• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 04:54
CEST 10:54
KST 17:54
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
Power Rank - Esports World Cup 202533RSL Season 1 - Final Week8[ASL19] Finals Recap: Standing Tall15HomeStory Cup 27 - Info & Preview18Classic wins Code S Season 2 (2025)16
Community News
BSL Team Wars - Bonyth, Dewalt, Hawk & Sziky teams4Weekly Cups (July 14-20): Final Check-up0Esports World Cup 2025 - Brackets Revealed19Weekly Cups (July 7-13): Classic continues to roll8Team TLMC #5 - Submission re-extension4
StarCraft 2
General
Power Rank - Esports World Cup 2025 RSL Revival patreon money discussion thread The GOAT ranking of GOAT rankings Esports World Cup 2025 - Final Player Roster Why doesnt SC2 scene costream tournaments
Tourneys
Esports World Cup 2025 Sparkling Tuna Cup - Weekly Open Tournament Sea Duckling Open (Global, Bronze-Diamond) FEL Cracov 2025 (July 27) - $8000 live event RSL: Revival, a new crowdfunded tournament series
Strategy
How did i lose this ZvP, whats the proper response
Custom Maps
External Content
Mutation # 483 Kill Bot Wars Mutation # 482 Wheel of Misfortune Mutation # 481 Fear and Lava Mutation # 480 Moths to the Flame
Brood War
General
BSL Team Wars - Bonyth, Dewalt, Hawk & Sziky teams BW General Discussion ASL20 Preliminary Maps BGH Auto Balance -> http://bghmmr.eu/ Flash Announces (and Retracts) Hiatus From ASL
Tourneys
[CSLPRO] It's CSLAN Season! - Last Chance [Megathread] Daily Proleagues [BSL 2v2] ProLeague Season 3 - Friday 21:00 CET The Casual Games of the Week Thread
Strategy
Simple Questions, Simple Answers I am doing this better than progamers do.
Other Games
General Games
Stormgate/Frost Giant Megathread Nintendo Switch Thread [MMORPG] Tree of Savior (Successor of Ragnarok) Path of Exile CCLP - Command & Conquer League Project
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Vanilla Mini Mafia
Community
General
US Politics Mega-thread Things Aren’t Peaceful in Palestine Russo-Ukrainian War Thread The Games Industry And ATVI Stop Killing Games - European Citizens Initiative
Fan Clubs
SKT1 Classic Fan Club! Maru Fan Club
Media & Entertainment
[\m/] Heavy Metal Thread Anime Discussion Thread Movie Discussion! [Manga] One Piece Korean Music Discussion
Sports
2024 - 2025 Football Thread Formula 1 Discussion TeamLiquid Health and Fitness Initiative For 2023 NBA General Discussion
World Cup 2022
Tech Support
Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List
Blogs
Ping To Win? Pings And Their…
TrAiDoS
momentary artworks from des…
tankgirl
from making sc maps to makin…
Husyelt
StarCraft improvement
iopq
Socialism Anyone?
GreenHorizons
Customize Sidebar...

Website Feedback

Closed Threads



Active: 665 users

Blizzard Security Breach - Page 5

Forum Index > SC2 General
442 CommentsPost a Reply
Prev 1 2 3 4 5 6 7 21 22 23 Next All
netherh
Profile Blog Joined November 2011
United Kingdom333 Posts
August 09 2012 23:30 GMT
#81
It's lucky they don't do anything stupid like make all the passwords case insensitive... Oh wait.
-RusH
Profile Joined June 2012
United States240 Posts
August 09 2012 23:31 GMT
#82
I can't seem to find how to edit the secret question/answer. Anyone know where?
Life..
Eufouria
Profile Blog Joined March 2011
United Kingdom4425 Posts
Last Edited: 2012-08-09 23:32:10
August 09 2012 23:31 GMT
#83
On August 10 2012 08:26 R1CH wrote:
Show nested quote +
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?

Its so bad nobody would ever use it, so hackers won't even try it. Metagame.

So can we all expect to be added to a bunch more spam email lists because of this?
BadgerBadger8264
Profile Joined March 2011
Netherlands409 Posts
Last Edited: 2012-08-09 23:35:57
August 09 2012 23:32 GMT
#84
On August 10 2012 08:26 R1CH wrote:
Show nested quote +
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?


Typically passwords are hashed in combination with a username and other information. You can't simply hash "password123" and have thousands of results turn up. You'd have to know the hashing algorithm used by Blizzard, then for every individual user, hash "password123" and compare it to the stored hash. That still obviously wouldn't take a month to do with a single password, so you're right that it is probably feasible to do that for very common passwords and obtain a good amount of accounts. Still, if your password is even remotely unique, they will never realistically obtain it.
sour_eraser
Profile Joined March 2011
Canada932 Posts
Last Edited: 2012-08-09 23:34:21
August 09 2012 23:32 GMT
#85
Ehh. Doesnt really affect me much considering I have diff passwords for all my email and other games. lol
But I want to know if we need to know Previous Answer to Secret Question when they force us change it into new one. I forgot mine :/
"What's the f*cking point of censoring a letter if everyone and their mother knows what it stands for.... F*cking morons"
VPVanek
Profile Joined August 2010
Canada238 Posts
August 09 2012 23:33 GMT
#86
Well I guess I am changing my password now ahahah
FoXer
Crying
Profile Joined February 2011
Bulgaria778 Posts
August 09 2012 23:33 GMT
#87
On August 10 2012 08:31 -RusH wrote:
I can't seem to find how to edit the secret question/answer. Anyone know where?

i think the security question is not changeable.
Determination~ Hard Work Surpass NATURAL GENIUS!
thatsundowner
Profile Joined July 2011
Canada312 Posts
August 09 2012 23:33 GMT
#88
On August 10 2012 08:30 netherh wrote:
It's lucky they don't do anything stupid like make all the passwords case insensitive... Oh wait.


if somebody gets the password case sensitivity is irrelevant and brute forcing is not how the vast majority of stolen b.net accounts are taken. it's kind of an irrelevant thing, and not a big deal at all that they don't do it
"you're gonna fail" in latin
entropius
Profile Joined June 2010
United States1046 Posts
August 09 2012 23:37 GMT
#89
On August 10 2012 08:26 R1CH wrote:
Show nested quote +
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?


Wouldn't salting the hashes make this sort of thing impossible? I have in mind the sort of attack where the attacker computes the hash of "password123" and compares it to all the hashes to see if it matches any of them (which is only O(log N)), which would be foiled by salts -- in that case they've got to do the hash algorithm N times instead of just once to check N hashes against each dictionary word. Of course, if the passwords are suitably weak then you can probably afford this -- just check the simplest ones against all of them.

It's been a while since I studied this stuff, of course, so I could be wrong.
IM_Junior
Profile Joined April 2012
Mexico29 Posts
August 09 2012 23:38 GMT
#90
Thx in advance, password changed just to be safe for the moment !!!!
Zerg for life !!! --- DRG / Stephano / Leenock / Life and Nesteaaaaaa
Silidons
Profile Blog Joined September 2010
United States2813 Posts
August 09 2012 23:39 GMT
#91
I noticed that in the past 2 days or so, I went from getting ~5 spam mail a day on my bnet email to 20. I have an Auth and use different PW's for different things, but now I gotta change it >_<
"God fights on the side with the best artillery." - Napoleon Bonaparte
Maluk
Profile Joined August 2011
France987 Posts
Last Edited: 2012-08-09 23:43:52
August 09 2012 23:39 GMT
#92
Does anyone know if my credit card number is somewhere in Blizzard's datas if I used it only to buy StarCraft 2, and not for any monthly payment ?
Edit : Yes, my question probably sounds pretty noob but I am clueless concerning hacks t.t
ROOTIllusion
Profile Blog Joined August 2010
United States1060 Posts
August 09 2012 23:40 GMT
#93
Didnt something like this happen a year or so ago? damn hackers
www.twitter.com/rootillusion & www.facebook.com/illusionsc2
jnkw
Profile Joined November 2010
Canada347 Posts
August 09 2012 23:42 GMT
#94
On August 10 2012 08:37 entropius wrote:
Show nested quote +
On August 10 2012 08:26 R1CH wrote:
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?


Wouldn't salting the hashes make this sort of thing impossible? I have in mind the sort of attack where the attacker computes the hash of "password123" and compares it to all the hashes to see if it matches any of them (which is only O(log N)), which would be foiled by salts -- in that case they've got to do the hash algorithm N times instead of just once to check N hashes against each dictionary word. Of course, if the passwords are suitably weak then you can probably afford this -- just check the simplest ones against all of them.

It's been a while since I studied this stuff, of course, so I could be wrong.


Given that there exist many extremely common passwords like 'password', it is not unreasonable to assume that rainbow tables might exist for a large number of possible salts per common password.
EleanorRIgby
Profile Joined March 2008
Canada3923 Posts
August 09 2012 23:43 GMT
#95
damn this sucks but i think hackers usually go for wow/d3 accounts, sc2 accounts are probably the least profitable
savior did nothing wrong
Kambing
Profile Joined May 2010
United States1176 Posts
August 09 2012 23:43 GMT
#96
On August 10 2012 08:37 entropius wrote:
Show nested quote +
On August 10 2012 08:26 R1CH wrote:
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?


Wouldn't salting the hashes make this sort of thing impossible? I have in mind the sort of attack where the attacker computes the hash of "password123" and compares it to all the hashes to see if it matches any of them (which is only O(log N)), which would be foiled by salts -- in that case they've got to do the hash algorithm N times instead of just once to check N hashes against each dictionary word. Of course, if the passwords are suitably weak then you can probably afford this -- just check the simplest ones against all of them.

It's been a while since I studied this stuff, of course, so I could be wrong.


Not necessarily, e.g., http://www.openwall.com/john/.

Passwords in practice are frequently suitably weak and amendable to cracking (e.g., via a dictionary attack). Knowing how the passwords were salted --- or at least narrowing it down to a small set of salting schemes --- makes things more tractable as well.

So theoretically intractable. Practically hard to do, but not impossible.
Pufftrees
Profile Joined March 2009
2449 Posts
August 09 2012 23:43 GMT
#97

This is just... unacceptable. What the flux.

+ Show Spoiler +
Blizzard is such a joke
Chance favors the prepared mind.
RoyGBiv_13
Profile Blog Joined August 2010
United States1275 Posts
August 09 2012 23:45 GMT
#98
I went to a talk at DEFCON about fuzzing d3, where they showed just how secure blizzard's password system is. I would not be worried about them breaking you password hash (a properly salted and hashed password is a difficult thing to unravel). The security questions are a real risk though.
Any sufficiently advanced technology is indistinguishable from magic
Dingobloo
Profile Blog Joined September 2010
Australia1903 Posts
Last Edited: 2012-08-09 23:46:54
August 09 2012 23:45 GMT
#99
On August 10 2012 08:37 entropius wrote:
Show nested quote +
On August 10 2012 08:26 R1CH wrote:
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?


Wouldn't salting the hashes make this sort of thing impossible? I have in mind the sort of attack where the attacker computes the hash of "password123" and compares it to all the hashes to see if it matches any of them (which is only O(log N)), which would be foiled by salts -- in that case they've got to do the hash algorithm N times instead of just once to check N hashes against each dictionary word. Of course, if the passwords are suitably weak then you can probably afford this -- just check the simplest ones against all of them.

It's been a while since I studied this stuff, of course, so I could be wrong.


They actually tell us the method by which they encrypt the passwords in the faq:

http://en.wikipedia.org/wiki/Secure_Remote_Password_protocol

It includes the username, password, salt and an unspecified hash function, so dictionary attacks aren't likely to be a problem.

Again, no guarantee's but they seem to have done due diligence with regards to making getting the actual password very difficult given just the hash.
Kambing
Profile Joined May 2010
United States1176 Posts
August 09 2012 23:45 GMT
#100
On August 10 2012 08:43 EleanorRIgby wrote:
damn this sucks but i think hackers usually go for wow/d3 accounts, sc2 accounts are probably the least profitable


Likely that they can't differentiate without cracking the account. And besides, your email address and secret answers can be enough to do damage. For example, some (badly designed) sites will let your reset a password immediately after you successfully answer a secret question without sending email to your account first.
Prev 1 2 3 4 5 6 7 21 22 23 Next All
Please log in or register to reply.
Live Events Refresh
Next event in 1h 6m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
ProTech65
Harstem 15
StarCraft: Brood War
Nal_rA 13855
Hyuk 3357
Zeus 1218
ToSsGirL 281
EffOrt 125
Leta 83
Sacsri 67
Backho 33
Sharp 25
ajuk12(nOOB) 19
[ Show more ]
NaDa 19
ivOry 2
Britney 0
Dota 2
XcaliburYe213
BananaSlamJamma125
Counter-Strike
Stewie2K683
Other Games
summit1g5400
ceh9697
SortOf99
Organizations
Other Games
gamesdonequick1118
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 13 non-featured ]
StarCraft 2
• Berry_CruncH494
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
Dota 2
• WagamamaTV225
• lizZardDota274
Upcoming Events
Esports World Cup
1h 6m
ByuN vs Zoun
SHIN vs TriGGeR
Cyan vs ShoWTimE
Rogue vs HeRoMaRinE
Clem vs Solar
Reynor vs Maru
herO vs Cure
Serral vs Classic
Esports World Cup
1d 1h
Esports World Cup
2 days
CranKy Ducklings
3 days
BSL20 Non-Korean Champi…
3 days
CSO Cup
3 days
BSL20 Non-Korean Champi…
3 days
Bonyth vs Sziky
Dewalt vs Hawk
Hawk vs QiaoGege
Sziky vs Dewalt
Mihu vs Bonyth
Zhanhun vs QiaoGege
QiaoGege vs Fengzi
FEL
4 days
BSL20 Non-Korean Champi…
4 days
BSL20 Non-Korean Champi…
4 days
Bonyth vs Zhanhun
Dewalt vs Mihu
Hawk vs Sziky
Sziky vs QiaoGege
Mihu vs Hawk
Zhanhun vs Dewalt
Fengzi vs Bonyth
[ Show More ]
Sparkling Tuna Cup
6 days
Online Event
6 days
Liquipedia Results

Completed

CSL Xiamen Invitational
Championship of Russia 2025
Murky Cup #2

Ongoing

Copa Latinoamericana 4
Jiahua Invitational
BSL20 Non-Korean Championship
Esports World Cup 2025
CC Div. A S7
Underdog Cup #2
IEM Cologne 2025
FISSURE Playground #1
BLAST.tv Austin Major 2025
ESL Impact League Season 7
IEM Dallas 2025
PGL Astana 2025
Asian Champions League '25

Upcoming

CSLPRO Last Chance 2025
CSLPRO Chat StarLAN 3
BSL Season 21
RSL Revival: Season 2
SEL Season 2 Championship
uThermal 2v2 Main Event
FEL Cracov 2025
HCC Europe
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.