try, we may never even know that Alice was hacked, or it may take years to discover.
  • NamePros itself isn't being hacked; we can't simply improve our security to stop these attacks.

When the attacks picked up, we doubled-down on our game of cat-and-mouse. Our mitigations are quite thorough; a naΓ―ve attack is likely to fail. However, attackers have been getting more creative. They're spreading their attack out over large numbers of IP addresses to circumvent rate limiting. They're making login attempts from residential connections in the US rather than datacenters, presumably using compromised consumer devices. Some of the connections come from companies that provide cheap labor, hinting that the attacks may even be capable of passing captchas.

Initially, we could at least determine with a moderate degree of certainty which accounts were compromised. They were invariably old, inactive accounts with almost no data. As time went on, we started seeing a small number of active accounts targeted.

We notice these attacks because they're noisy. If we see thousands of suspicious login attempts over the span of an hour, we're going to dig deeper. Likewise, if someone reports that their account has been hacked, we'll investigate.

When this happens, it's not unusual for the same account to be hacked by multiple actors; after all, these passwords are floating around the internet for anyone to grab. If we know an account has been targeted, it's not hard to manually dig through their login history and pick out anything unusual, then branch out from there.

Sometimes the attacks are quite sneaky. Several months ago, a multi-day investigation revealed that one NamePros member was hijacking other members as far back as 2019. They managed to evade detection for quite some time, during which time they posted from both a hijacked account and their real account. They were careful enough that there was no reasonable way an automated system could have detected this; it required hours of careful research by a professional. More concerning are the accounts they accessed but didn't hijack: how long were they lurking, reading direct messages and other sensitive information?

We can't combat this on our own--it's impossible. If someone knows your password and tries to log in from the same location as you, we have no way to tell that you've been hacked. We can block the majority of credential stuffing attempts, but some will inevitably slip through the cracks. The only real defense is to avoid using the same password across multiple websites.

Look, passwords are bad. Contrary to popular belief, if you can remember a password, it's a bad password. This is, of course, problematic: you are expected to remember your password, but if you do, it's a bad password, and you will get hacked. Various intelligent people have come up with fancy software known as "password managers" to get around this, although a simple paper notebook will suffice if you'd rather go that route. You need a random, unique password for every website. Not mydogisawesome@7, not Ilik3gr##nEggz&Ham, not myCoolPassword!NamePros, not something even remotely similar to any other password you have ever used. Don't take my word for it; see what Bruce Schneier has to say on the matter. Security professionals are working hard to replace passwords with human-friendly alternatives, but, for now, we're stuck with passwords.

Do you use the same password across multiple websites? Is your password mydogisawesome@7? Stop. There's little we can do to protect an account with poor security hygiene; it will get hacked eventually. Everyone likes to think it won't happen to them, but it will. Are you willing to risk your NamePros account? Your domains? Your livelihood?
  1. Get a password manager or a notebook.
  2. Change your password.
  3. Enable two-step authentication.
 
72
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
Hang on let me check with my wife.
I'm beginning to suspect there is no wife and you lead a double life

By day.....John
By night......Jane
 
2
•••
She is in the picture. We had dinner with Eric Lyon, Amanda and the baby.
 
Last edited:
4
•••
IMG_0554.JPG
 
13
•••
I used to use the same password as a kid and it was leaked, they got the password and logged into all my accounts, I had nothing of real value anyway so I don't care so much. Up to this day they still log into those outdated accounts, lol.

Nowadays, every password I use is complex and unique. Use a password manager or write them down somewhere.
 
1
•••
We're now trialing a new feature on NamePros that will check whether any new passwords set are similar to known-compromised passwords. If a password is found to be weak or compromised, it'll be rejected. Right now, it's fairly strict, although we may have to tune it a bit if we decide to keep it enabled long-term.

Give a try! Change your password. If it gets rejected, your password might be lousy. ;)
 
7
•••
Passwords in general are terrible. As an industry, we're trying quite hard to move past them.

Password reuse is a very real risk. There are plenty of secure offline methods of storing passwords, but your memory is not a safe place for more than a few. However, chances are you have more than a few online accounts. The password for each of those sites needs to be completely different from all the others, or you will get hacked.

As for the CIA...

security.png


Image copyright Randall Munroe of xkcd. Original source: https://xkcd.com/538/. Licensed under CC-BY-NC 2.5.
No need to use a wrench, it will work with a chocolate bar... :xf.grin::banghead:

Social engineering: Password in exchange for chocolate

https://www.sciencedaily.com/releases/2016/05/160512085123.htm

"It requires a lot of effort and expense for computer hackers to program a Trojan virus and infiltrate individual or company computers. They are therefore increasingly relying on psychological strategies to manipulate computer users into voluntarily divulging their login details. These methods are known as β€œsocial engineering”. For the first time, psychologists have conducted a large-scale study (involving 1,208 people) to investigate how people are manipulated into sharing their passwords with complete strangers in return for small gifts.

In one condition, participants were given chocolate before being asked for their password, while in the control group they were only given chocolate after the interview. The research showed that this small gift greatly increased the likelihood of participants giving away their password. If the chocolate was only given out afterwards, 29.8 per cent of participants revealed their passwords. However, if the chocolate was received generally beforehand, a total of 43.5% of the respondents shared their password with the interviewer. The willingness to divulge passwords increased further if the chocolate was offered immediately before the participants were asked to disclose their password. Here, the internal pressure felt by the recipient appeared to be particularly high, with 47.9% giving away their passwords, compared with 39.9% of participants who received their gift at the beginning of the interview.

The study shows how easy it is for people to be manipulated with the help of a simple incentive and the principle of reciprocity. Melzer concluded that "This simulated attack was in no way a sophisticated criminal strategy. Although the consequences of such attacks can be severe for individuals or companies, many people lack awareness of such dangers."

Credits to @Future Sensors from his post:

https://www.namepros.com/threads/science-technology-news-discussion.1212824/page-71#post-8179289
 
Last edited:
5
•••
Passwords in general are terrible. As an industry, we're trying quite hard to move past them.

Reminds me of a Usenix conference where Bruce was speaking about security. It was in a time when ssh was not yet widely used. Lots of security researchers were using insecure methods (telnet, pop3, etc) to login to their company assets during that talk. When the talk was over, there was a huge whiteboard at the exit, showing all captured passwords in plaintext, with an urgent request to use encrypted communications in the future.
 
Last edited:
4
•••
When the talk was over, there was a huge whiteboard at the exit, showing all captured passwords in plaintext,

Ha, classic.

For anyone who’s not sure who @Future Sensors is referring to, Bruce Schneier is perhaps one of the most famous security professionals out there. One of his algorithms, Blowfish, forms the basis of the method that NamePros used to securely store passwords until recently.

These methods are known as β€œsocial engineering”.

For some proper social engineering fun, search for talks by Deviant Ollam.
 
3
•••
Ha, classic.

For anyone who’s not sure who @Future Sensors is referring to, Bruce Schneier is perhaps one of the most famous security professionals out there. One of his algorithms, Blowfish, forms the basis of the method that NamePros used to securely store passwords until recently.



For some proper social engineering fun, search for talks by Deviant Ollam.

Direct all evil traffic to the nP honeypot, where they can sell names in alternative TLDs to each other :ROFL:
 
1
•••
One of his algorithms, Blowfish, forms the basis of the method that NamePros used to securely store passwords until recently.
Don't forget to put a bit of salt on them :xf.smile: SHA512 is also pretty strong. At least a few time ago!
 
Last edited:
1
•••
1
•••
Don't forget to put a bit of salt on them :xf.smile: SHA512 is also pretty strong. At least a few time ago!

Modern cryptography frameworks take care of the salt. ;) As for SHA512, it’s not suitable for password hashing on its own, although and can be used as the basis for a solid KDF.
 
0
•••
Password changed, downloaded the google thingy, thanx for the heads up.

Cheers
Corey
 
2
•••
We're now trialing a new feature on NamePros that will check whether any new passwords set are similar to known-compromised passwords.
Hope that NP passwords will not then be stored in plain text on server side... ( ? )
 
0
•••
Hope that NP passwords will not then be stored in plain text on server side... ( ? )
Never. The quality of the password is checked before it’s accepted and stored. That’s why you have to try to change your password to see it in action. It’s basically a more advanced version of β€œYou must add a special character to the password that you want to use.”

downloaded the google thingy
An important caution about Google Authenticator:

It does not sync to your other devices and it doesn’t backup to the cloud or anywhere else; if you lose your device with it, you’ll be locked out of your account(s).

Bitwarden, Authy, 1Password, and several other password managers can sync across your devices and store your data in the cloud with end-to-end encryption, which means even they can’t see it without your master password.

Those are better options for most people.
 
4
•••
Write you passwords down on some sheets of paper and hide it when you leave your office/ house.
Photocopy it as a backup, and hide that in an envelope somewhere else.

It doesn't get much simpler IMO.

EDIT: you can also include a false character that only you know is not part of the real password, just in case someone does find your list.
 
Last edited:
4
•••
On flip side this is why I have seen an established account trying to sell to good to be true domains, you have to be wary of aged accounts offering to good to be true deals.
 
3
•••
@Bravo Mod Team
An important caution about Google Authenticator:

It does not sync to your other devices and it doesn’t backup to the cloud or anywhere else; if you lose your device with it, you’ll be locked out of your account(s).

Bitwarden, Authy, 1Password, and several other password managers can sync across your devices and store your data in the cloud with end-to-end encryption, which means even they can’t see it without your master password.

Those are better options for most people.

TBH I don't know much about it or how to use it, I think it was for the 2 factor thingy....how do I change that or what should I do next...thank you in advance.

Cheers
Corey
 
Last edited:
0
•••
@Bravo Mod Team


TBH I don't know much about it or how to use it, I think it was for the 2 factor thingy....how do I change that or what should I do next...thank you in advance.

Cheers
Corey

I'd recommend testing it with a Google account first so you have a clear idea of how it works. They have an informative setup process that we can't compete with for the time being, although we're working on improvements.

Once you've experimented with it and understand the setup process, head to https://www.namepros.com/account/two-step to enable 2FA on your NamePros accounts. There are some important notes, though:
  • If you get locked out of your account as a result of using 2FA, unless you've only recently enabled it, we're probably not going to be able to get you back into your NamePros account. It's meant to be the ultimate in account security.
  • After you enable 2FA, make sure you retrieve your backup codes. Print them and store them somewhere safe. Otherwise, you're going to get locked out of your account eventually.
You should research 2FA on your own: why it's necessary, what problems it solves, and how to use it. This will allow you to make informed decisions about enabling 2FA on other accounts, not just your NamePros account.

If there's interest, I may do another blog post with a detailed introduction to 2FA. It's an area of active development, so it's probably worth spending some time writing an article with the latest information.
 
5
•••
I'd recommend testing it with a Google account first so you have a clear idea of how it works. They have an informative setup process that we can't compete with for the time being, although we're working on improvements.

Once you've experimented with it and understand the setup process, head to https://www.namepros.com/account/two-step to enable 2FA on your NamePros accounts. There are some important notes, though:
  • If you get locked out of your account as a result of using 2FA, unless you've only recently enabled it, we're probably not going to be able to get you back into your NamePros account. It's meant to be the ultimate in account security.
  • After you enable 2FA, make sure you retrieve your backup codes. Print them and store them somewhere safe. Otherwise, you're going to get locked out of your account eventually.
You should research 2FA on your own: why it's necessary, what problems it solves, and how to use it. This will allow you to make informed decisions about enabling 2FA on other accounts, not just your NamePros account.

If there's interest, I may do another blog post with a detailed introduction to 2FA. It's an area of active development, so it's probably worth spending some time writing an article with the latest information.

Thanks @Paul - good initiative.

May I suggest a related -optional- security feature for consideration.

Link IP address to session. For additional security you can choose to link your (fixed) IP address to your session. Once enabled, changes to your services during the session (these can be long sessions) can only be made from the IP address used to log in. You can still log in from any other IP address. This model can be extended for particular high-risk sections on namePros. Of course it should be made clear that this feature is especially useful with fixed and semi-fixed IPs.
 
Last edited:
2
•••
Reminds me of a Usenix conference where Bruce was speaking about security. It was in a time when ssh was not yet widely used. Lots of security researchers were using insecure methods (telnet, pop3, etc) to login to their company assets during that talk. When the talk was over, there was a huge whiteboard at the exit, showing all captured passwords in plaintext, with an urgent request to use encrypted communications in the future.

Found it :sneaky:

Usenix plaintext password.jpg
 
5
•••
I'd personally recommend taking it a step further and using a secure password manager such as LastPass, 1Password, Dashlane, etc. + setup 2-factor authentication on all your accounts.

I personally use 1Password and they have a feature that will just auto-generate secure passwords and save them. Using password managers + 2 factor authentication actually protected me against a targetted Russian attack on one of my previously owned 3 letter .com domain names worth 5 figures as well as other valuable domains which were almost stolen. Fortunately, after breaching my email account and other accounts they were stopped at the registrar and nothing was lost.

When you post on forums like NamePros, it unfortunately makes you a target.

Also, be sure to run frequent virus/malware scans on your computer to make sure you don't have keyloggers or other malicious programs. Use something like Windows Defender, Malwarebytes, AVG, etc. and run it at least once a week or so.
 
Last edited:
0
•••
I'd personally recommend taking it a step further and using a secure password manager such as LastPass, 1Password, Dashlane, etc. + setup 2-factor authentication on all your accounts.

Indeed, anyone capable of using a password manager should do so. I linked to Bitwarden in the blog post since it’s free, but all of these are good options.
 
1
•••
Indeed, anyone capable of using a password manager should do so. I linked to Bitwarden in the blog post since it’s free, but all of these are good options.
Bitwarden is also a fantastic option, I used to use this at a company I worked with and it kept our logins secure :)
 
0
•••
My email password got hacked. Again.
This is the 3rd time I've had to rename my dog.

Peace,
Kenny
 
2
•••
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back