• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 10:42
CET 16:42
KST 00:42
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
RSL Revival - 2025 Season Finals Preview8RSL Season 3 - Playoffs Preview0RSL Season 3 - RO16 Groups C & D Preview0RSL Season 3 - RO16 Groups A & B Preview2TL.net Map Contest #21: Winners12
Community News
Weekly Cups (Dec 15-21): Classic wins big, MaxPax & Clem take weeklies3ComeBackTV's documentary on Byun's Career !10Weekly Cups (Dec 8-14): MaxPax, Clem, Cure win4Weekly Cups (Dec 1-7): Clem doubles, Solar gets over the hump1Weekly Cups (Nov 24-30): MaxPax, Clem, herO win2
StarCraft 2
General
What's the best tug of war? The Grack before Christmas Weekly Cups (Dec 15-21): Classic wins big, MaxPax & Clem take weeklies ComeBackTV's documentary on Byun's Career ! Micro Lags When Playing SC2?
Tourneys
OSC Season 13 World Championship $5,000+ WardiTV 2025 Championship $100 Prize Pool - Winter Warp Gate Masters Showdow Sparkling Tuna Cup - Weekly Open Tournament Winter Warp Gate Amateur Showdown #1
Strategy
Custom Maps
Map Editor closed ?
External Content
Mutation # 505 Rise From Ashes Mutation # 504 Retribution Mutation # 503 Fowl Play Mutation # 502 Negative Reinforcement
Brood War
General
BGH Auto Balance -> http://bghmmr.eu/ Recommended FPV games (post-KeSPA) BW General Discussion FlaSh on: Biggest Problem With SnOw's Playstyle soO on: FanTaSy's Potential Return to StarCraft
Tourneys
Small VOD Thread 2.0 [Megathread] Daily Proleagues [BSL21] LB QuarterFinals - Sunday 21:00 CET [BSL21] WB SEMIFINALS - Saturday 21:00 CET
Strategy
Simple Questions, Simple Answers Game Theory for Starcraft Current Meta Fighting Spirit mining rates
Other Games
General Games
Nintendo Switch Thread Stormgate/Frost Giant Megathread Beyond All Reason Path of Exile General RTS Discussion Thread
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Mafia Game Mode Feedback/Ideas Survivor II: The Amazon Sengoku Mafia TL Mafia Community Thread
Community
General
US Politics Mega-thread The Games Industry And ATVI Russo-Ukrainian War Thread How Does UI/UX Design Influence User Trust? Things Aren’t Peaceful in Palestine
Fan Clubs
White-Ra Fan Club
Media & Entertainment
Anime Discussion Thread [Manga] One Piece
Sports
2024 - 2026 Football Thread Formula 1 Discussion
World Cup 2022
Tech Support
Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List TL+ Announced Where to ask questions and add stream?
Blogs
National Diversity: A Challe…
TrAiDoS
I decided to write a webnov…
DjKniteX
James Bond movies ranking - pa…
Topin
Thanks for the RSL
Hildegard
Customize Sidebar...

Website Feedback

Closed Threads



Active: 2326 users

Blizzard Security Breach - Page 16

Forum Index > SC2 General
442 CommentsPost a Reply
Prev 1 14 15 16 17 18 23 Next All
Rannasha
Profile Blog Joined August 2010
Netherlands2398 Posts
August 10 2012 10:03 GMT
#301
On August 10 2012 18:54 Maluk wrote:
I'm just wondering what exactly could the "hackers" do even if they catch my password ? I mean, if someone steals my account to ladder with it I won't be to mad, and aside from that what are the risks ?


For accounts with just SC2, there's not much to be gained. WoW and D3 accounts are rather interesting though, since they contain tradeable items and currency, making it easy to strip the account of valuable commodities to be sold for actual money at some later time.
Such flammable little insects!
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 10:05 GMT
#302
On August 10 2012 18:54 Maluk wrote:
I'm just wondering what exactly could the "hackers" do even if they catch my password ? I mean, if someone steals my account to ladder with it I won't be to mad, and aside from that what are the risks ?

it isn't really with battle.net, you only really risk the standard wow/diablo account steal if your e-mail had a unique password. the real risk would be if your battle.net password happened to be your paypal password and you hadn't changed it when it came time to farm this data.

we don't like to collect risk potential. we tend to try to stomp it out even if only a minor potential threat caused by user stupidity.
Team Liquid is the used the tampon of the starcraft community.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
August 10 2012 10:06 GMT
#303
I have a question to the "experts" here.

I'm always wondering about using Brute Force stuff for this. How do you know if a password is correct unless you have it checked on the servers? I mean wouldn't someone who using that method have to register millions of BNet enquiries, which would make it easy to prevent that? Some explanation on how that stuff works would be appreciated
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
Maluk
Profile Joined August 2011
France987 Posts
August 10 2012 10:10 GMT
#304
Tank you for the answers, Rannasha and multiversed, I guess I don't have to be concerned then. SC2 only ftw
greendestiny
Profile Blog Joined May 2010
Bosnia-Herzegovina114 Posts
August 10 2012 10:12 GMT
#305
I started receiving regular fake MoP invites to my mail about 2 months ago. I believe that Blizzard was hacked around the time of D3's release, and they found out just now about it
"The trespass into our internal network was detected by us on August 4, 2012."

I remember reading official D3 forums when there was a mass of users going: "Blizz, I take every possible precaution and I lost all my gear and gold, your servers have been hacked!" and the massive amount of verbal abuse they received. They should feel vindicated now.
How I appear to you is a reflection of you, not me.
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 10:32:33
August 10 2012 10:14 GMT
#306
i will explain in broad general terms...
brute forcing is most often done with a botnet (a large network of hacked computers.) if a single user attempted to enter 5 million passwords into a server, it would to get noticed. if 200,000 computers try 1-2 times each in a controlled method, the associated IP doesn't get flagged, logged, and banned. *this more the general theory, than the actual practice...*

i'd rather not go into more detail, as this is all stupidly easy to begin with. all it really requires is teenaged angst, or the equivalent.

edit: update for clarity. account was a poor choice of words.
Team Liquid is the used the tampon of the starcraft community.
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
August 10 2012 10:16 GMT
#307
On August 10 2012 19:06 Na_Dann_Ma_GoGo wrote:
I have a question to the "experts" here.

I'm always wondering about using Brute Force stuff for this. How do you know if a password is correct unless you have it checked on the servers? I mean wouldn't someone who using that method have to register millions of BNet enquiries, which would make it easy to prevent that? Some explanation on how that stuff works would be appreciated


If you have the hash and know the algorithm, you can hash millions of possible passwords and as soon as your hash and the password hash matches, you have the correct password. No need to check with the server, it will just do the same algorithm and will consider both equal.

There are databases of password/hash combinations - called rainbow tables - where the cleartext password is already matched to the hash in the database, so you can just search for the hash and get the cleartext as result. To counteract those, it is common practice to add a "salt", i.e. some additional data, to the password which makes it harder to get the correct result in the rainbow table.

Depending on the algorithm, salt, password length, etc., there is an infinitely small chance of two different passwords generating the same hash (0.000....01%) but that actually won't matter because as long as the end result is the same, the server will still accept it as valid because it doesn't know the difference either.
Rannasha
Profile Blog Joined August 2010
Netherlands2398 Posts
August 10 2012 10:18 GMT
#308
On August 10 2012 19:12 greendestiny wrote:
I started receiving regular fake MoP invites to my mail about 2 months ago. I believe that Blizzard was hacked around the time of D3's release, and they found out just now about it
"The trespass into our internal network was detected by us on August 4, 2012."


I've been receiving these phising mails for years, so they're not really new. They tend to pop up whenever a new expansion/game is in beta. I use different email addresses for different websites and I've only ever received these fake mails on 2 addresses I used for some community websites that are known to have been compromised (since they announced it to their users). I have never received any such mail on the address I use for my Battle.net account.

I remember reading official D3 forums when there was a mass of users going: "Blizz, I take every possible precaution and I lost all my gear and gold, your servers have been hacked!" and the massive amount of verbal abuse they received. They should feel vindicated now.


Except that they're not vindicated. The people that lost their D3 account back then simply didn't have the appropriate security measures. It didn't help that Blizzard gave their SMS service that didn't work with D3 the name "SMS Authenticator", which was the main source of people saying that they did have an authenticator and still lost their account. Blizzard has since then renamed the thing to something like SMS Protect or so.
Such flammable little insects!
Dakkas
Profile Joined October 2010
2550 Posts
August 10 2012 10:26 GMT
#309
I must say it's quite contrasting when comparing SC2 gamer's response with D3 gamer's response on this Blizzard security breach. From what I see in this thread, most people are being quite objective and understanding of it however on the D3 forum, the general opinion is "LOL BLIZZARD SUX DIX SO BAD FAIL".

Fuchsteufelswild
Profile Joined October 2009
Australia2028 Posts
August 10 2012 10:28 GMT
#310
I only just changed my password a couple of months ago and I'm not playing SC2 often nowadays, so stuff it until I get reason to get them to lock it. I have no money on the account.
ZerO - FantaSy - Calm - Nal_rA - Jaedong - NaDa - EffOrt - Bisu - by.hero - StarDust - Welmu - Nerchio - Supernova - Solar - Squirtle - LosirA - Grubby - IntoTheRainbow - Golden... ~~~ Incredible Miracle and Woongjin Stars 화이팅!
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
August 10 2012 10:39 GMT
#311
@ Morfildur
Aye thanks.

But then there shouldn't be much to worry about at the moment since acquiring the algorithm should be night impossible right?
I mean it shouldn't be straight away available to the hackers and reverse engineering is one hell of a task I'd imagine.

WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 10:42 GMT
#312
that is the hope/assumption. it would take lifetimes without the key to the door. so to speak.
Team Liquid is the used the tampon of the starcraft community.
Xanthopsia
Profile Joined November 2010
Australia41 Posts
August 10 2012 10:57 GMT
#313
Very unfortunate that this happened however I'm really happy with how honest Blizzard are being telling customers exactly what information was compromised and steps to protect your account rather than avoiding what information was compromised or keeping it to themselves.

Horrible that it has happened, however kudos to Blizzard for handling it the best way possible.
paralleluniverse
Profile Joined July 2010
4065 Posts
August 10 2012 11:01 GMT
#314
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.
fishjie
Profile Blog Joined September 2010
United States1519 Posts
August 10 2012 11:05 GMT
#315
unfortunately since i use the same pw for a lot of websites including financial now i have to change /sigh
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
Last Edited: 2012-08-10 11:08:59
August 10 2012 11:07 GMT
#316
On August 10 2012 19:39 Na_Dann_Ma_GoGo wrote:
@ Morfildur
Aye thanks.

But then there shouldn't be much to worry about at the moment since acquiring the algorithm should be night impossible right?
I mean it shouldn't be straight away available to the hackers and reverse engineering is one hell of a task I'd imagine.



Companies all use standard algorithms and with some practice you can limit the amount of possible algorithms by just looking at the hash, the only factor that can make it hard is the salt and the password complexity.

The more complex the password is, the less likely it's in a rainbow table and the harder it is to brute force.

A more in-depth Explanation:
A password of length 1 that consists of only lowercase characters (a-z) has a complexity of 26^1, i.e. 26.
A password of length 1 that consists of lower- & uppercase has a complexity of 52
A password of length 1 that consists of lower- & uppercase & numbers and a selection of 50 special characters has a complexity of 112.
A password with those properties but of length 2 has a complexity of 112^2, i.e. 12 544
A password of length 10 with only lowercase characters just has a complexity of 26^10, i.e. 141 167 095 653 376
A password of length 10 with the 112 characters has a complexity of 112^10, i.e. 310 584 820 834 420 916 224

complexity means the range of possible passwords that have to be hashed to find the correct password.

If you add a salt of 10 characters from a selection of 112 characters, it suddenly becomes 112^20 which is a 40 digit number.

Now as for the actual time it takes to hash the password and brute force it, the stronger algorithms take longer than simple algorithms like MD5. You can calculate several million up to several billion ( http://www.codinghorror.com/blog/2012/04/speed-hashing.html ) MD5 hashes per second depending on your PC, so to definitively crack the lowercase-only password, it takes a few hours or at most a few days. To crack the complex password it still takes a few weeks.
Other algorithms like SHA256, etc. are slower, so it takes 10-100 times longer to brute force passwords. Add the salt and it suddenly becomes an eternity.

That is why the rainbow tables exist. Basically each lower- & uppercase only combination for passwords of up to 10-15 characters in length is included in rainbow tables which makes a search for it a matter of seconds.

Most of those that steal a huge amount of password hashes don't bother brute forcing, if it's not in the rainbow tables, they ignore those but still might sell or release those users&hashes. That means that someone who targets a specific user/group can still try to brute force the passwords.

So in summary the best way to protect your password is:
1. Have long password using special characters, numbers and a mix of upper and lower characters to maximize it's complexity
2. Hope that the one storing your password uses a strong salt
3. Hope that the one storing your password uses a strong&slow algorithm.
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 11:09:29
August 10 2012 11:07 GMT
#317
On August 10 2012 19:26 Dakkas wrote:
I must say it's quite contrasting when comparing SC2 gamer's response with D3 gamer's response on this Blizzard security breach. From what I see in this thread, most people are being quite objective and understanding of it however on the D3 forum, the general opinion is "LOL BLIZZARD SUX DIX SO BAD FAIL".


That's because a lot of people were hacked when D3 launched, because they were too stupid to protect their accounts from keyloggers and phishing scams. They blamed Blizzard. They accused Blizzard of being hacked, even though Blizzard had never been hacked at that time.

They said it was greedy and unfair they had to buy an authenticator to secure their accounts, without realizing that you don't need an authenticator if you're not stupid.

And now that Blizzard has been "hacked", they've actually been proven completely wrong. Blizzard got hacked and nothing that would allowed unauthorized access to any account has been compromised. No account will be hacked as a direct result of Blizzard getting hacked.

The D3 community -- what were you expecting from a bunch of people with no internet skills who were dumb enough to get phished and hacked?
Ganondorf
Profile Joined April 2010
Italy600 Posts
Last Edited: 2012-08-10 11:11:04
August 10 2012 11:10 GMT
#318
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..
Wroshe
Profile Joined June 2011
Netherlands1051 Posts
August 10 2012 11:10 GMT
#319
On August 10 2012 19:26 Dakkas wrote:
I must say it's quite contrasting when comparing SC2 gamer's response with D3 gamer's response on this Blizzard security breach. From what I see in this thread, most people are being quite objective and understanding of it however on the D3 forum, the general opinion is "LOL BLIZZARD SUX DIX SO BAD FAIL".


I honestly feel that the response here is influenced by a lot on how blizzard has handled this. They came clean and divulged quite a lot of info on what was taken and how it was stored.

I feel that the response would have been a lot less friendly if for example they stored their passwords in plain text (like GOMTV) or if credit card information had been taken.
BlitzerSC
Profile Joined May 2011
Italy8800 Posts
August 10 2012 11:13 GMT
#320
So these hackers now only have my email since I only have an EU account, right ?
Prev 1 14 15 16 17 18 23 Next All
Please log in or register to reply.
Live Events Refresh
Next event in 1h 18m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
SKillous 150
Livibee 138
mouzStarbuck 63
BRAT_OK 61
StarCraft: Brood War
Rain 4658
Sea 4600
Shuttle 735
EffOrt 695
ggaemo 379
Mini 203
firebathero 203
Snow 181
Barracks 125
Sharp 118
[ Show more ]
hero 95
Hyun 93
Sea.KH 77
JYJ 74
Terrorterran 36
Sexy 26
zelot 26
scan(afreeca) 15
JulyZerg 13
yabsab 13
SilentControl 12
Shine 11
Bale 9
HiyA 5
Dota 2
qojqva5050
XcaliburYe793
Fuzer 216
League of Legends
Reynor85
Counter-Strike
zeus1223
edward233
Heroes of the Storm
Khaldor204
Other Games
singsing2154
B2W.Neo655
Mlord392
crisheroes360
XaKoH 124
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 14 non-featured ]
StarCraft 2
• Light_VIP 57
• HeavenSC 35
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• Michael_bg 10
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
Dota 2
• lizZardDota2126
Upcoming Events
Big Brain Bouts
1h 18m
Elazer vs Nicoract
Reynor vs Scarlett
Replay Cast
9h 18m
Sparkling Tuna Cup
1d 18h
Krystianer vs TBD
TriGGeR vs SKillous
Percival vs TBD
ByuN vs Nicoract
OSC
2 days
Replay Cast
2 days
Wardi Open
2 days
OSC
3 days
Solar vs MaxPax
ByuN vs Krystianer
Spirit vs TBD
OSC
6 days
Liquipedia Results

Completed

KCM Race Survival 2025 Season 4
WardiTV 2025
META Madness #9

Ongoing

C-Race Season 1
IPSL Winter 2025-26
BSL Season 21
Slon Tour Season 2
CSL Season 19: Qualifier 2
eXTREMESLAND 2025
SL Budapest Major 2025
ESL Impact League Season 8
BLAST Rivals Fall 2025
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025

Upcoming

CSL 2025 WINTER (S19)
BSL 21 Non-Korean Championship
Acropolis #4
IPSL Spring 2026
Bellum Gens Elite Stara Zagora 2026
HSC XXVIII
Big Gabe Cup #3
OSC Championship Season 13
Nations Cup 2026
ESL Pro League Season 23
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.