• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 03:19
CET 09:19
KST 17:19
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
TL.net Map Contest #21: Winners5Intel X Team Liquid Seoul event: Showmatches and Meet the Pros10[ASL20] Finals Preview: Arrival13TL.net Map Contest #21: Voting12[ASL20] Ro4 Preview: Descent11
Community News
Starcraft, SC2, HoTS, WC3, returning to Blizzcon!26$5,000+ WardiTV 2025 Championship5[BSL21] RO32 Group Stage4Weekly Cups (Oct 26-Nov 2): Liquid, Clem, Solar win; LAN in Philly2Weekly Cups (Oct 20-26): MaxPax, Clem, Creator win9
StarCraft 2
General
Starcraft, SC2, HoTS, WC3, returning to Blizzcon! TL.net Map Contest #21: Winners RotterdaM "Serral is the GOAT, and it's not close" Weekly Cups (Oct 20-26): MaxPax, Clem, Creator win 5.0.15 Patch Balance Hotfix (2025-10-8)
Tourneys
Is Filagra Double 200mg Safe For Everyone? Constellation Cup - Main Event - Stellar Fest $5,000+ WardiTV 2025 Championship Merivale 8 Open - LAN - Stellar Fest Sea Duckling Open (Global, Bronze-Diamond)
Strategy
Custom Maps
Map Editor closed ?
External Content
Mutation # 498 Wheel of Misfortune|Cradle of Death Mutation # 497 Battle Haredened Mutation # 496 Endless Infection Mutation # 495 Rest In Peace
Brood War
General
[BSL21] RO32 Group Stage BGH Auto Balance -> http://bghmmr.eu/ SnOw's ASL S20 Finals Review Practice Partners (Official) [ASL20] Ask the mapmakers — Drop your questions
Tourneys
[Megathread] Daily Proleagues [BSL21] RO32 Group B - Sunday 21:00 CET [BSL21] RO32 Group A - Saturday 21:00 CET BSL21 Open Qualifiers Week & CONFIRM PARTICIPATION
Strategy
Current Meta PvZ map balance How to stay on top of macro? Soma's 9 hatch build from ASL Game 2
Other Games
General Games
Stormgate/Frost Giant Megathread Dawn of War IV Nintendo Switch Thread ZeroSpace Megathread General RTS Discussion Thread
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread SPIRED by.ASL Mafia {211640}
Community
General
Russo-Ukrainian War Thread US Politics Mega-thread Things Aren’t Peaceful in Palestine YouTube Thread Dating: How's your luck?
Fan Clubs
White-Ra Fan Club The herO Fan Club!
Media & Entertainment
Anime Discussion Thread Movie Discussion! [Manga] One Piece Korean Music Discussion Series you have seen recently...
Sports
2024 - 2026 Football Thread NBA General Discussion MLB/Baseball 2023 TeamLiquid Health and Fitness Initiative For 2023 Formula 1 Discussion
World Cup 2022
Tech Support
SC2 Client Relocalization [Change SC2 Language] Linksys AE2500 USB WIFI keeps disconnecting Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List Recent Gifted Posts
Blogs
Saturation point
Uldridge
DnB/metal remix FFO Mick Go…
ImbaTosS
Why we need SC3
Hildegard
Career Paths and Skills for …
TrAiDoS
Reality "theory" prov…
perfectspheres
Our Last Hope in th…
KrillinFromwales
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1827 users

Blizzard Security Breach - Page 16

Forum Index > SC2 General
442 CommentsPost a Reply
Prev 1 14 15 16 17 18 23 Next All
Rannasha
Profile Blog Joined August 2010
Netherlands2398 Posts
August 10 2012 10:03 GMT
#301
On August 10 2012 18:54 Maluk wrote:
I'm just wondering what exactly could the "hackers" do even if they catch my password ? I mean, if someone steals my account to ladder with it I won't be to mad, and aside from that what are the risks ?


For accounts with just SC2, there's not much to be gained. WoW and D3 accounts are rather interesting though, since they contain tradeable items and currency, making it easy to strip the account of valuable commodities to be sold for actual money at some later time.
Such flammable little insects!
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 10:05 GMT
#302
On August 10 2012 18:54 Maluk wrote:
I'm just wondering what exactly could the "hackers" do even if they catch my password ? I mean, if someone steals my account to ladder with it I won't be to mad, and aside from that what are the risks ?

it isn't really with battle.net, you only really risk the standard wow/diablo account steal if your e-mail had a unique password. the real risk would be if your battle.net password happened to be your paypal password and you hadn't changed it when it came time to farm this data.

we don't like to collect risk potential. we tend to try to stomp it out even if only a minor potential threat caused by user stupidity.
Team Liquid is the used the tampon of the starcraft community.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
August 10 2012 10:06 GMT
#303
I have a question to the "experts" here.

I'm always wondering about using Brute Force stuff for this. How do you know if a password is correct unless you have it checked on the servers? I mean wouldn't someone who using that method have to register millions of BNet enquiries, which would make it easy to prevent that? Some explanation on how that stuff works would be appreciated
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
Maluk
Profile Joined August 2011
France987 Posts
August 10 2012 10:10 GMT
#304
Tank you for the answers, Rannasha and multiversed, I guess I don't have to be concerned then. SC2 only ftw
greendestiny
Profile Blog Joined May 2010
Bosnia-Herzegovina114 Posts
August 10 2012 10:12 GMT
#305
I started receiving regular fake MoP invites to my mail about 2 months ago. I believe that Blizzard was hacked around the time of D3's release, and they found out just now about it
"The trespass into our internal network was detected by us on August 4, 2012."

I remember reading official D3 forums when there was a mass of users going: "Blizz, I take every possible precaution and I lost all my gear and gold, your servers have been hacked!" and the massive amount of verbal abuse they received. They should feel vindicated now.
How I appear to you is a reflection of you, not me.
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 10:32:33
August 10 2012 10:14 GMT
#306
i will explain in broad general terms...
brute forcing is most often done with a botnet (a large network of hacked computers.) if a single user attempted to enter 5 million passwords into a server, it would to get noticed. if 200,000 computers try 1-2 times each in a controlled method, the associated IP doesn't get flagged, logged, and banned. *this more the general theory, than the actual practice...*

i'd rather not go into more detail, as this is all stupidly easy to begin with. all it really requires is teenaged angst, or the equivalent.

edit: update for clarity. account was a poor choice of words.
Team Liquid is the used the tampon of the starcraft community.
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
August 10 2012 10:16 GMT
#307
On August 10 2012 19:06 Na_Dann_Ma_GoGo wrote:
I have a question to the "experts" here.

I'm always wondering about using Brute Force stuff for this. How do you know if a password is correct unless you have it checked on the servers? I mean wouldn't someone who using that method have to register millions of BNet enquiries, which would make it easy to prevent that? Some explanation on how that stuff works would be appreciated


If you have the hash and know the algorithm, you can hash millions of possible passwords and as soon as your hash and the password hash matches, you have the correct password. No need to check with the server, it will just do the same algorithm and will consider both equal.

There are databases of password/hash combinations - called rainbow tables - where the cleartext password is already matched to the hash in the database, so you can just search for the hash and get the cleartext as result. To counteract those, it is common practice to add a "salt", i.e. some additional data, to the password which makes it harder to get the correct result in the rainbow table.

Depending on the algorithm, salt, password length, etc., there is an infinitely small chance of two different passwords generating the same hash (0.000....01%) but that actually won't matter because as long as the end result is the same, the server will still accept it as valid because it doesn't know the difference either.
Rannasha
Profile Blog Joined August 2010
Netherlands2398 Posts
August 10 2012 10:18 GMT
#308
On August 10 2012 19:12 greendestiny wrote:
I started receiving regular fake MoP invites to my mail about 2 months ago. I believe that Blizzard was hacked around the time of D3's release, and they found out just now about it
"The trespass into our internal network was detected by us on August 4, 2012."


I've been receiving these phising mails for years, so they're not really new. They tend to pop up whenever a new expansion/game is in beta. I use different email addresses for different websites and I've only ever received these fake mails on 2 addresses I used for some community websites that are known to have been compromised (since they announced it to their users). I have never received any such mail on the address I use for my Battle.net account.

I remember reading official D3 forums when there was a mass of users going: "Blizz, I take every possible precaution and I lost all my gear and gold, your servers have been hacked!" and the massive amount of verbal abuse they received. They should feel vindicated now.


Except that they're not vindicated. The people that lost their D3 account back then simply didn't have the appropriate security measures. It didn't help that Blizzard gave their SMS service that didn't work with D3 the name "SMS Authenticator", which was the main source of people saying that they did have an authenticator and still lost their account. Blizzard has since then renamed the thing to something like SMS Protect or so.
Such flammable little insects!
Dakkas
Profile Joined October 2010
2550 Posts
August 10 2012 10:26 GMT
#309
I must say it's quite contrasting when comparing SC2 gamer's response with D3 gamer's response on this Blizzard security breach. From what I see in this thread, most people are being quite objective and understanding of it however on the D3 forum, the general opinion is "LOL BLIZZARD SUX DIX SO BAD FAIL".

Fuchsteufelswild
Profile Joined October 2009
Australia2028 Posts
August 10 2012 10:28 GMT
#310
I only just changed my password a couple of months ago and I'm not playing SC2 often nowadays, so stuff it until I get reason to get them to lock it. I have no money on the account.
ZerO - FantaSy - Calm - Nal_rA - Jaedong - NaDa - EffOrt - Bisu - by.hero - StarDust - Welmu - Nerchio - Supernova - Solar - Squirtle - LosirA - Grubby - IntoTheRainbow - Golden... ~~~ Incredible Miracle and Woongjin Stars 화이팅!
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
August 10 2012 10:39 GMT
#311
@ Morfildur
Aye thanks.

But then there shouldn't be much to worry about at the moment since acquiring the algorithm should be night impossible right?
I mean it shouldn't be straight away available to the hackers and reverse engineering is one hell of a task I'd imagine.

WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 10:42 GMT
#312
that is the hope/assumption. it would take lifetimes without the key to the door. so to speak.
Team Liquid is the used the tampon of the starcraft community.
Xanthopsia
Profile Joined November 2010
Australia41 Posts
August 10 2012 10:57 GMT
#313
Very unfortunate that this happened however I'm really happy with how honest Blizzard are being telling customers exactly what information was compromised and steps to protect your account rather than avoiding what information was compromised or keeping it to themselves.

Horrible that it has happened, however kudos to Blizzard for handling it the best way possible.
paralleluniverse
Profile Joined July 2010
4065 Posts
August 10 2012 11:01 GMT
#314
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.
fishjie
Profile Blog Joined September 2010
United States1519 Posts
August 10 2012 11:05 GMT
#315
unfortunately since i use the same pw for a lot of websites including financial now i have to change /sigh
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
Last Edited: 2012-08-10 11:08:59
August 10 2012 11:07 GMT
#316
On August 10 2012 19:39 Na_Dann_Ma_GoGo wrote:
@ Morfildur
Aye thanks.

But then there shouldn't be much to worry about at the moment since acquiring the algorithm should be night impossible right?
I mean it shouldn't be straight away available to the hackers and reverse engineering is one hell of a task I'd imagine.



Companies all use standard algorithms and with some practice you can limit the amount of possible algorithms by just looking at the hash, the only factor that can make it hard is the salt and the password complexity.

The more complex the password is, the less likely it's in a rainbow table and the harder it is to brute force.

A more in-depth Explanation:
A password of length 1 that consists of only lowercase characters (a-z) has a complexity of 26^1, i.e. 26.
A password of length 1 that consists of lower- & uppercase has a complexity of 52
A password of length 1 that consists of lower- & uppercase & numbers and a selection of 50 special characters has a complexity of 112.
A password with those properties but of length 2 has a complexity of 112^2, i.e. 12 544
A password of length 10 with only lowercase characters just has a complexity of 26^10, i.e. 141 167 095 653 376
A password of length 10 with the 112 characters has a complexity of 112^10, i.e. 310 584 820 834 420 916 224

complexity means the range of possible passwords that have to be hashed to find the correct password.

If you add a salt of 10 characters from a selection of 112 characters, it suddenly becomes 112^20 which is a 40 digit number.

Now as for the actual time it takes to hash the password and brute force it, the stronger algorithms take longer than simple algorithms like MD5. You can calculate several million up to several billion ( http://www.codinghorror.com/blog/2012/04/speed-hashing.html ) MD5 hashes per second depending on your PC, so to definitively crack the lowercase-only password, it takes a few hours or at most a few days. To crack the complex password it still takes a few weeks.
Other algorithms like SHA256, etc. are slower, so it takes 10-100 times longer to brute force passwords. Add the salt and it suddenly becomes an eternity.

That is why the rainbow tables exist. Basically each lower- & uppercase only combination for passwords of up to 10-15 characters in length is included in rainbow tables which makes a search for it a matter of seconds.

Most of those that steal a huge amount of password hashes don't bother brute forcing, if it's not in the rainbow tables, they ignore those but still might sell or release those users&hashes. That means that someone who targets a specific user/group can still try to brute force the passwords.

So in summary the best way to protect your password is:
1. Have long password using special characters, numbers and a mix of upper and lower characters to maximize it's complexity
2. Hope that the one storing your password uses a strong salt
3. Hope that the one storing your password uses a strong&slow algorithm.
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 11:09:29
August 10 2012 11:07 GMT
#317
On August 10 2012 19:26 Dakkas wrote:
I must say it's quite contrasting when comparing SC2 gamer's response with D3 gamer's response on this Blizzard security breach. From what I see in this thread, most people are being quite objective and understanding of it however on the D3 forum, the general opinion is "LOL BLIZZARD SUX DIX SO BAD FAIL".


That's because a lot of people were hacked when D3 launched, because they were too stupid to protect their accounts from keyloggers and phishing scams. They blamed Blizzard. They accused Blizzard of being hacked, even though Blizzard had never been hacked at that time.

They said it was greedy and unfair they had to buy an authenticator to secure their accounts, without realizing that you don't need an authenticator if you're not stupid.

And now that Blizzard has been "hacked", they've actually been proven completely wrong. Blizzard got hacked and nothing that would allowed unauthorized access to any account has been compromised. No account will be hacked as a direct result of Blizzard getting hacked.

The D3 community -- what were you expecting from a bunch of people with no internet skills who were dumb enough to get phished and hacked?
Ganondorf
Profile Joined April 2010
Italy600 Posts
Last Edited: 2012-08-10 11:11:04
August 10 2012 11:10 GMT
#318
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..
Wroshe
Profile Joined June 2011
Netherlands1051 Posts
August 10 2012 11:10 GMT
#319
On August 10 2012 19:26 Dakkas wrote:
I must say it's quite contrasting when comparing SC2 gamer's response with D3 gamer's response on this Blizzard security breach. From what I see in this thread, most people are being quite objective and understanding of it however on the D3 forum, the general opinion is "LOL BLIZZARD SUX DIX SO BAD FAIL".


I honestly feel that the response here is influenced by a lot on how blizzard has handled this. They came clean and divulged quite a lot of info on what was taken and how it was stored.

I feel that the response would have been a lot less friendly if for example they stored their passwords in plain text (like GOMTV) or if credit card information had been taken.
BlitzerSC
Profile Joined May 2011
Italy8800 Posts
August 10 2012 11:13 GMT
#320
So these hackers now only have my email since I only have an EU account, right ?
Prev 1 14 15 16 17 18 23 Next All
Please log in or register to reply.
Live Events Refresh
Next event in 3h 41m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
Nina 166
StarCraft: Brood War
Calm 9683
TY 562
Zeus 437
PianO 379
Tasteless 242
Soma 230
Leta 94
soO 27
yabsab 16
Bale 10
Dota 2
Gorgc3309
KheZu47
League of Legends
JimRising 557
Reynor36
Counter-Strike
fl0m1731
taco 58
Other Games
summit1g11940
WinterStarcraft439
ceh9203
NeuroSwarm63
NotJumperer4
Organizations
Other Games
gamesdonequick605
Counter-Strike
PGL141
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 13 non-featured ]
StarCraft 2
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
League of Legends
• Jankos2503
• Scarra1619
• Stunt733
Upcoming Events
OSC
3h 41m
LAN Event
6h 41m
Lambo vs Harstem
FuturE vs Maplez
Scarlett vs FoxeR
Gerald vs Mixu
Zoun vs TBD
Clem vs TBD
ByuN vs TBD
TriGGeR vs TBD
Korean StarCraft League
18h 41m
CranKy Ducklings
1d 1h
LAN Event
1d 6h
IPSL
1d 9h
dxtr13 vs OldBoy
Napoleon vs Doodle
BSL 21
1d 11h
Gosudark vs Kyrie
Gypsy vs Sterling
UltrA vs Radley
Dandy vs Ptak
Replay Cast
1d 14h
Sparkling Tuna Cup
2 days
WardiTV Korean Royale
2 days
[ Show More ]
LAN Event
2 days
IPSL
2 days
JDConan vs WIZARD
WolFix vs Cross
BSL 21
2 days
spx vs rasowy
HBO vs KameZerg
Cross vs Razz
dxtr13 vs ZZZero
Replay Cast
3 days
Wardi Open
3 days
WardiTV Korean Royale
4 days
Replay Cast
5 days
Kung Fu Cup
5 days
Classic vs Solar
herO vs Cure
Reynor vs GuMiho
ByuN vs ShoWTimE
Tenacious Turtle Tussle
5 days
The PondCast
6 days
RSL Revival
6 days
Solar vs Zoun
MaxPax vs Bunny
Kung Fu Cup
6 days
WardiTV Korean Royale
6 days
Liquipedia Results

Completed

BSL 21 Points
SC4ALL: StarCraft II
Eternal Conflict S1

Ongoing

C-Race Season 1
IPSL Winter 2025-26
KCM Race Survival 2025 Season 4
SOOP Univ League 2025
YSL S2
Stellar Fest: Constellation Cup
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual

Upcoming

BSL Season 21
SLON Tour Season 2
BSL 21 Non-Korean Championship
Acropolis #4
IPSL Spring 2026
HSC XXVIII
RSL Offline Finals
WardiTV 2025
RSL Revival: Season 3
META Madness #9
BLAST Bounty Winter 2026: Closed Qualifier
eXTREMESLAND 2025
ESL Impact League Season 8
SL Budapest Major 2025
BLAST Rivals Fall 2025
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.