|
On August 10 2012 09:31 xrapture wrote: My email:
Decado@writing.com
Password:
teehee12
Do whatever the fuck you want.
So many pussies crying over nothing. This guy is super tough. What a tough guy.
|
oh, not good :-(
Ty for heads up
|
On August 10 2012 08:54 Dingobloo wrote:Show nested quote +On August 10 2012 08:48 Bagration wrote: Hmm, so everyone outside of China was hit? Interesting
So could we infer that the hackers are based from China, or is that just simply a red herring to scapegoat? The hacker could very well be from china, but I don't think you can infer that from the information, blizzard gets a different company to run all of it's mainland china business and they probably have seperate authentication servers that weren't hit.
Yeah, true. I just hope the hacker does get due punishment. I just found it interesting that China was spared.
|
On August 10 2012 09:31 xrapture wrote: My email:
Decado@writing.com
Password:
teehee12
Do whatever the fuck you want.
So many pussies crying over nothing.
now this guy is a real man
justin
lol
|
Well I was due for a password change so this is a good time to do it.
|
On August 10 2012 09:33 zergrushkekeke wrote:Show nested quote +On August 10 2012 09:17 v3chr0 wrote: My password is pretty crazy, I think I'll be alright. Will be changing my secret q/a when prompted though. That is not how passwords work, if you have a crazy long and difficult password and someone steals it, they don't care how long or complicated it is, they will more likely be copy/pasting it. And to the other post about using a webpage to check how secure your password is, i seriously hope you didn't use your real one, how secure is a secret you told someone about to see if they have heard it? I also gave them my email to make sure they wouldn't have to bother finding it otherwise. Then I sent them my SSnumber and a photocopy of my passboard.
Also, no one has stolen anyone's password through blizzard since they aren't stupid enough to store them as plain text (take that sony!) They got a hashed version, so a more secure password will indeed help you against getting hacked.
|
I loved that password I used there (and like, everywhere else
Damnit
|
Eh no biggie as long as people change their passwords and aren't stupid.
|
Does this tie in with me getting an email from Blizzard saying that they think I'm trying to sell my WoW account (when I don't even have one) then linking me to a random page? Or is that something different?
|
On August 10 2012 09:33 Serpico wrote:Show nested quote +On August 10 2012 09:31 xrapture wrote: My email:
Decado@writing.com
Password:
teehee12
Do whatever the fuck you want.
So many pussies crying over nothing. This guy is super tough. What a tough guy.
rofl
|
On August 10 2012 08:03 zhurai wrote:Show nested quote +On August 10 2012 08:02 larse wrote: "outside of China."
LOL. Blizzard so implicitly points out suspect's location. narrows down so many countries!
It's because China has their own servers and own operation. This has something to do with the distributor of starcraft in china
|
Let's hope it stops here, and we don't get a PSN redux. God, it seems there's so many of these incidents these days. Has it always been like this, or is it just happening now because some jackasses showed it was possible, and, indeed, easy?
|
Does un-checking the little box that says "Remember payment information" help at all with this sort of thing? Or is it gonna be in their database anyway?
|
On August 10 2012 09:43 RiceAgainst wrote: Does this tie in with me getting an email from Blizzard saying that they think I'm trying to sell my WoW account (when I don't even have one) then linking me to a random page? Or is that something different?
That's an age old phishing scam. It's not really from Blizzard even though sometimes they look really convincing. When Blizzard thinks you've sold/are selling an account they just outright ban you, they don't bother telling you that they suspect you.
|
Times like this make me happy to have KeePass ^_^
|
I wonder if this has anything to do with D3's RMAH?
|
As an PSN user, I had to changed my passwords then GomTV comes along and now Blizzard. Got damn hackers, LEAVE ME ALONE . Thanks for the heads up though.
|
On August 10 2012 07:34 juicyjames wrote: When did Blizzard learn of the unauthorized access? The trespass into our internal network was detected by us on August 4, 2012.
Why did Blizzard announce this on August 9? We were debating whether to sweep it under the rug or not.
But seriously, what is the reason for taking such a long time?
|
On August 10 2012 09:52 Monochromatic wrote: I wonder if this has anything to do with D3's RMAH?
Blizz has probably been under steady attack since WoW came out.
|
On August 10 2012 08:37 entropius wrote:Show nested quote +On August 10 2012 08:26 R1CH wrote:On August 10 2012 08:22 BadgerBadger8264 wrote:On August 10 2012 07:38 Probe1 wrote: So change your passwords. Got it.
(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?") Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though. I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that? Wouldn't salting the hashes make this sort of thing impossible? I have in mind the sort of attack where the attacker computes the hash of "password123" and compares it to all the hashes to see if it matches any of them (which is only O(log N)), which would be foiled by salts -- in that case they've got to do the hash algorithm N times instead of just once to check N hashes against each dictionary word. Of course, if the passwords are suitably weak then you can probably afford this -- just check the simplest ones against all of them. It's been a while since I studied this stuff, of course, so I could be wrong. Even with salts, the general population pick terrible passwords. Look at analysis done of previous leaks such as this one: https://www.computerworld.com/s/article/9147138/Users_still_make_hacking_easy_with_weak_passwords?
According to Imperva, about 30% of the passwords in the hacked list were six characters or smaller, while 60% were passwords created from a limited set of alphanumeric characters. Nearly 50% of the users had used easily guessable names, common slang words, adjacent keyboard keys and consecutive digits as their passwords.
|
|
|
|