• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 03:43
CEST 09:43
KST 16:43
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
Serral wins EWC 202538Tournament Spotlight: FEL Cracow 202510Power Rank - Esports World Cup 202580RSL Season 1 - Final Week9[ASL19] Finals Recap: Standing Tall15
Community News
Weekly Cups (Jul 28-Aug 3): herO doubles up3LiuLi Cup - August 2025 Tournaments3[BSL 2025] H2 - Team Wars, Weeklies & SB Ladder10EWC 2025 - Replay Pack4Google Play ASL (Season 20) Announced55
StarCraft 2
General
Weekly Cups (Jul 28-Aug 3): herO doubles up How to leave Master league - bug fix? Serral wins EWC 2025 The GOAT ranking of GOAT rankings Interview with Chris "ChanmanV" Chan
Tourneys
Sparkling Tuna Cup - Weekly Open Tournament LiuLi Cup - August 2025 Tournaments Sea Duckling Open (Global, Bronze-Diamond) TaeJa vs Creator Bo7 SC Evo Showmatch FEL Cracov 2025 (July 27) - $10,000 live event
Strategy
Custom Maps
External Content
Mutation # 485 Death from Below Mutation # 484 Magnetic Pull Mutation #239 Bad Weather Mutation # 483 Kill Bot Wars
Brood War
General
Air Canad Telefono MX¿Cómo llamar a Air Canada des Nobody gona talk about this year crazy qualifiers? [BSL 2025] H2 - Team Wars, Weeklies & SB Ladder How do the new Battle.net ranks translate? BSL Team Wars - Bonyth, Dewalt, Hawk & Sziky teams
Tourneys
[ASL20] Online Qualifiers Day 2 [Megathread] Daily Proleagues Cosmonarchy Pro Showmatches [ASL20] Online Qualifiers Day 1
Strategy
[G] Mineral Boosting Muta micro map competition Does 1 second matter in StarCraft? Simple Questions, Simple Answers
Other Games
General Games
Stormgate/Frost Giant Megathread Total Annihilation Server - TAForever Nintendo Switch Thread Beyond All Reason [MMORPG] Tree of Savior (Successor of Ragnarok)
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Vanilla Mini Mafia
Community
General
US Politics Mega-thread European Politico-economics QA Mega-thread 9/11 Anniversary Possible Al Qaeda Attack on 9/11 Things Aren’t Peaceful in Palestine
Fan Clubs
INnoVation Fan Club SKT1 Classic Fan Club!
Media & Entertainment
[Manga] One Piece Anime Discussion Thread [\m/] Heavy Metal Thread Movie Discussion! Korean Music Discussion
Sports
Formula 1 Discussion 2024 - 2025 Football Thread TeamLiquid Health and Fitness Initiative For 2023
World Cup 2022
Tech Support
Gtx660 graphics card replacement Installation of Windows 10 suck at "just a moment" Computer Build, Upgrade & Buying Resource Thread
TL Community
TeamLiquid Team Shirt On Sale The Automated Ban List
Blogs
ASL S20 English Commentary…
namkraft
The Link Between Fitness and…
TrAiDoS
momentary artworks from des…
tankgirl
from making sc maps to makin…
Husyelt
StarCraft improvement
iopq
Socialism Anyone?
GreenHorizons
Customize Sidebar...

Website Feedback

Closed Threads



Active: 620 users

Blizzard Security Breach

Forum Index > SC2 General
442 CommentsPost a Reply
Normal
juicyjames *
Profile Joined August 2011
United States3815 Posts
Last Edited: 2012-08-09 22:45:34
August 09 2012 22:34 GMT
#1
http://us.blizzard.com/en-us/securityupdate.html

Players and Friends,

Even when you are in the business of fun, not every week ends up being fun. This week, our security team found an unauthorized and illegal access into our internal network here at Blizzard. We quickly took steps to close off this access and began working with law enforcement and security experts to investigate what happened.

At this time, we’ve found no evidence that financial information such as credit cards, billing addresses, or real names were compromised. Our investigation is ongoing, but so far nothing suggests that these pieces of information have been accessed.

Some data was illegally accessed, including a list of email addresses for global Battle.net users, outside of China. For players on North American servers (which generally includes players from North America, Latin America, Australia, New Zealand, and Southeast Asia) the answer to the personal security question, and information relating to Mobile and Dial-In Authenticators were also accessed. Based on what we currently know, this information alone is NOT enough for anyone to gain access to Battle.net accounts.

We also know that cryptographically scrambled versions of Battle.net passwords (not actual passwords) for players on North American servers were taken. We use Secure Remote Password protocol (SRP) to protect these passwords, which is designed to make it extremely difficult to extract the actual password, and also means that each password would have to be deciphered individually. As a precaution, however, we recommend that players on North American servers change their password. Please click this link to change your password. Moreover, if you have used the same or similar passwords for other purposes, you may want to consider changing those passwords as well.

In the coming days, we'll be prompting players on North American servers to change their secret questions and answers through an automated process. Additionally, we'll prompt mobile authenticator users to update their authenticator software. As a reminder, phishing emails will ask you for password or login information. Blizzard Entertainment emails will never ask for your password. We deeply regret the inconvenience to all of you and understand you may have questions. Please find additional information here.

We take the security of your personal information very seriously, and we are truly sorry that this has happened.

Sincerely,
Mike Morhaime

+ Show Spoiler [FAQs] +
Is there anything that players need to do right now to protect themselves?
While there is currently no evidence that any of the password or player data has been misused, we encourage our North American players to change their passwords. Click here to login and change your password.

In the coming days we will implement an automated process for all users to change their secret questions and answers, as a precautionary measure. We'll also prompt mobile authenticator users to update their authenticator software.

Additionally, while Blizzard has no indication that any of your information was shared with any other unauthorized parties or that there has been any unauthorized use of your data, we urge all members of our community to closely monitor all of their online accounts.

Players should also be wary of fraudulent emails (phishing). Unfortunately, because email addresses were exposed, it is entirely possible that this could result in an increased, targeted phishing campaign being sent to our users. Check this page for tips on how to spot and avoid these types of fraudulent emails.

What data was affected?
Here's a summary of the data that we know was illegally accessed:

North American-based accounts, including players from Latin America, Australia, New Zealand, and Southeast Asia
  • Email addresses
  • Answers to secret security questions
  • Cryptographically scrambled versions of passwords (not actual passwords)
  • Information associated with the Mobile Authenticator
  • Information associated with the Dial-in Authenticator
  • Information associated with Phone Lock, a security system associated with Taiwan accounts only
Accounts from all global regions outside of China (including Europe and Russia)
  • Email addresses
China-based accounts
  • Unaffected
At this time, there’s no evidence that financial information of any kind has been accessed. This includes credit cards, billing addresses, names, or other payment information.

What information related to Mobile and Dial-In Authenticators was exposed? What about Phone Lock?
With regard to Dial-In Authenticators, hashed (not actual) phone numbers were accessed. This is phone data from the relatively small number of people who opted into the program.

With regard to Mobile Authenticators, information was taken that could potentially compromise the integrity of North American Mobile Authenticators. We have no evidence that other regions were affected. We are working quickly to provide software updates to users. Back to top

Additionally we believe the integrity of the physical authenticators remains intact.

The information relating to Phone Lock represents a small number of hashed (not actual) phone numbers from Taiwanese players who opted into this service and had a North American Battle.net account.

Was the physical authenticator compromised?
We believe the integrity of the physical authenticators remains intact.

How did this happen?
Like all companies doing business online, it is not an uncommon occurrence to experience outside parties trying to illegitimately gain access to the operation’s structure at some level. We are continually upgrading our security technologies, policies, protocols and procedures to protect our customers and our games against the threats that increasingly arise in today’s online world.

When did Blizzard learn of the unauthorized access?
The trespass into our internal network was detected by us on August 4, 2012.

Why did Blizzard announce this on August 9?
We worked around the clock since we discovered the unauthorized user to determine the nature of the trespass and understand what data was accessed. Our first priority was to re-secure our network, and from there we worked simultaneously on the investigation and on informing our global player base. We wanted to strike a balance between speed and accuracy in our reporting and worked diligently to serve both equally important needs.

What action has Blizzard taken?
Upon learning of the unauthorized access, we worked quickly to re-secure our network. Afterward, we immediately notified law enforcement as well as security experts and launched an ongoing investigation to determine what had occurred. We also took steps to notify players, which happened in a matter of days from the time we discovered the illegal access.

Was any personal or financial information accessed?
At this time, there is no evidence that financial information was affected or accessed. There's also no evidence that personal information such as real names or billing addresses were accessed.

What can you tell us about the scrambled passwords that were accessed?
Cryptographically scrambled versions of passwords for North American players were accessed, protected by Secure Remote Password (SRP) protocol. This information alone doesn't give unauthorized users the actual passwords -- each password would need to be deciphered individually. The added layer of protection from SRP makes that process computationally very difficult and expensive.

Why not immediately invalidate the secret questions and answers that were compromised?
This was a difficult decision to make but in the end we believe that keeping the secret questions and answers in place still provides a layer of security against unauthorized users who don't have access to the compromised data. In the meantime, we are working quickly to create a mechanism for players to change the secret question and answer on their account. Our customer service staff will also know to use additional measures to verify player identities and not rely solely on secret question and answer.

Why not immediately revoke the mobile authenticators?
Similar to the decision surrounding secret question and answer, we still believe that keeping mobile authenticators active provides a layer of security against unauthorized users who don't have access to the compromised data. In fact, the mobile authenticator information by itself won't grant access to a Battle.net account -- that still requires the actual password as well. We are working quickly to deploy new mobile authenticator software and will notify players to update as soon as it's available.

Are you taking additional security measures as a result of this occurrence?
We are continually upgrading our security technologies, policies, protocols and procedures to help protect our customers and our games, and will continue to monitor the situation closely.

Teams have also been working around the clock in an ongoing investigation with law enforcement and security experts, to gain a more detailed understanding of what happened. As we conclude the investigation there will be lessons learned that can help strengthen our security going forward.
Facebook Twitter Reddit
This Week in SC2Find out what happened 'This Week in Starcraft 2': http://www.teamliquid.net/forum/viewmessage.php?topic_id=278126
Probe1
Profile Blog Joined August 2010
United States17920 Posts
August 09 2012 22:38 GMT
#2
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")
우정호 KT_VIOLET 1988 - 2012 While we are postponing, life speeds by
Pinski
Profile Joined September 2010
United States126 Posts
August 09 2012 22:39 GMT
#3
I wondered why I was getting these random spam SMS from Blizzard about my account a week or so ago.
GabrielB
Profile Joined February 2003
Brazil594 Posts
August 09 2012 22:39 GMT
#4
Thanks for the heads up... Should be in the community spotlight.
Scurvy
Profile Joined March 2012
United States117 Posts
August 09 2012 22:40 GMT
#5
Not good
With it or on it.
Plexa
Profile Blog Joined October 2005
Aotearoa39261 Posts
August 09 2012 22:42 GMT
#6
Oh dear.
Administrator~ Spirit will set you free ~
mataxp
Profile Blog Joined October 2011
Chile538 Posts
Last Edited: 2012-08-09 22:43:21
August 09 2012 22:42 GMT
#7
As a PSN user, dejá vu
Liquid.Hero Startale.Bomber MVP.Dongraegu
Brett
Profile Blog Joined October 2002
Australia3820 Posts
August 09 2012 22:43 GMT
#8
Thanks for posting this!
Hokay
Profile Joined May 2007
United States738 Posts
August 09 2012 22:43 GMT
#9
Noooo not my secret questions! A lot of sites ask the same secret security questions :X
zakmaa
Profile Blog Joined November 2010
Canada525 Posts
August 09 2012 22:44 GMT
#10
Damn. Well, at least Blizzard has a lot of resources at hand to make the issue go away as fast as possible. Glad they're being transparent (or are they?) about it
nooboon
Profile Blog Joined July 2011
2602 Posts
August 09 2012 22:44 GMT
#11
On August 10 2012 07:39 GabrielB wrote:
Thanks for the heads up... Should be in the community spotlight.


This. Even if nothing happens it is much better to be safe then sorry.
Mrvoodoochild1
Profile Joined June 2011
United States1439 Posts
August 09 2012 22:45 GMT
#12
Hackers who steal and sell personal info are the biggest pieces of shit on the internet.
"let your freak flag fly"
-niL
Profile Joined January 2012
Canada1131 Posts
August 09 2012 22:45 GMT
#13
Luckily for me, my accounts are ones that I bought from my friends
Fluffboll
Profile Joined May 2011
Sweden516 Posts
August 09 2012 22:45 GMT
#14
Things like this will happen, there are exxtraordinary good hacker groups out there and no security will ever protect completly against them.

Just make some safety changes to your accounts (like changing pw, Secret Q&A etc.) and all will most likely be fine.
No reason to panic or bitch/whine about it.
You need to construct additional pylons.
Spec
Profile Blog Joined July 2009
Taiwan931 Posts
August 09 2012 22:45 GMT
#15
Thank God I don't have my credit card number on my account. I'm just not gonna change my password again, I ran out of ideas.
Eye for an eye make the world go blind - Gandhi
PresenceSc2
Profile Joined February 2011
Australia4032 Posts
August 09 2012 22:45 GMT
#16
I guess the same guy that made BattleNet also does Blizzards security

BA DOM TSSSSS
Stephano//HerO//TaeJa//Squirtle//Bomber
Dodgin
Profile Blog Joined July 2011
Canada39254 Posts
August 09 2012 22:45 GMT
#17
Well I use a physical authenticator so I should be okay, might as well change my password just to be safe.
AzBozz
Profile Joined April 2011
Germany518 Posts
August 09 2012 22:46 GMT
#18
im glad i live in Europe
MMA | MVP|Teaja|Polt|MKP|Byun|Maru|Thorzain|Creator|HasuObs|Socke|Lucifron|Vortix|Mana|Heromarine / PRIME and Mousesports fighting!!
MstrJinbo
Profile Joined March 2011
United States1251 Posts
August 09 2012 22:46 GMT
#19
On August 10 2012 07:42 mataxp wrote:
As a PSN user, dejá vu


Doesn't sound as bad as the PSN breach. Just Emails and hashed passwords being compromised. That being said I'm still changing my password.
Xiphos
Profile Blog Joined July 2009
Canada7507 Posts
August 09 2012 22:47 GMT
#20
On August 10 2012 07:39 GabrielB wrote:
Thanks for the heads up... Should be in the community spotlight.


Thx for the heads up indeed. And I do concur with the second half of that quote.

2014 - ᕙ( •̀ل͜•́) ϡ Raise your bows brood warriors! ᕙ( •̀ل͜•́) ϡ
czylu
Profile Joined June 2012
477 Posts
August 09 2012 22:47 GMT
#21
On August 10 2012 07:42 mataxp wrote:
As a PSN user, dejá vu


Atleast the passwords were encrypted.
Euronyme
Profile Joined August 2010
Sweden3804 Posts
August 09 2012 22:47 GMT
#22
Oh gosh... Well at least they only got the email. I guess I'll have a lot more spam coming my way ^^
I bet i can maı̸̸̸̸̸̸̸̸̸̸̸̸̸̸̸̸̸̸̨̨̨̨̨̨ke you wipe your screen.
RampagePimp
Profile Joined October 2011
United States29 Posts
August 09 2012 22:47 GMT
#23
So your saying HOTS will be delayed even more?!? Great lol
mrhobbers
Profile Joined August 2010
109 Posts
August 09 2012 22:49 GMT
#24
Maybe this is the reason I got a shit ton of spam this morning on my e-mail
Kurumi
Profile Blog Joined April 2010
Poland6130 Posts
August 09 2012 22:50 GMT
#25
So nothing "interesting" was accessed by the crackers? Weird.
I work alone. // Visit TL Mafia subforum!
An2quamaraN
Profile Joined March 2011
Poland379 Posts
August 09 2012 22:50 GMT
#26
On August 10 2012 07:34 juicyjames wrote:
We use Secure Remote Password protocol (SRP) to protect these passwords, which is designed to make it extremely difficult to extract the actual password



I remember Sony saying the same about their new discs...which were broken by hackers the day after.

Really, there is no protection technology that hackers can't break. It's only a matter of
do they care enough to break it. So, basically, all hackers need to success is to breach to the network. What they did in this case.

Therefore, changing passwords is the only protection.
SomeONEx
Profile Joined April 2011
Sweden641 Posts
August 09 2012 22:51 GMT
#27
I feel bad for you guys in North America, I really do
This might not be a time to talk about happiness, but I'm a tiny bit relived that this didn't also include EU as I have the same password for almost everything

Still, if anyone can fix this fast (with the law, i.e not mafia) it's probably Blizzard. My hearts to you in America <3
BW hwaiting!
An2quamaraN
Profile Joined March 2011
Poland379 Posts
August 09 2012 22:54 GMT
#28
On August 10 2012 07:50 Kurumi wrote:
So nothing "interesting" was accessed by the crackers? Weird.


They say that cause they want you to think that hackers can't use information they actually stolen. In reality, they could very well know your password already. All you need to decrypt an encrypted pass is a good machine.
FataLe
Profile Joined November 2010
New Zealand4501 Posts
August 09 2012 22:54 GMT
#29
I wonder just how encrypted our passwords are..
hi. big fan.
Blazinghand *
Profile Blog Joined December 2010
United States25552 Posts
Last Edited: 2012-08-09 22:55:01
August 09 2012 22:54 GMT
#30
Better go change my password! >.>

E: Probably should start using more different passwords for different services too
When you stare into the iCCup, the iCCup stares back.
TL+ Member
Rannasha
Profile Blog Joined August 2010
Netherlands2398 Posts
August 09 2012 22:55 GMT
#31
On August 10 2012 07:54 An2quamaraN wrote:
Show nested quote +
On August 10 2012 07:50 Kurumi wrote:
So nothing "interesting" was accessed by the crackers? Weird.


They say that cause they want you to think that hackers can't use information they actually stolen. In reality, they could very well know your password already. All you need to decrypt an encrypted pass is a good machine.


That's not really true. There are plenty of secure hashing/encryption routines that require a large cluster of computers to break through in a reasonable amount of time. Any somewhat sensible company will use encryption that is at least strong enough to not make it economically viable to bruteforce it.
Such flammable little insects!
ZerguufOu
Profile Joined December 2011
United States107 Posts
August 09 2012 22:56 GMT
#32
ok someone hacked into my high masters account, played a few games and got me demoted to platinum. I demand a promotion.
FataLe
Profile Joined November 2010
New Zealand4501 Posts
August 09 2012 22:56 GMT
#33
what a nightmare. not nearly as bad as the psn breach but even so. poor blizzart.
hi. big fan.
Nazeron
Profile Joined September 2010
Canada1046 Posts
August 09 2012 22:57 GMT
#34
Not good, hopefully it doesnt turn into PSN type of deal
(╯°□°)╯︵ ┻━┻ ¯\_(ツ)_/¯
Skullflower
Profile Joined July 2010
United States3779 Posts
August 09 2012 22:57 GMT
#35
Well it would appear that it is time to finally change my bnet password.
The ruminations are mine, let the world be yours.
Fluffboll
Profile Joined May 2011
Sweden516 Posts
August 09 2012 22:58 GMT
#36
On August 10 2012 07:56 ZerguufOu wrote:
ok someone hacked into my high masters account, played a few games and got me demoted to platinum. I demand a promotion.


I will aid you in your quest! This needs to be fixed ASAP!
You need to construct additional pylons.
kochanfe
Profile Joined July 2011
Micronesia1338 Posts
August 09 2012 22:58 GMT
#37
sheesh...
"The flame that burns twice as bright burns half as long." - Lao Tzu
mrjpark
Profile Joined March 2011
United States276 Posts
August 09 2012 23:00 GMT
#38
On August 10 2012 07:43 Hokay wrote:
Noooo not my secret questions! A lot of sites ask the same secret security questions :X


This is awkward. I never remember the answer to my secret questions. But some complete stranger might...maybe I can finally access my old XBox Live account if I can find a way to contact this guy...
FataLe
Profile Joined November 2010
New Zealand4501 Posts
August 09 2012 23:00 GMT
#39
On August 10 2012 07:55 Rannasha wrote:
Show nested quote +
On August 10 2012 07:54 An2quamaraN wrote:
On August 10 2012 07:50 Kurumi wrote:
So nothing "interesting" was accessed by the crackers? Weird.


They say that cause they want you to think that hackers can't use information they actually stolen. In reality, they could very well know your password already. All you need to decrypt an encrypted pass is a good machine.


That's not really true. There are plenty of secure hashing/encryption routines that require a large cluster of computers to break through in a reasonable amount of time. Any somewhat sensible company will use encryption that is at least strong enough to not make it economically viable to bruteforce it.

They have TRANSLTR. Check mate everyone.
hi. big fan.
Wedge
Profile Joined March 2008
Canada580 Posts
August 09 2012 23:01 GMT
#40
Good god
Raskit
Profile Joined July 2009
579 Posts
August 09 2012 23:01 GMT
#41
Man, why weren't secret answers more secure? Now I've got to go round and start changing them on important accounts.
larse
Profile Blog Joined March 2012
1611 Posts
August 09 2012 23:02 GMT
#42
"outside of China."

LOL. Blizzard so implicitly points out suspect's location.
zhurai
Profile Blog Joined September 2010
United States5660 Posts
August 09 2012 23:03 GMT
#43
On August 10 2012 08:02 larse wrote:
"outside of China."

LOL. Blizzard so implicitly points out suspect's location.

narrows down so many countries!
Twitter: @zhurai | Site: http://zhurai.com
Shellshock
Profile Blog Joined March 2011
United States97276 Posts
August 09 2012 23:05 GMT
#44
Thank you for posting this. time to change the password on my account
Moderatorhttp://i.imgur.com/U4xwqmD.png
TL+ Member
Epoxide
Profile Blog Joined March 2011
Magic Woods9326 Posts
August 09 2012 23:05 GMT
#45
On August 10 2012 07:42 mataxp wrote:
As a PSN user, dejá vu

Or GomTv
LiquipediaSouma: EU MM is just Russian Roulette. Literally.
Naphal
Profile Joined December 2010
Germany2099 Posts
August 09 2012 23:05 GMT
#46
a shit... more spam on my gaming email -.-
skyR
Profile Joined July 2009
Canada13817 Posts
August 09 2012 23:06 GMT
#47
Why the hell would you encrypt passwords but not secret answers? sigh Blizzard.
R1CH
Profile Blog Joined May 2007
Netherlands10340 Posts
August 09 2012 23:06 GMT
#48
If you used the same password anywhere else, you should change it (and stop re-using passwords!). They have your email and password hash which is more than enough to wreck havoc, especially if it was your email account password. Props to Blizzard though for the announcement.
AdministratorTwitter: @R1CH_TL
R1CH
Profile Blog Joined May 2007
Netherlands10340 Posts
Last Edited: 2012-08-09 23:07:12
August 09 2012 23:07 GMT
#49
On August 10 2012 08:06 skyR wrote:
Why the hell would you encrypt passwords but not secret answers? sigh Blizzard.

Because CSR need to know what the correct answer is?
AdministratorTwitter: @R1CH_TL
teamamerica
Profile Blog Joined July 2010
United States958 Posts
August 09 2012 23:07 GMT
#50
On August 10 2012 07:54 An2quamaraN wrote:
Show nested quote +
On August 10 2012 07:50 Kurumi wrote:
So nothing "interesting" was accessed by the crackers? Weird.


They say that cause they want you to think that hackers can't use information they actually stolen. In reality, they could very well know your password already. All you need to decrypt an encrypted pass is a good machine.


What? No - it depends on how they hashed the password. Some hashes are vulnerable to being cracked just by a normal desktop computer with a decent GPU in a day, others aren't. Even ones that aren't designed to be resistant to brute force can have such a large input space it'll take too long to crack to matter really.

I'm not saying they aren't being stored using a weak hash function (something like md5 but that's old/outdated) but unless you know otherwise, why say that?
RIP GOMTV. RIP PROLEAGUE.
Shenghi
Profile Joined August 2010
167 Posts
Last Edited: 2012-08-09 23:11:00
August 09 2012 23:08 GMT
#51
Assuming Blizzards implementation of the RSP-protocol is correct and they use sufficiently large numbers, and there is no reason to assume otherwise, then the passwords of the NA accounts are still just as safe as they were before, with the minor difference that more attempts at breaking them could now be made per second. However, for strong passwords this doesn't matter, as strong passwords take billions of years to break anyway.

On August 10 2012 07:43 Hokay wrote:
Noooo not my secret questions! A lot of sites ask the same secret security questions :X

Which is one of many reasons why secret questions are not, like often claimed, an added layer of security, but instead a vulnerability.

[Edit]
As a sidenote to what I said above the quote, I do have to note that almost nobody uses a secure password.
People are not born stupid, they choose to be stupid. If you made that choice, please change your mind.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
August 09 2012 23:08 GMT
#52
Well I wanted to let go off my old gmx account anyways I guess :/ (the biggest spammer on that one is gmx itself -.-)

Man this sucks, I hope they won't be able to do too much damage with the encrypted passwords. But eMail adresses, oh lord. Even more spam and phishing mails.
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
ODKStevez
Profile Joined February 2011
Ireland1225 Posts
August 09 2012 23:12 GMT
#53
Stuff happens, glad they are dealing with it.
Luppa <3
IMABUNNEH
Profile Joined March 2011
United Kingdom1062 Posts
August 09 2012 23:12 GMT
#54
An open and honest announcement at least.
"I think...now? No rival. Me world champion. Yeah. None rival." - oGsMC
Lowenhertz
Profile Joined March 2011
United Kingdom4 Posts
Last Edited: 2012-08-09 23:15:51
August 09 2012 23:15 GMT
#55
matter of time unfortunately

atleast they brought it to light quickly
R1CH
Profile Blog Joined May 2007
Netherlands10340 Posts
Last Edited: 2012-08-09 23:16:44
August 09 2012 23:16 GMT
#56
On August 10 2012 08:08 Shenghi wrote:
Assuming Blizzards implementation of the RSP-protocol is correct and they use sufficiently large numbers, and there is no reason to assume otherwise, then the passwords of the NA accounts are still just as safe as they were before, with the minor difference that more attempts at breaking them could now be made per second. However, for strong passwords this doesn't matter, as strong passwords take billions of years to break anyway.

While SRP is very secure, there are many services (like the battle.net website) that can't use SRP, so it seems reasonable to conclude that some password-equivalent data is stored somewhere and that it could have been leaked.
AdministratorTwitter: @R1CH_TL
CableSCES
Profile Blog Joined September 2011
United States367 Posts
August 09 2012 23:17 GMT
#57
ruh-roh...
gonna be changing pass...
Saving SoCal eSports one sponsor at a time: MSI, JINX, Tt eSPORTS, HyperX, Red Bull ¯\_(ツ)_/¯
shin_toss
Profile Joined May 2010
Philippines2589 Posts
August 09 2012 23:17 GMT
#58
Ahhh hard to memorize diff passwords. :| . Better be safe than sorry
AKMU / IU
Cele
Profile Blog Joined December 2008
Germany4016 Posts
August 09 2012 23:18 GMT
#59
hu bad times. i better change my password too 0o
Broodwar for life!
Xpace
Profile Joined March 2011
United States2209 Posts
August 09 2012 23:18 GMT
#60
Pretty sure this is different from the D3 issue that happened at launch and the following week. Even with authenticators that did nothing to solve the previous issue, the users were the ones getting compromised, not Battle.Net. This is different though.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
August 09 2012 23:19 GMT
#61
On August 10 2012 08:17 shin_toss wrote:
Ahhh hard to memorize diff passwords. :| . Better be safe than sorry


Write them down on some sheet of paper and put it away safely. I mean yeh, if that paper gets stolen / lost you're fucked but you gotta have it somewhere right? And while there are programs for all that stuff having it on a real-world piece of sheet is nice.
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
MxGStreamA
Profile Joined March 2012
35 Posts
August 09 2012 23:19 GMT
#62
I was hit by this, someone hacked the account, changed the password, played some ladder games.
bgx
Profile Joined August 2010
Poland6595 Posts
August 09 2012 23:21 GMT
#63
On August 10 2012 08:19 MxGStreamA wrote:
I was hit by this, someone hacked the account, changed the password, played some ladder games.

How many points lost/gained?

+ Show Spoiler +
-_-
Stork[gm]
pallad
Profile Joined September 2010
Poland1958 Posts
August 09 2012 23:21 GMT
#64
On August 10 2012 08:15 Lowenhertz wrote:
matter of time unfortunately

atleast they brought it to light quickly


True .. now hackers attack all the time , big companies , Sony attack was big also..

But imo its just biznes.. , blizzard is now for sale , someone cleary try to lower company price.. simple for me ;P
SC 2 -LingsLover- EU -- Jaedong , NesTea , Nerchio , DRG , Moon , Oz , Tarson , Scarlett -- Dota 2 Pallad EU- NaVi - LGD
BadgerBadger8264
Profile Joined March 2011
Netherlands409 Posts
Last Edited: 2012-08-09 23:24:31
August 09 2012 23:22 GMT
#65
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.
nucLeaRTV
Profile Joined May 2011
Romania822 Posts
August 09 2012 23:22 GMT
#66
That's pretty sad. I'm from Europe, so I guess I should'n worry. I'm one of those 'use 1 password for everything' guys. Well different versions of same password, to be more exact :D
"Having your own haters means you are famous"
arctia
Profile Joined December 2010
61 Posts
August 09 2012 23:23 GMT
#67
For those of you having trouble remembering passwords, use a keyboard pattern instead of a mixture of letters/numbers/symbols that you can memorize. A few of my passwords are literally just patterns that I draw on my keyboard, mix in some Shift-key presses and you're set. I literally cannot tell you what my passwords are unless you put a keyboard in front of me.
cmen15
Profile Blog Joined December 2010
United States1519 Posts
August 09 2012 23:23 GMT
#68
lol sucks for people that use one password for everything... o wait that me gg!!!!
Greed leads to just about all losses.
chris5180
Profile Joined July 2012
198 Posts
August 09 2012 23:24 GMT
#69
thank you for the heads up!
R1CH
Profile Blog Joined May 2007
Netherlands10340 Posts
August 09 2012 23:24 GMT
#70
On August 10 2012 08:19 MxGStreamA wrote:
I was hit by this, someone hacked the account, changed the password, played some ladder games.

Unrelated, you probably had a bad / shared password beforehand. A hacking group advanced enough to break into Blizzard's network isn't really after your SC2 ladder rank.
AdministratorTwitter: @R1CH_TL
jnkw
Profile Joined November 2010
Canada347 Posts
August 09 2012 23:24 GMT
#71
Bleh. This is unfortunate.
Wroshe
Profile Joined June 2011
Netherlands1051 Posts
August 09 2012 23:25 GMT
#72
On August 10 2012 08:06 R1CH wrote:
If you used the same password anywhere else, you should change it (and stop re-using passwords!). They have your email and password hash which is more than enough to wreck havoc, especially if it was your email account password. Props to Blizzard though for the announcement.

Have a good password manager thingy that you recommend? My batle net is on a unique password but I tend to be lazy with services (so no battle net/steam/e-mails) I don't really care about.
bgx
Profile Joined August 2010
Poland6595 Posts
August 09 2012 23:25 GMT
#73
Wait a second so Europe was also affected (email adresses).

Few days ago Google warned me about someone from China trying to login... conincidence ? :o Never had such a case.
Stork[gm]
thurst0n
Profile Blog Joined December 2010
United States611 Posts
August 09 2012 23:26 GMT
#74
On August 10 2012 08:00 mrjpark wrote:
Show nested quote +
On August 10 2012 07:43 Hokay wrote:
Noooo not my secret questions! A lot of sites ask the same secret security questions :X


This is awkward. I never remember the answer to my secret questions. But some complete stranger might...maybe I can finally access my old XBox Live account if I can find a way to contact this guy...

LOL SO TRUE!

I seriously cannot have a password for each site because I cannot remember that many passwords. I have to change my password at work every 10 weeks, and I'm running out of options, I cannot use ANY password I've previously used... security questions I have a little trick for, that this hacker ruined. I always answer the same 3 things for security questions, and they are complete bullshit, so it doesn't matter what questions are asked, just the random answers i have selected, it makes it hard when sites ask me in random order.

Bleh, I guess I'll have to write down my passwords at home, and start making them different for everything. Luckily I already use seperate password for things i care about, like banking/personal email. Fuck you hackers
P.S. I'm nub. If you'd like you can follow me @xthurst but its not worth it ill be honest
R1CH
Profile Blog Joined May 2007
Netherlands10340 Posts
Last Edited: 2012-08-09 23:26:35
August 09 2012 23:26 GMT
#75
On August 10 2012 08:22 BadgerBadger8264 wrote:
Show nested quote +
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?
AdministratorTwitter: @R1CH_TL
Gladiator6
Profile Joined June 2010
Sweden7024 Posts
August 09 2012 23:26 GMT
#76
On August 10 2012 08:25 Wroshe wrote:
Show nested quote +
On August 10 2012 08:06 R1CH wrote:
If you used the same password anywhere else, you should change it (and stop re-using passwords!). They have your email and password hash which is more than enough to wreck havoc, especially if it was your email account password. Props to Blizzard though for the announcement.

Have a good password manager thingy that you recommend? My batle net is on a unique password but I tend to be lazy with services (so no battle net/steam/e-mails) I don't really care about.


Check out this:
http://keepass.info/
Flying, sOs, free, Light, Soulkey & ZerO
R1CH
Profile Blog Joined May 2007
Netherlands10340 Posts
August 09 2012 23:27 GMT
#77
On August 10 2012 08:25 Wroshe wrote:
Show nested quote +
On August 10 2012 08:06 R1CH wrote:
If you used the same password anywhere else, you should change it (and stop re-using passwords!). They have your email and password hash which is more than enough to wreck havoc, especially if it was your email account password. Props to Blizzard though for the announcement.

Have a good password manager thingy that you recommend? My batle net is on a unique password but I tend to be lazy with services (so no battle net/steam/e-mails) I don't really care about.

I use Keepass personally. It can be configured to login to games too.
AdministratorTwitter: @R1CH_TL
Slurpy
Profile Joined October 2010
41 Posts
August 09 2012 23:29 GMT
#78
NASL sound guy now working at Blizzard?
Blackrobe
Profile Joined August 2010
United States806 Posts
August 09 2012 23:29 GMT
#79
On August 10 2012 08:19 Na_Dann_Ma_GoGo wrote:
Show nested quote +
On August 10 2012 08:17 shin_toss wrote:
Ahhh hard to memorize diff passwords. :| . Better be safe than sorry


Write them down on some sheet of paper and put it away safely. I mean yeh, if that paper gets stolen / lost you're fucked but you gotta have it somewhere right? And while there are programs for all that stuff having it on a real-world piece of sheet is nice.


KeePass guys! :D

Give it a shot, there are portable versions as well (USB flash/iPhone etc)!
"To make no mistakes is not in the power of man; but from their errors and mistakes the wise and good learn wisdom for the future."
iAmJeffReY
Profile Joined August 2010
United States4262 Posts
August 09 2012 23:30 GMT
#80
Funny, since my SC2/D3 account got hacked and stolen after not playing on either for a week. Someone put on an authentication device....that I've never put on.

I had to get blizzard to roll back my account into my hands, and changed my PW back to normal. Odd.
Unbiased biased terran abuser Jeffrey. Sorry for the rage, friend!
netherh
Profile Blog Joined November 2011
United Kingdom333 Posts
August 09 2012 23:30 GMT
#81
It's lucky they don't do anything stupid like make all the passwords case insensitive... Oh wait.
-RusH
Profile Joined June 2012
United States240 Posts
August 09 2012 23:31 GMT
#82
I can't seem to find how to edit the secret question/answer. Anyone know where?
Life..
Eufouria
Profile Blog Joined March 2011
United Kingdom4425 Posts
Last Edited: 2012-08-09 23:32:10
August 09 2012 23:31 GMT
#83
On August 10 2012 08:26 R1CH wrote:
Show nested quote +
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?

Its so bad nobody would ever use it, so hackers won't even try it. Metagame.

So can we all expect to be added to a bunch more spam email lists because of this?
BadgerBadger8264
Profile Joined March 2011
Netherlands409 Posts
Last Edited: 2012-08-09 23:35:57
August 09 2012 23:32 GMT
#84
On August 10 2012 08:26 R1CH wrote:
Show nested quote +
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?


Typically passwords are hashed in combination with a username and other information. You can't simply hash "password123" and have thousands of results turn up. You'd have to know the hashing algorithm used by Blizzard, then for every individual user, hash "password123" and compare it to the stored hash. That still obviously wouldn't take a month to do with a single password, so you're right that it is probably feasible to do that for very common passwords and obtain a good amount of accounts. Still, if your password is even remotely unique, they will never realistically obtain it.
sour_eraser
Profile Joined March 2011
Canada932 Posts
Last Edited: 2012-08-09 23:34:21
August 09 2012 23:32 GMT
#85
Ehh. Doesnt really affect me much considering I have diff passwords for all my email and other games. lol
But I want to know if we need to know Previous Answer to Secret Question when they force us change it into new one. I forgot mine :/
"What's the f*cking point of censoring a letter if everyone and their mother knows what it stands for.... F*cking morons"
VPVanek
Profile Joined August 2010
Canada238 Posts
August 09 2012 23:33 GMT
#86
Well I guess I am changing my password now ahahah
FoXer
Crying
Profile Joined February 2011
Bulgaria778 Posts
August 09 2012 23:33 GMT
#87
On August 10 2012 08:31 -RusH wrote:
I can't seem to find how to edit the secret question/answer. Anyone know where?

i think the security question is not changeable.
Determination~ Hard Work Surpass NATURAL GENIUS!
thatsundowner
Profile Joined July 2011
Canada312 Posts
August 09 2012 23:33 GMT
#88
On August 10 2012 08:30 netherh wrote:
It's lucky they don't do anything stupid like make all the passwords case insensitive... Oh wait.


if somebody gets the password case sensitivity is irrelevant and brute forcing is not how the vast majority of stolen b.net accounts are taken. it's kind of an irrelevant thing, and not a big deal at all that they don't do it
"you're gonna fail" in latin
entropius
Profile Joined June 2010
United States1046 Posts
August 09 2012 23:37 GMT
#89
On August 10 2012 08:26 R1CH wrote:
Show nested quote +
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?


Wouldn't salting the hashes make this sort of thing impossible? I have in mind the sort of attack where the attacker computes the hash of "password123" and compares it to all the hashes to see if it matches any of them (which is only O(log N)), which would be foiled by salts -- in that case they've got to do the hash algorithm N times instead of just once to check N hashes against each dictionary word. Of course, if the passwords are suitably weak then you can probably afford this -- just check the simplest ones against all of them.

It's been a while since I studied this stuff, of course, so I could be wrong.
IM_Junior
Profile Joined April 2012
Mexico29 Posts
August 09 2012 23:38 GMT
#90
Thx in advance, password changed just to be safe for the moment !!!!
Zerg for life !!! --- DRG / Stephano / Leenock / Life and Nesteaaaaaa
Silidons
Profile Blog Joined September 2010
United States2813 Posts
August 09 2012 23:39 GMT
#91
I noticed that in the past 2 days or so, I went from getting ~5 spam mail a day on my bnet email to 20. I have an Auth and use different PW's for different things, but now I gotta change it >_<
"God fights on the side with the best artillery." - Napoleon Bonaparte
Maluk
Profile Joined August 2011
France987 Posts
Last Edited: 2012-08-09 23:43:52
August 09 2012 23:39 GMT
#92
Does anyone know if my credit card number is somewhere in Blizzard's datas if I used it only to buy StarCraft 2, and not for any monthly payment ?
Edit : Yes, my question probably sounds pretty noob but I am clueless concerning hacks t.t
ROOTIllusion
Profile Blog Joined August 2010
United States1060 Posts
August 09 2012 23:40 GMT
#93
Didnt something like this happen a year or so ago? damn hackers
www.twitter.com/rootillusion & www.facebook.com/illusionsc2
jnkw
Profile Joined November 2010
Canada347 Posts
August 09 2012 23:42 GMT
#94
On August 10 2012 08:37 entropius wrote:
Show nested quote +
On August 10 2012 08:26 R1CH wrote:
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?


Wouldn't salting the hashes make this sort of thing impossible? I have in mind the sort of attack where the attacker computes the hash of "password123" and compares it to all the hashes to see if it matches any of them (which is only O(log N)), which would be foiled by salts -- in that case they've got to do the hash algorithm N times instead of just once to check N hashes against each dictionary word. Of course, if the passwords are suitably weak then you can probably afford this -- just check the simplest ones against all of them.

It's been a while since I studied this stuff, of course, so I could be wrong.


Given that there exist many extremely common passwords like 'password', it is not unreasonable to assume that rainbow tables might exist for a large number of possible salts per common password.
EleanorRIgby
Profile Joined March 2008
Canada3923 Posts
August 09 2012 23:43 GMT
#95
damn this sucks but i think hackers usually go for wow/d3 accounts, sc2 accounts are probably the least profitable
savior did nothing wrong
Kambing
Profile Joined May 2010
United States1176 Posts
August 09 2012 23:43 GMT
#96
On August 10 2012 08:37 entropius wrote:
Show nested quote +
On August 10 2012 08:26 R1CH wrote:
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?


Wouldn't salting the hashes make this sort of thing impossible? I have in mind the sort of attack where the attacker computes the hash of "password123" and compares it to all the hashes to see if it matches any of them (which is only O(log N)), which would be foiled by salts -- in that case they've got to do the hash algorithm N times instead of just once to check N hashes against each dictionary word. Of course, if the passwords are suitably weak then you can probably afford this -- just check the simplest ones against all of them.

It's been a while since I studied this stuff, of course, so I could be wrong.


Not necessarily, e.g., http://www.openwall.com/john/.

Passwords in practice are frequently suitably weak and amendable to cracking (e.g., via a dictionary attack). Knowing how the passwords were salted --- or at least narrowing it down to a small set of salting schemes --- makes things more tractable as well.

So theoretically intractable. Practically hard to do, but not impossible.
Pufftrees
Profile Joined March 2009
2449 Posts
August 09 2012 23:43 GMT
#97

This is just... unacceptable. What the flux.

+ Show Spoiler +
Blizzard is such a joke
Chance favors the prepared mind.
RoyGBiv_13
Profile Blog Joined August 2010
United States1275 Posts
August 09 2012 23:45 GMT
#98
I went to a talk at DEFCON about fuzzing d3, where they showed just how secure blizzard's password system is. I would not be worried about them breaking you password hash (a properly salted and hashed password is a difficult thing to unravel). The security questions are a real risk though.
Any sufficiently advanced technology is indistinguishable from magic
Dingobloo
Profile Blog Joined September 2010
Australia1903 Posts
Last Edited: 2012-08-09 23:46:54
August 09 2012 23:45 GMT
#99
On August 10 2012 08:37 entropius wrote:
Show nested quote +
On August 10 2012 08:26 R1CH wrote:
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?


Wouldn't salting the hashes make this sort of thing impossible? I have in mind the sort of attack where the attacker computes the hash of "password123" and compares it to all the hashes to see if it matches any of them (which is only O(log N)), which would be foiled by salts -- in that case they've got to do the hash algorithm N times instead of just once to check N hashes against each dictionary word. Of course, if the passwords are suitably weak then you can probably afford this -- just check the simplest ones against all of them.

It's been a while since I studied this stuff, of course, so I could be wrong.


They actually tell us the method by which they encrypt the passwords in the faq:

http://en.wikipedia.org/wiki/Secure_Remote_Password_protocol

It includes the username, password, salt and an unspecified hash function, so dictionary attacks aren't likely to be a problem.

Again, no guarantee's but they seem to have done due diligence with regards to making getting the actual password very difficult given just the hash.
Kambing
Profile Joined May 2010
United States1176 Posts
August 09 2012 23:45 GMT
#100
On August 10 2012 08:43 EleanorRIgby wrote:
damn this sucks but i think hackers usually go for wow/d3 accounts, sc2 accounts are probably the least profitable


Likely that they can't differentiate without cracking the account. And besides, your email address and secret answers can be enough to do damage. For example, some (badly designed) sites will let your reset a password immediately after you successfully answer a secret question without sending email to your account first.
DertoQq
Profile Joined October 2010
France906 Posts
August 09 2012 23:46 GMT
#101
To access our account, the hackers need to :

a) have the hash of our passwords
b) know the hashing algorithm that blizzard use
c) your password need to be weak

I don't see that happening, but better safe than sorry.
"i've made some empty promises in my life, but hands down that was the most generous" - Michael Scott
Bagration
Profile Blog Joined October 2011
United States18282 Posts
August 09 2012 23:48 GMT
#102
Hmm, so everyone outside of China was hit? Interesting

So could we infer that the hackers are based from China, or is that just simply a red herring to scapegoat?
Team Slayers, Axiom-Acer and Vile forever
Kambing
Profile Joined May 2010
United States1176 Posts
August 09 2012 23:49 GMT
#103
Also this should serve as a reminder of how stupid the concept of secret questions is. Fill in garbage or otherwise meaningless words for those fields and safeguard your passwords via other means, e.g., with a program like keepass or service like 1password.
WiljushkA
Profile Joined March 2006
Serbia1416 Posts
August 09 2012 23:49 GMT
#104
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


yeah. they store only the hash values of passwords, that are attained through the use of a one-way function. its actually pretty safe stuff. to break them hackers would need to be either better at math than the worlds best mathematicians, or have access to currently non-existent amounts computing power.
"As much as I love the image of me F5-ing paypal every 15 minutes while fist pumping and screaming "SHIP THE MONEY BITCHES"" - Day9
InDesconrowl
Profile Joined April 2012
Togo311 Posts
August 09 2012 23:50 GMT
#105
On August 10 2012 08:40 QuanticIllusion wrote:
Didnt something like this happen a year or so ago? damn hackers


It happened to steam about a year ago. The chinese hacker who hacked steam is now in jail .
:tg: Ginyu Force :tg:
Medrea
Profile Joined May 2011
10003 Posts
August 09 2012 23:50 GMT
#106
I have a physical authenticator so everything is rosy for me.

I'd imagine most people have one by now, its so small. I wish my bank account had one.
twitch.tv/medrea
Virtue
Profile Joined July 2010
United States318 Posts
Last Edited: 2012-08-10 12:45:26
August 09 2012 23:51 GMT
#107
On August 10 2012 08:30 netherh wrote:
It's lucky they don't do anything stupid like make all the passwords case insensitive... Oh wait.


Usually at this point after a hack, case of the characters in your passwords doesn't matter. They are just going to brute force (Try every possible combination of characters for a certain length) and when a computer is just calculating hashes and comparing them it doesn't make it harder or easier. Thankfully, it seems like Blizzard's password storage protocol is a lot better than most encryption methods at standing up to brute forcing their hashes. (Might even be impossible.)

Still, when it comes to passwords length is all that matters. I work for a company that audits IT and when we get hashes of passwords like these guys did, we can usually crack all of an institutions passwords in a day. The only ones we can't crack no matter how long we try are are ones that are long (Something like 13-15 characters or longer). The best passwords are ones that are long and easy for you to remember/type but that are also hard for people who have information about you to guess and are not used for multiple accounts/sites. R1CH has pointed out that last bit before; If you have a different password for everything, one compromised site like this won't matter.

People only use short passwords because they are usually forced to used ridiculous cases and special characters that make the password hard to type quickly. If you just make a password that is long, has a few spaces, and only uses lower case letters, you'll be more secure than someone who has an 8 character long password that has a capital letter, special character, and a number and much more likely to be able to remember it and type it quickly.

*Edited part of my second paragraph. It now correctly says that "The only ones we can't crack no matter how long we try are the ones that are long(Something like 13-15 characters or longer)"
Grimmyman123
Profile Joined January 2011
Canada939 Posts
August 09 2012 23:52 GMT
#108
No worries, changed password, and will change security question later. Also changed password to related email address to my Bnet account, just in case.
Win. That's all that matters. Win. Nobody likes to lose.
Integra
Profile Blog Joined January 2008
Sweden5626 Posts
Last Edited: 2012-08-09 23:55:04
August 09 2012 23:53 GMT
#109
On positive note, its nice to see that Blizzard really has put their mind into the protection part (their security, judging by their post is pretty dammn hard to actually crack even if you got the information), they even went out and were totally transparent about the whole thing. Curdos to Blizzard about this.
"Dark Pleasure" | | I survived the Locust war of May 3, 2014
Dingobloo
Profile Blog Joined September 2010
Australia1903 Posts
August 09 2012 23:54 GMT
#110
On August 10 2012 08:48 Bagration wrote:
Hmm, so everyone outside of China was hit? Interesting

So could we infer that the hackers are based from China, or is that just simply a red herring to scapegoat?


The hacker could very well be from china, but I don't think you can infer that from the information, blizzard gets a different company to run all of it's mainland china business and they probably have seperate authentication servers that weren't hit.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
Last Edited: 2012-08-09 23:56:01
August 09 2012 23:55 GMT
#111
@ Virtue

Reminds me of this:

[image loading]
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
Windwaker
Profile Joined February 2012
Germany1597 Posts
August 09 2012 23:56 GMT
#112
fuck i hope they dont have a machine like the guys in digital fortress to get the passwords
The path of the righteous man is beset on all sides by the iniquities of the selfish and the tyranny of evil men. Blessed is he, who in the name of charity and good will, shepherds the weak through the valley of darkness, for he is truly his brother
HeeroFX
Profile Blog Joined November 2010
United States2704 Posts
August 09 2012 23:57 GMT
#113
Blizzard should give us all beta access to HOTS for this :D
thekoalaz
Profile Joined October 2011
United States109 Posts
August 09 2012 23:59 GMT
#114
On August 10 2012 08:55 Na_Dann_Ma_GoGo wrote:
@ Virtue

Reminds me of this:

[image loading]



Beat me to it
Integra
Profile Blog Joined January 2008
Sweden5626 Posts
August 09 2012 23:59 GMT
#115
On August 10 2012 08:55 Na_Dann_Ma_GoGo wrote:
@ Virtue

Reminds me of this:

[image loading]

Have you ever heard of the Green horse wanking off at the prairie?
GreenHorseWankingPrairie, you'll never forget that password, and its hard as hell to break
"Dark Pleasure" | | I survived the Locust war of May 3, 2014
DertoQq
Profile Joined October 2010
France906 Posts
August 10 2012 00:01 GMT
#116
On August 10 2012 08:51 Virtue wrote:
Show nested quote +
On August 10 2012 08:30 netherh wrote:
It's lucky they don't do anything stupid like make all the passwords case insensitive... Oh wait.


Usually at this point after a hack, case of the characters in your passwords doesn't matter. They are just going to brute force (Try every possible combination of characters for a certain length) and when a computer is just calculating hashes and comparing them it doesn't make it harder or easier. Thankfully, it seems like Blizzard's password storage protocol is a lot better than most encryption methods at standing up to brute forcing their hashes. (Might even be impossible.)


Actually, case does help. They are going to brute force it and if they have to take into account the case, it will increase the number of possibilities by A LOT.
"i've made some empty promises in my life, but hands down that was the most generous" - Michael Scott
Raskit
Profile Joined July 2009
579 Posts
August 10 2012 00:01 GMT
#117
On August 10 2012 08:49 Kambing wrote:
Also this should serve as a reminder of how stupid the concept of secret questions is. Fill in garbage or otherwise meaningless words for those fields and safeguard your passwords via other means, e.g., with a program like keepass or service like 1password.

I think it's time to just start treating the secret answer as another unique password. You can't actually answer the question correctly, as anyone who knows you well enough will be able to guess the answer and you can't use the same answer for all questions as these attacks are becoming increasingly more common.
NKexquisite
Profile Joined January 2009
United States911 Posts
August 10 2012 00:04 GMT
#118
Not a big deal. Carry on.
Whattttt Upppppppp Im Nesteaaaaaa!!
forsooth
Profile Joined February 2011
United States3648 Posts
August 10 2012 00:05 GMT
#119
Fortunately my b.net password is isolated. Still, I'll be changing it when I get home from work. I had an e-mail account stolen from me once. It was a huge headache to get secure again.
xSilverx
Profile Joined November 2011
Sweden76 Posts
August 10 2012 00:06 GMT
#120
Mike Morhaime the person i respect most in the world! Hopefully this will be sorted out and fixed, but i won´t lose any trust for blizzard. This happens to everyone even the greatest, just make sure to fix it.
MyLastSerenade
Profile Joined February 2010
Germany710 Posts
August 10 2012 00:06 GMT
#121
unbelievable......
Medrea
Profile Joined May 2011
10003 Posts
August 10 2012 00:08 GMT
#122
Well it's not like they kept the passwords in plaintext.
twitch.tv/medrea
Corrosive
Profile Joined August 2010
Canada3741 Posts
August 10 2012 00:11 GMT
#123
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/
Maruprime.
creamer
Profile Joined February 2011
Canada128 Posts
August 10 2012 00:11 GMT
#124
If they have a half decent encryption on the passwords (which I'm sure they do), I'm not worried at all about my account being accessed.
MKP - Best player of all time
andReslic
Profile Joined January 2012
216 Posts
August 10 2012 00:11 GMT
#125
I feel like people that bought accounts will feel safer after beign able to change the secret question

Wuster
Profile Joined May 2011
1974 Posts
Last Edited: 2012-08-10 00:16:42
August 10 2012 00:14 GMT
#126
On August 10 2012 08:51 Virtue wrote:
Show nested quote +
On August 10 2012 08:30 netherh wrote:
It's lucky they don't do anything stupid like make all the passwords case insensitive... Oh wait.


Usually at this point after a hack, case of the characters in your passwords doesn't matter. They are just going to brute force (Try every possible combination of characters for a certain length) and when a computer is just calculating hashes and comparing them it doesn't make it harder or easier. Thankfully, it seems like Blizzard's password storage protocol is a lot better than most encryption methods at standing up to brute forcing their hashes. (Might even be impossible.)


I'm by no means an expert, so I'm wondering if you could explain how a storage protocol could be better or worse against brute force. Do you mean things like individual salts or increased entropy?

Because all I'm thinking is that once someone has the actual hash you can't slow their velocity when it comes to brute-force attacks (which Blizzard does when you enter passwords through the game client / web).

Edit: I do agree that case actually is a red herring here, because the allowable character set and password lengths already have plenty of permutations to prevent someone easily cracking one password let alone all of them.
v3chr0
Profile Blog Joined April 2010
United States856 Posts
August 10 2012 00:17 GMT
#127
My password is pretty crazy, I think I'll be alright. Will be changing my secret q/a when prompted though.
"He catches him with his pants down, backs him off into a corner, and then it's over." - Khaldor
Sikly
Profile Joined June 2011
United States413 Posts
August 10 2012 00:20 GMT
#128
On August 10 2012 09:17 v3chr0 wrote:
My password is pretty crazy, I think I'll be alright. Will be changing my secret q/a when prompted though.


Why risk it? Using a new password takes minutes, getting a stolen account and all the other bullshit that comes with it could take you quite a lot of stressful hours.
Chunhyang
Profile Joined December 2011
Bangladesh1389 Posts
August 10 2012 00:20 GMT
#129
So, someone hacked? Or someone went all Mission Impossible on Blizzard HQ? The latter, I hope.

I'm not worried.
If you could reason with haters, there would be no haters. YGTMYFT
achristes
Profile Blog Joined March 2011
Norway653 Posts
August 10 2012 00:25 GMT
#130
Did anyone know that if you type your bnet password on TL it automatically turns into stars?
Here's mine: *******
Pretty sick.

On a serious note, looks like blizz handled it nicely.
youtube.com/spooderm4n | twitch.tv/spooderm4n | Random videos and games I feel like uploading
nath
Profile Blog Joined May 2010
United States1788 Posts
August 10 2012 00:26 GMT
#131
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

as a programmer, yes.
Founder of Flow Enterprises, LLC http://flow-enterprises.com/
Vorenius
Profile Blog Joined December 2010
Denmark1979 Posts
August 10 2012 00:26 GMT
#132
On August 10 2012 09:11 Corrosive wrote:
If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

1 million years.

I'll take my chances.
Kaasstengel
Profile Joined July 2012
Netherlands15 Posts
August 10 2012 00:27 GMT
#133
Thanks for posting this! I'm playing on the European server but changed my password and question anyone, never can be too certain these days!
leo23
Profile Blog Joined November 2010
United States3075 Posts
August 10 2012 00:30 GMT
#134
T_T oh my god ...
banelings
trifecta
Profile Joined April 2010
United States6795 Posts
August 10 2012 00:30 GMT
#135
On August 10 2012 09:06 MyLastSerenade wrote:
unbelievable......



Why is this unbelievable? Security is a really hard problem of asymmetric warfare. At least Blizzard, as far as we know, didn't make any obvious mistakes like keeping passwords in plaintext. As the Apple/Amazon story from a few days ago reinforced, users have to share the responsibility of security (don't reuse passwords, use strong passwords, keep backups etc)–you can't expect even the largest corporations to keep out all attackers all the time.
Laneir
Profile Joined September 2010
United States1160 Posts
August 10 2012 00:31 GMT
#136
No bueno hope they fix this fast
Follow me on Instagram @Chef_Betto
xrapture
Profile Blog Joined December 2011
United States1644 Posts
Last Edited: 2012-08-10 04:33:35
August 10 2012 00:31 GMT
#137
Everyone is either delusional, a nihlilst, or dead from suicide.
Eufouria
Profile Blog Joined March 2011
United Kingdom4425 Posts
August 10 2012 00:32 GMT
#138
On August 10 2012 09:26 Vorenius wrote:
Show nested quote +
On August 10 2012 09:11 Corrosive wrote:
If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

1 million years.

I'll take my chances.

128 decillion years
Possible Combinations: 16 sexdecillion

I'm quietly confident.
zergrushkekeke
Profile Joined November 2010
Australia241 Posts
August 10 2012 00:33 GMT
#139
On August 10 2012 09:17 v3chr0 wrote:
My password is pretty crazy, I think I'll be alright. Will be changing my secret q/a when prompted though.


That is not how passwords work, if you have a crazy long and difficult password and someone steals it, they don't care how long or complicated it is, they will more likely be copy/pasting it.

And to the other post about using a webpage to check how secure your password is, i seriously hope you didn't use your real one, how secure is a secret you told someone about to see if they have heard it?
KEKEKE
Shenghi
Profile Joined August 2010
167 Posts
August 10 2012 00:33 GMT
#140
On August 10 2012 08:16 R1CH wrote:
Show nested quote +
On August 10 2012 08:08 Shenghi wrote:
Assuming Blizzards implementation of the RSP-protocol is correct and they use sufficiently large numbers, and there is no reason to assume otherwise, then the passwords of the NA accounts are still just as safe as they were before, with the minor difference that more attempts at breaking them could now be made per second. However, for strong passwords this doesn't matter, as strong passwords take billions of years to break anyway.

While SRP is very secure, there are many services (like the battle.net website) that can't use SRP, so it seems reasonable to conclude that some password-equivalent data is stored somewhere and that it could have been leaked.

Even so, it can reasonably assumed that Blizzard sufficiently salts and otherwise obscures the password before hashing it with a safe hash, so the point stands. Weak passwords remain weak, strong ones remain strong.

Nevertheless, everyone affected should of course still change their passwords, just to make sure.

On August 10 2012 08:26 thurst0n wrote:
LOL SO TRUE!

I seriously cannot have a password for each site because I cannot remember that many passwords. I have to change my password at work every 10 weeks, and I'm running out of options, I cannot use ANY password I've previously used... security questions I have a little trick for, that this hacker ruined. I always answer the same 3 things for security questions, and they are complete bullshit, so it doesn't matter what questions are asked, just the random answers i have selected, it makes it hard when sites ask me in random order.

Bleh, I guess I'll have to write down my passwords at home, and start making them different for everything. Luckily I already use seperate password for things i care about, like banking/personal email. Fuck you hackers

The sad part is that changing your password every 10 weeks doesn't even increase security. If your password is strong, then it's strong. If it's weak, then it's weak. In fact, having to change it often will probably lead to much weaker passwords, such as "thissux10" and then just increment it every time you are forced to change it.

As for security questions, don't get me started. They are pretty much the bane of my existence. If I can avoid having to answer them, I will. If that means I have to avoid a certain service, so be it.

Don't write your passwords down. Use KeePass, like some people have already suggested.

On August 10 2012 08:43 Pufftrees wrote:

This is just... unacceptable. What the flux.

+ Show Spoiler +
Blizzard is such a joke

This happens to every major company and every government. Nothing you can do about it. Attackers are always ahead of defenders. Not Blizzards fault, and in fact, as far as we can tell they're handling it better than most.

On August 10 2012 08:45 RoyGBiv_13 wrote:
I went to a talk at DEFCON about fuzzing d3, where they showed just how secure blizzard's password system is. I would not be worried about them breaking you password hash (a properly salted and hashed password is a difficult thing to unravel). The security questions are a real risk though.

Always those dang security questions...

On August 10 2012 08:51 Virtue wrote:
Show nested quote +
On August 10 2012 08:30 netherh wrote:
It's lucky they don't do anything stupid like make all the passwords case insensitive... Oh wait.


<snip>

Still, when it comes to passwords length is all that matters. I work for a company that audits IT and when we get hashes of passwords like these guys did, we can usually crack all of an institutions passwords in a day. The only ones we can't crack no matter how long they are are ones that are long (Something like 13-15 characters or longer).

<snip>


Even if the hashing algorithm is known and only lower-case characters (no uppercase, no digits, no special characters, etc.) are used, then at 1 billion (1 000 000 000) attempts per second it takes ~50 000 years to break 15-character password, assuming the hash is safe (no collisions are known, or are expected to be found within that time frame.)

For a 20-character password, this would be ~631 billion years.

Note: The (possibly) fastest computer on earth can make about 75 billion attempts per second.

(Reinforcing your point here, not disputing it)

On August 10 2012 09:01 DertoQq wrote:
Actually, case does help. They are going to brute force it and if they have to take into account the case, it will increase the number of possibilities by A LOT.

It helps, but it won't change much for a password of desirable length. If it's impossible to get in a few billion years, then one way or the other, you'll be fine.

On August 10 2012 09:20 Sikly wrote:
Why risk it? Using a new password takes minutes, getting a stolen account and all the other bullshit that comes with it could take you quite a lot of stressful hours.

Memorizing a new, strong password takes more than minutes.

On August 10 2012 09:25 achristes wrote:
Did anyone know that if you type your bnet password on TL it automatically turns into stars?
Here's mine: *******
Pretty sick.

Oh, you read bash.org.
People are not born stupid, they choose to be stupid. If you made that choice, please change your mind.
Serpico
Profile Joined May 2010
4285 Posts
August 10 2012 00:33 GMT
#141
On August 10 2012 09:31 xrapture wrote:
My email:

Decado@writing.com


Password:

teehee12



Do whatever the fuck you want.

So many pussies crying over nothing.

This guy is super tough. What a tough guy.
Sanguinarius
Profile Joined January 2010
United States3427 Posts
August 10 2012 00:34 GMT
#142
oh, not good :-(

Ty for heads up
Your strength is just an accident arising from the weakness of others -Heart of Darkness
Bagration
Profile Blog Joined October 2011
United States18282 Posts
August 10 2012 00:35 GMT
#143
On August 10 2012 08:54 Dingobloo wrote:
Show nested quote +
On August 10 2012 08:48 Bagration wrote:
Hmm, so everyone outside of China was hit? Interesting

So could we infer that the hackers are based from China, or is that just simply a red herring to scapegoat?


The hacker could very well be from china, but I don't think you can infer that from the information, blizzard gets a different company to run all of it's mainland china business and they probably have seperate authentication servers that weren't hit.


Yeah, true. I just hope the hacker does get due punishment. I just found it interesting that China was spared.
Team Slayers, Axiom-Acer and Vile forever
leo23
Profile Blog Joined November 2010
United States3075 Posts
August 10 2012 00:36 GMT
#144
On August 10 2012 09:31 xrapture wrote:
My email:

Decado@writing.com


Password:

teehee12



Do whatever the fuck you want.

So many pussies crying over nothing.


now this guy is a real man

justin

lol
banelings
jere
Profile Joined September 2010
United States121 Posts
August 10 2012 00:37 GMT
#145
Well I was due for a password change so this is a good time to do it.
Vorenius
Profile Blog Joined December 2010
Denmark1979 Posts
August 10 2012 00:38 GMT
#146
On August 10 2012 09:33 zergrushkekeke wrote:
Show nested quote +
On August 10 2012 09:17 v3chr0 wrote:
My password is pretty crazy, I think I'll be alright. Will be changing my secret q/a when prompted though.


That is not how passwords work, if you have a crazy long and difficult password and someone steals it, they don't care how long or complicated it is, they will more likely be copy/pasting it.

And to the other post about using a webpage to check how secure your password is, i seriously hope you didn't use your real one, how secure is a secret you told someone about to see if they have heard it?

I also gave them my email to make sure they wouldn't have to bother finding it otherwise. Then I sent them my SSnumber and a photocopy of my passboard.

Also, no one has stolen anyone's password through blizzard since they aren't stupid enough to store them as plain text (take that sony!) They got a hashed version, so a more secure password will indeed help you against getting hacked.
Cabinet Sanchez
Profile Joined February 2011
Australia1097 Posts
August 10 2012 00:39 GMT
#147
I loved that password I used there (and like, everywhere else

Damnit
MVega
Profile Joined November 2010
763 Posts
August 10 2012 00:42 GMT
#148
Eh no biggie as long as people change their passwords and aren't stupid.
bumkin: How can you play like 50 games per day... I 4gate 2 times then it's nap time
RiceAgainst
Profile Blog Joined November 2011
United States1849 Posts
August 10 2012 00:43 GMT
#149
Does this tie in with me getting an email from Blizzard saying that they think I'm trying to sell my WoW account (when I don't even have one) then linking me to a random page? Or is that something different?
Neurosis
Profile Joined October 2010
United States893 Posts
August 10 2012 00:44 GMT
#150
On August 10 2012 09:33 Serpico wrote:
Show nested quote +
On August 10 2012 09:31 xrapture wrote:
My email:

Decado@writing.com


Password:

teehee12



Do whatever the fuck you want.

So many pussies crying over nothing.

This guy is super tough. What a tough guy.


rofl
AngryFarmer
Profile Joined June 2011
United States560 Posts
August 10 2012 00:46 GMT
#151
On August 10 2012 08:03 zhurai wrote:
Show nested quote +
On August 10 2012 08:02 larse wrote:
"outside of China."

LOL. Blizzard so implicitly points out suspect's location.

narrows down so many countries!


It's because China has their own servers and own operation. This has something to do with the distributor of starcraft in china
AnachronisticAnarchy
Profile Blog Joined July 2011
United States2957 Posts
August 10 2012 00:47 GMT
#152
Let's hope it stops here, and we don't get a PSN redux.
God, it seems there's so many of these incidents these days. Has it always been like this, or is it just happening now because some jackasses showed it was possible, and, indeed, easy?
"How are you?" "I am fine, because it is not normal to scream in pain."
seaofsaturn
Profile Blog Joined September 2010
United States489 Posts
August 10 2012 00:48 GMT
#153
Does un-checking the little box that says "Remember payment information" help at all with this sort of thing? Or is it gonna be in their database anyway?
Photoshop is over-powered.
MVega
Profile Joined November 2010
763 Posts
August 10 2012 00:51 GMT
#154
On August 10 2012 09:43 RiceAgainst wrote:
Does this tie in with me getting an email from Blizzard saying that they think I'm trying to sell my WoW account (when I don't even have one) then linking me to a random page? Or is that something different?


That's an age old phishing scam. It's not really from Blizzard even though sometimes they look really convincing. When Blizzard thinks you've sold/are selling an account they just outright ban you, they don't bother telling you that they suspect you.
bumkin: How can you play like 50 games per day... I 4gate 2 times then it's nap time
CrazyF1r3f0x
Profile Blog Joined August 2010
United States2120 Posts
August 10 2012 00:52 GMT
#155
Times like this make me happy to have KeePass ^_^
"Actual happiness always looks pretty squalid in comparison with the overcompensations for misery."
Monochromatic
Profile Blog Joined March 2012
United States997 Posts
August 10 2012 00:52 GMT
#156
I wonder if this has anything to do with D3's RMAH?
MC: "Guys I need your support! iam poor make me nerd baller" __________________________________________RIP Violet
Caphe
Profile Blog Joined May 2007
Vietnam10817 Posts
August 10 2012 00:54 GMT
#157
As an PSN user, I had to changed my passwords then GomTV comes along and now Blizzard. Got damn hackers, LEAVE ME ALONE .
Thanks for the heads up though.
Terran
delHospital
Profile Blog Joined December 2010
Poland261 Posts
August 10 2012 00:55 GMT
#158
On August 10 2012 07:34 juicyjames wrote:
When did Blizzard learn of the unauthorized access?
The trespass into our internal network was detected by us on August 4, 2012.

Why did Blizzard announce this on August 9?
We were debating whether to sweep it under the rug or not.

But seriously, what is the reason for taking such a long time?
trifecta
Profile Joined April 2010
United States6795 Posts
August 10 2012 00:56 GMT
#159
On August 10 2012 09:52 Monochromatic wrote:
I wonder if this has anything to do with D3's RMAH?


Blizz has probably been under steady attack since WoW came out.
R1CH
Profile Blog Joined May 2007
Netherlands10340 Posts
August 10 2012 00:57 GMT
#160
On August 10 2012 08:37 entropius wrote:
Show nested quote +
On August 10 2012 08:26 R1CH wrote:
On August 10 2012 08:22 BadgerBadger8264 wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Not saying you shouldn't change your password just to be completely sure, but if you'd know anything about the hashes used to encrypt passwords and how long it takes to decipher even a single password you would know that it's practically impossible for the people that have stolen the hash to obtain even a single password from that information within a month (and even that is stretching it as they'd need a cluster of powerful machines brute forcing the hash constantly for the duration), let alone retrieving a decent amount of stolen passwords. It's honestly not even close to being worth the power/rental costs of doing so to obtain an account worth maybe 100$. This is obviously assuming Blizzard doesn't use horribly outdated encryption, though.

I don't think you're aware of how password hashing works. Do you not think there are millions of people with "password123" or equally terrible passwords in those stolen hashes? Why would you need a month to break that?


Wouldn't salting the hashes make this sort of thing impossible? I have in mind the sort of attack where the attacker computes the hash of "password123" and compares it to all the hashes to see if it matches any of them (which is only O(log N)), which would be foiled by salts -- in that case they've got to do the hash algorithm N times instead of just once to check N hashes against each dictionary word. Of course, if the passwords are suitably weak then you can probably afford this -- just check the simplest ones against all of them.

It's been a while since I studied this stuff, of course, so I could be wrong.

Even with salts, the general population pick terrible passwords. Look at analysis done of previous leaks such as this one: https://www.computerworld.com/s/article/9147138/Users_still_make_hacking_easy_with_weak_passwords?

According to Imperva, about 30% of the passwords in the hacked list were six characters or smaller, while 60% were passwords created from a limited set of alphanumeric characters. Nearly 50% of the users had used easily guessable names, common slang words, adjacent keyboard keys and consecutive digits as their passwords.
AdministratorTwitter: @R1CH_TL
Bippzy
Profile Blog Joined March 2011
United States1466 Posts
Last Edited: 2012-08-10 00:59:41
August 10 2012 00:57 GMT
#161
All I can think of really(*after changing my password) is that I forgot my current security question, so my Bnet account has been stuck on an email I don't want it to be. Hopefully, I will be able to change the email with this serendipitous change!

Also sux that blizz was accessed. Can't put too much blame, not all companies can be permanently on the ball.

On August 10 2012 09:33 Serpico wrote:
Show nested quote +
On August 10 2012 09:31 xrapture wrote:
My email:

Decado@writing.com


Password:

teehee12



Do whatever the fuck you want.

So many pussies crying over nothing.

This guy is super tough. What a tough guy.

Well touche to this guy. I went on, but IDK what I'd want to change.
LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK
crawlingchaos
Profile Joined March 2011
Canada2025 Posts
August 10 2012 01:04 GMT
#162
Damn, I like keeping all my passwords relatively similar. Oh well.

This just reminds me that I ALWAYS forget the answers my the security questions -_-
They say that life's a carousel, spinning fast you've gotta ride it well, the world is full of kings and queens who blind your eyes and steal your dreams, it's heaven and hell, oh well.
JJH777
Profile Joined January 2011
United States4408 Posts
August 10 2012 01:08 GMT
#163
Lol I'm glad this happened after all the blind fanboys were saying THERE WAS ABSOLUTELY NO WAY the huge amount of D3 accounts getting hacked was a problem on blizzard's end.
AnachronisticAnarchy
Profile Blog Joined July 2011
United States2957 Posts
August 10 2012 01:12 GMT
#164
On August 10 2012 09:33 Serpico wrote:
Show nested quote +
On August 10 2012 09:31 xrapture wrote:
My email:

Decado@writing.com


Password:

teehee12



Do whatever the fuck you want.

So many pussies crying over nothing.

This guy is super tough. What a tough guy.


Also stupid, unless he doesn't want to play SC2 anymore. He probably forgot that we can do more than just bomb his MMR, such as changing his password and information.
"How are you?" "I am fine, because it is not normal to scream in pain."
Integra
Profile Blog Joined January 2008
Sweden5626 Posts
August 10 2012 01:16 GMT
#165
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.
"Dark Pleasure" | | I survived the Locust war of May 3, 2014
FryktSkyene
Profile Joined December 2010
United States1327 Posts
Last Edited: 2012-08-10 01:22:22
August 10 2012 01:21 GMT
#166
On August 10 2012 10:16 Integra wrote:
Show nested quote +
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.


wow
Snitches get stiches
Psychonian
Profile Joined March 2012
United States2322 Posts
August 10 2012 01:27 GMT
#167
ffs

God damn it blizzard there is no end of problems with your sites.
Trans Rights
Wuster
Profile Joined May 2011
1974 Posts
August 10 2012 01:30 GMT
#168
On August 10 2012 09:55 delHospital wrote:
Show nested quote +
On August 10 2012 07:34 juicyjames wrote:
When did Blizzard learn of the unauthorized access?
The trespass into our internal network was detected by us on August 4, 2012.

Why did Blizzard announce this on August 9?
We were debating whether to sweep it under the rug or not.

But seriously, what is the reason for taking such a long time?


1 business week isn't all that long. What they said is pretty reasonable at face value.

After all, the PSN mess was exacerbated by them claiming that no personal data was lost, then no financial data was lost, then 'actually they got everything'. That's not just bad PR, it also prevents customers from actually doing anything about the security breach in a timely manner (unless they just didn't trust PSN's everything's fine message, which why not, doesn't hurt to be extra safe).

If Blizzard knew that sensitive data was compromised, then that's something you can just say. But if you're affirming that no sensitive data was compromised, you'd better be damned sure before you say anything.

Plus, it's entirely possible that they were busy closing security breaches and just didn't get around to checking what was stolen until after the fact, after all you have to stop the problem rather than make press releases. Not to mention it would probably take a company as large as blizzard a non-trivial amount of time to verify what was and was not accessed by the hackers.
Alakaslam
Profile Blog Joined September 2011
United States17336 Posts
Last Edited: 2012-08-10 01:39:53
August 10 2012 01:30 GMT
#169
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

Thanks! 63 million years. I'm good XD
Edit: bank acc is good against 38 septillion years worth of a desktop. Good to know. Thing is, how much time would 5 servers crunching in tandem save?
If you think Elon Musk is a Nazi, it is because YOU radicalized him!
MVega
Profile Joined November 2010
763 Posts
August 10 2012 01:32 GMT
#170
On August 10 2012 10:27 Psychonian wrote:
ffs

God damn it blizzard there is no end of problems with your sites.


I think in the last 10~ years of playing Blizzard games the only issues I had with their out of game stuff was this, which I understand happening as it's happened to several larger corporations in the last couple years, and battle.net emails would get lost routinely several years back. Their website is down for maintenance a lot, but that's not usually problematic. Sometimes they have what feels like excessive downtime on the games. What problems with their sites are you running into? O.o
bumkin: How can you play like 50 games per day... I 4gate 2 times then it's nap time
Bayyne
Profile Joined January 2011
United States1967 Posts
August 10 2012 01:34 GMT
#171
OT but shit that website boosted my password strength morale big time. 147 quadrillion years!

I did also change my password as soon as I heard about this incident as there really is no pressing reason not to.
Remember not only to say the right thing in the right place, but far more difficult still, to leave unsaid the wrong thing at the tempting moment.
oxxo
Profile Joined February 2010
988 Posts
August 10 2012 01:34 GMT
#172
On August 10 2012 10:08 JJH777 wrote:
Lol I'm glad this happened after all the blind fanboys were saying THERE WAS ABSOLUTELY NO WAY the huge amount of D3 accounts getting hacked was a problem on blizzard's end.


Did you even read the announcement? This has nothing to do with the D3 accounts. They got encrypted passwords. Not only that, there's no way for the hackers to know who had D3 or not. They couldn't pick and choose D3 accounts with this stolen information.

Only D3 accounts start getting stolen right after release? Far more likely that people are clicking stuff they shouldn't be.
ggrrg
Profile Blog Joined September 2009
Bulgaria2716 Posts
August 10 2012 01:34 GMT
#173
On August 10 2012 10:16 Integra wrote:
Show nested quote +
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.


I feel like you're somewhat overdoing it ^^ Do you really feel like typing 29 characters just to enter bnet?
According to that website my bnet password is crackable in 19 seconds... I use this password for most stuff I don't care about. But my "secure" password feels somewhat weak, too. 345k years for a regular desktop... I guess it's time to add a number and a special character.
Alakaslam
Profile Blog Joined September 2011
United States17336 Posts
Last Edited: 2012-08-10 01:48:19
August 10 2012 01:45 GMT
#174
On August 10 2012 10:34 ggrrg wrote:
Show nested quote +
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.


I feel like you're somewhat overdoing it ^^ Do you really feel like typing 29 characters just to enter bnet?
According to that website my bnet password is crackable in 19 seconds... I use this password for most stuff I don't care about. But my "secure" password feels somewhat weak, too. 345k years for a regular desktop... I guess it's time to add a number and a special character.

Pick a random year. There's four numbers. Then sum up what that year is to you in a few words. Example: 1972lotof$$GAS would take 2 billion.

Granted mine is 25+ characters but that's my bank acc! Sc2 is still over 16 though.
If you think Elon Musk is a Nazi, it is because YOU radicalized him!
ulan-bat
Profile Blog Joined August 2011
China403 Posts
Last Edited: 2012-08-10 01:48:59
August 10 2012 01:48 GMT
#175
On August 10 2012 10:34 ggrrg wrote:
Show nested quote +
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.


I feel like you're somewhat overdoing it ^^ Do you really feel like typing 29 characters just to enter bnet?
According to that website my bnet password is crackable in 19 seconds... I use this password for most stuff I don't care about. But my "secure" password feels somewhat weak, too. 345k years for a regular desktop... I guess it's time to add a number and a special character.

Please just don't use the same password on every site, that's it. Even if your password takes trillions years to decipher, things like key-loggers or someone behind you at a cafe or any over mean of getting your ULTIMATE PASSWORD would just wreck your world.
At least use "base password+last letters of the site's url", or something.
"Short games, shorts, summer weather, those things bring the heat!" - EG.iNcontroL
robjapan
Profile Joined April 2011
Japan104 Posts
August 10 2012 01:50 GMT
#176
I'd love to change my password.... only one problem!!

The whole of Japan can not access battle.net
Cheese is only cheese when you lose, when you win it's a valid tactic
Ganondorf
Profile Joined April 2010
Italy600 Posts
August 10 2012 01:53 GMT
#177
Was about to type my password on that site that measures how safe it is, but if i type on such a random site, doesn't it make much less safe ? :D

Unless there's a hack to send password hashes directly, they will crack the simplest and most common passwords. Instead of decrypting the hashes, they will encrypt a vocabulary of most commonly used passwords and find the ones with the same hash. So, if you're password wasn't secure, there's a good chance it's compromised.

I'm in Europe so according to Blizzard nothing from there was compromised except emails (still bad if i'll get phishing emails now).
entropius
Profile Joined June 2010
United States1046 Posts
August 10 2012 01:57 GMT
#178
On August 10 2012 10:53 Ganondorf wrote:
Was about to type my password on that site that measures how safe it is, but if i type on such a random site, doesn't it make much less safe ? :D

Unless there's a hack to send password hashes directly, they will crack the simplest and most common passwords. Instead of decrypting the hashes, they will encrypt a vocabulary of most commonly used passwords and find the ones with the same hash. So, if you're password wasn't secure, there's a good chance it's compromised.

I'm in Europe so according to Blizzard nothing from there was compromised except emails (still bad if i'll get phishing emails now).


That site just downloads a Javascript code on your computer that does the math on your end; your password's never transmitted across the network.
Sir.Kimmel
Profile Blog Joined May 2006
United States785 Posts
August 10 2012 01:58 GMT
#179
On August 10 2012 10:16 Integra wrote:
Show nested quote +
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.



This takes into account a basic desktop server..... which can do roughly I think 25k passwords a second with standard bruteforcing it really depends... while our system at work using 4 gpus (mmm cuda) can do 1.7 billion a second... there are custom password cracking machines such as Reliks which does 25 billion a second http://www.hackingtheuniverse.com/infosec/tools/gpu-password-cracking


Now... yes brute forcing takes forever, and its not the most effective, the most effective way is to use rainbow tables... so a standard 8-14 character password can be cracked relatively quickly usually between 5-10 minutes...

so while these websites are nice and give decent ideas.. the numbers are completely wrong...

but remember .. when creating passwords.. complexity is important but the most important aspect of creating a password is length...


the difference between 14 characters and 18 characters is exponential... (30 minutes to 3 months)...

I always recommend using a passphrase... something simple like H! my name is Johny Mc Johnson and I am 24 years old


simple to remember... hardddddd to crack unless u have a specifically tuned list

Lets throw in Canada into the mix and we can rename our country to Camerico. --Klogon
sapht
Profile Blog Joined August 2010
Sweden141 Posts
August 10 2012 01:59 GMT
#180
On August 10 2012 10:53 Ganondorf wrote:
Unless there's a hack to send password hashes directly, they will crack the simplest and most common passwords. Instead of decrypting the hashes, they will encrypt a vocabulary of most commonly used passwords and find the ones with the same hash. So, if you're password wasn't secure, there's a good chance it's compromised.


Not if there's a salt, which there should be, considering that they actually thought about password security and didn't store them in plaintext. Assuming the salt wasn't compromised.

I kinda expected this to happen so I used a unique password for bnet. 1 point for me.
You can use control groups to train units without even looking at your base.
Sir.Kimmel
Profile Blog Joined May 2006
United States785 Posts
August 10 2012 02:00 GMT
#181
On August 10 2012 10:45 Jrocker152 wrote:
Show nested quote +
On August 10 2012 10:34 ggrrg wrote:
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.


I feel like you're somewhat overdoing it ^^ Do you really feel like typing 29 characters just to enter bnet?
According to that website my bnet password is crackable in 19 seconds... I use this password for most stuff I don't care about. But my "secure" password feels somewhat weak, too. 345k years for a regular desktop... I guess it's time to add a number and a special character.

Pick a random year. There's four numbers. Then sum up what that year is to you in a few words. Example: 1972lotof$$GAS would take 2 billion.

Granted mine is 25+ characters but that's my bank acc! Sc2 is still over 16 though.



just for the record.. a recent client has something a lot like this their DoB then some standard text and "1337" speak.. it was 2 characters longer and we popped that sucker soooo fast


my truecrypt password for my work system is 34 characters, my keepass password is 44 and all my accounts are stored in there... random passwords generated with the max length I can use on the website...
Lets throw in Canada into the mix and we can rename our country to Camerico. --Klogon
MxGStreamA
Profile Joined March 2012
35 Posts
August 10 2012 02:02 GMT
#182
On August 10 2012 08:24 R1CH wrote:
Show nested quote +
On August 10 2012 08:19 MxGStreamA wrote:
I was hit by this, someone hacked the account, changed the password, played some ladder games.

Unrelated, you probably had a bad / shared password beforehand. A hacking group advanced enough to break into Blizzard's network isn't really after your SC2 ladder rank.


You are wrong, I don't not share my account. He was giving my password to everyone.
Shenghi
Profile Joined August 2010
167 Posts
Last Edited: 2012-08-10 02:13:16
August 10 2012 02:12 GMT
#183
On August 10 2012 11:00 Sir.Kimmel wrote:
Show nested quote +
On August 10 2012 10:45 Jrocker152 wrote:
On August 10 2012 10:34 ggrrg wrote:
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.


I feel like you're somewhat overdoing it ^^ Do you really feel like typing 29 characters just to enter bnet?
According to that website my bnet password is crackable in 19 seconds... I use this password for most stuff I don't care about. But my "secure" password feels somewhat weak, too. 345k years for a regular desktop... I guess it's time to add a number and a special character.

Pick a random year. There's four numbers. Then sum up what that year is to you in a few words. Example: 1972lotof$$GAS would take 2 billion.

Granted mine is 25+ characters but that's my bank acc! Sc2 is still over 16 though.



just for the record.. a recent client has something a lot like this their DoB then some standard text and "1337" speak.. it was 2 characters longer and we popped that sucker soooo fast


my truecrypt password for my work system is NN characters, my keepass password is MM and all my accounts are stored in there... random passwords generated with the max length I can use on the website...

I do hope you made those numbers up, as the length of a password being unknown is a huge part of its strength.
People are not born stupid, they choose to be stupid. If you made that choice, please change your mind.
Nosferatos
Profile Joined April 2010
Norway783 Posts
August 10 2012 02:13 GMT
#184
I've been e-mailed by an "fake" blizzard e-mail account since the 25th of last month, with new mails every 3rd day since. Asking me to give up personal/account info, because im trying to "Sell my Diablo 3 Account". I venture to guess that the breach must have happend around the 25th of July, if so the detection time was pretty slow....
"Show me the Raven" ~ HMS turns into a mini-nuke, going twice as fast and doing 250 damage over a large area.
ulan-bat
Profile Blog Joined August 2011
China403 Posts
August 10 2012 02:14 GMT
#185
On August 10 2012 11:02 MxGStreamA wrote:
Show nested quote +
On August 10 2012 08:24 R1CH wrote:
On August 10 2012 08:19 MxGStreamA wrote:
I was hit by this, someone hacked the account, changed the password, played some ladder games.

Unrelated, you probably had a bad / shared password beforehand. A hacking group advanced enough to break into Blizzard's network isn't really after your SC2 ladder rank.


You are wrong, I don't not share my account. He was giving my password to everyone.

R1CH is right (OBVIOUSLY). But those email addresses may have traveled around in those 5 days since the attack.
Let's see...
"Short games, shorts, summer weather, those things bring the heat!" - EG.iNcontroL
Porcelina
Profile Blog Joined May 2011
United Kingdom3249 Posts
August 10 2012 02:22 GMT
#186
On August 10 2012 11:13 Nosferatos wrote:
I've been e-mailed by an "fake" blizzard e-mail account since the 25th of last month, with new mails every 3rd day since. Asking me to give up personal/account info, because im trying to "Sell my Diablo 3 Account". I venture to guess that the breach must have happend around the 25th of July, if so the detection time was pretty slow....


Personally I have had those e-mails since forever on multiple e-mail accounts, two of them not linked to any battle.net account. I do not think that this is a good way of judging when the breach actually occurred.
Assirra
Profile Joined August 2010
Belgium4169 Posts
August 10 2012 02:28 GMT
#187
On August 10 2012 11:13 Nosferatos wrote:
I've been e-mailed by an "fake" blizzard e-mail account since the 25th of last month, with new mails every 3rd day since. Asking me to give up personal/account info, because im trying to "Sell my Diablo 3 Account". I venture to guess that the breach must have happend around the 25th of July, if so the detection time was pretty slow....

That is just age old physhing scam, nothing to do with the current problem.
SigmaoctanusIV
Profile Blog Joined April 2010
United States3313 Posts
August 10 2012 02:28 GMT
#188
Oh noes someone might change my portrait and lose me some ladder games!!

In all seriousness Blizzard is pretty good about getting these things fixed.

Also what about authenticators don't they pretty much make this point mute? Well if you have one I guess.
I am Godzilla You are Japan
Nosferatos
Profile Joined April 2010
Norway783 Posts
August 10 2012 02:28 GMT
#189
On August 10 2012 11:22 Porcelina wrote:
Show nested quote +
On August 10 2012 11:13 Nosferatos wrote:
I've been e-mailed by an "fake" blizzard e-mail account since the 25th of last month, with new mails every 3rd day since. Asking me to give up personal/account info, because im trying to "Sell my Diablo 3 Account". I venture to guess that the breach must have happend around the 25th of July, if so the detection time was pretty slow....


Personally I have had those e-mails since forever on multiple e-mail accounts, two of them not linked to any battle.net account. I do not think that this is a good way of judging when the breach actually occurred.


True, but this is the first time in the 8 years I've had such an e-mail from a fake Blizzard, and then I get one just a week before the breach. might be an coincidence or maybe it's more.
"Show me the Raven" ~ HMS turns into a mini-nuke, going twice as fast and doing 250 damage over a large area.
Sinensis
Profile Blog Joined April 2009
United States2513 Posts
August 10 2012 02:30 GMT
#190
People should learn to use passphrases. Contrary to popular belief having numbers and symbols in your password does not make it more difficult to crack. Adding length to your password is the only way to make it more secure.

some examples:

"MyDearAuntSally"
"Youmustconstructadditionalpylons"
"Youhavenotenoughminerals"
Medrea
Profile Joined May 2011
10003 Posts
Last Edited: 2012-08-10 02:36:38
August 10 2012 02:31 GMT
#191
On August 10 2012 11:28 Nosferatos wrote:
Show nested quote +
On August 10 2012 11:22 Porcelina wrote:
On August 10 2012 11:13 Nosferatos wrote:
I've been e-mailed by an "fake" blizzard e-mail account since the 25th of last month, with new mails every 3rd day since. Asking me to give up personal/account info, because im trying to "Sell my Diablo 3 Account". I venture to guess that the breach must have happend around the 25th of July, if so the detection time was pretty slow....


Personally I have had those e-mails since forever on multiple e-mail accounts, two of them not linked to any battle.net account. I do not think that this is a good way of judging when the breach actually occurred.


True, but this is the first time in the 8 years I've had such an e-mail from a fake Blizzard, and then I get one just a week before the breach. might be an coincidence or maybe it's more.


If they hacked Blizzard to send out emails they would NOT use a fake email they would use the real one -.-
twitch.tv/medrea
xevis
Profile Joined September 2010
United States218 Posts
August 10 2012 02:31 GMT
#192
Most of those phishing scams are coming from old or current guilds you applied for.
How can you have any pudding if you don't eat your meat?
NeMeSiS3
Profile Blog Joined February 2012
Canada2972 Posts
August 10 2012 02:32 GMT
#193
On August 10 2012 11:14 ulan-bat wrote:
Show nested quote +
On August 10 2012 11:02 MxGStreamA wrote:
On August 10 2012 08:24 R1CH wrote:
On August 10 2012 08:19 MxGStreamA wrote:
I was hit by this, someone hacked the account, changed the password, played some ladder games.

Unrelated, you probably had a bad / shared password beforehand. A hacking group advanced enough to break into Blizzard's network isn't really after your SC2 ladder rank.


You are wrong, I don't not share my account. He was giving my password to everyone.

R1CH is right (OBVIOUSLY). But those email addresses may have traveled around in those 5 days since the attack.
Let's see...


Lol stop it R1CH, you're not saying the world revolves around him you silly silly man, of COURSE they're after his ladder rank/account ^^.
FoTG fighting!
Barbiero
Profile Blog Joined September 2010
Brazil5259 Posts
August 10 2012 02:34 GMT
#194
On August 10 2012 11:28 SigmaoctanusIV wrote:
Oh noes someone might change my portrait and lose me some ladder games!!

In all seriousness Blizzard is pretty good about getting these things fixed.

Also what about authenticators don't they pretty much make this point mute? Well if you have one I guess.


It's pretty huge if authenticators have been compromised(according to blizzard), especially for some players with highly valuable WoW accounts(with legendary items, achievements, titles, mounts, pets...).

I'm just waiting for the update on my cellphone
♥ The world needs more hearts! ♥
Nosferatos
Profile Joined April 2010
Norway783 Posts
Last Edited: 2012-08-10 02:35:51
August 10 2012 02:34 GMT
#195
On August 10 2012 11:31 Medrea wrote:
Show nested quote +
On August 10 2012 11:28 Nosferatos wrote:
On August 10 2012 11:22 Porcelina wrote:
On August 10 2012 11:13 Nosferatos wrote:
I've been e-mailed by an "fake" blizzard e-mail account since the 25th of last month, with new mails every 3rd day since. Asking me to give up personal/account info, because im trying to "Sell my Diablo 3 Account". I venture to guess that the breach must have happend around the 25th of July, if so the detection time was pretty slow....


Personally I have had those e-mails since forever on multiple e-mail accounts, two of them not linked to any battle.net account. I do not think that this is a good way of judging when the breach actually occurred.


True, but this is the first time in the 8 years I've had such an e-mail from a fake Blizzard, and then I get one just a week before the breach. might be an coincidence or maybe it's more.


If they hacked Blizzard to send out emails they would use a fake email they would use the real one -.-


Oh, it looks real and all, but one of the links in the e-mail goes to a fake "blizzard" acount site, the rest looks "real" enough to fool a "ignorant" person.
"Show me the Raven" ~ HMS turns into a mini-nuke, going twice as fast and doing 250 damage over a large area.
Medrea
Profile Joined May 2011
10003 Posts
August 10 2012 02:38 GMT
#196
On August 10 2012 11:34 Nosferatos wrote:
Show nested quote +
On August 10 2012 11:31 Medrea wrote:
On August 10 2012 11:28 Nosferatos wrote:
On August 10 2012 11:22 Porcelina wrote:
On August 10 2012 11:13 Nosferatos wrote:
I've been e-mailed by an "fake" blizzard e-mail account since the 25th of last month, with new mails every 3rd day since. Asking me to give up personal/account info, because im trying to "Sell my Diablo 3 Account". I venture to guess that the breach must have happend around the 25th of July, if so the detection time was pretty slow....


Personally I have had those e-mails since forever on multiple e-mail accounts, two of them not linked to any battle.net account. I do not think that this is a good way of judging when the breach actually occurred.


True, but this is the first time in the 8 years I've had such an e-mail from a fake Blizzard, and then I get one just a week before the breach. might be an coincidence or maybe it's more.


If they hacked Blizzard to send out emails they would use a fake email they would use the real one -.-


Oh, it looks real and all, but one of the links in the e-mail goes to a fake "blizzard" acount site, the rest looks "real" enough to fool a "ignorant" person.


I forgot a NOT in there.

If they compromised the site why would they use fake anything? They have the site lol.

Phishing has been going on forever, this is entirely unrelated. The only relation is that now youll get more phishing emails trying to phish for people changing there passwords from what happened.
twitch.tv/medrea
xrapture
Profile Blog Joined December 2011
United States1644 Posts
August 10 2012 02:39 GMT
#197
On August 10 2012 10:12 AnachronisticAnarchy wrote:
Show nested quote +
On August 10 2012 09:33 Serpico wrote:
On August 10 2012 09:31 xrapture wrote:
My email:

Decado@writing.com


Password:

teehee12



Do whatever the fuck you want.

So many pussies crying over nothing.

This guy is super tough. What a tough guy.


Also stupid, unless he doesn't want to play SC2 anymore. He probably forgot that we can do more than just bomb his MMR, such as changing his password and information.


Someone did change the password and it took me less than a minute to recover it....
Everyone is either delusional, a nihlilst, or dead from suicide.
DodgySmalls
Profile Joined June 2012
Canada158 Posts
August 10 2012 02:43 GMT
#198
fuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu

I used one of my best and probably my most commonly used password for relevant things like e-mail and maybe even paypal.
Extremely irritating that I will need to switch all these passwords, but can't really blame blizzard, these things happen to everyone eventually.

Good thing this was posted on TL or I probably wouldn't have noticed it.
Please remove nyx assassin
Burns
Profile Blog Joined December 2010
United States2300 Posts
August 10 2012 02:45 GMT
#199
wow someone must be fucking mad at blizzard
What do you mean you heard me during the night, these are quiet pants!
JJH777
Profile Joined January 2011
United States4408 Posts
August 10 2012 02:47 GMT
#200
On August 10 2012 10:34 oxxo wrote:
Show nested quote +
On August 10 2012 10:08 JJH777 wrote:
Lol I'm glad this happened after all the blind fanboys were saying THERE WAS ABSOLUTELY NO WAY the huge amount of D3 accounts getting hacked was a problem on blizzard's end.


Did you even read the announcement? This has nothing to do with the D3 accounts. They got encrypted passwords. Not only that, there's no way for the hackers to know who had D3 or not. They couldn't pick and choose D3 accounts with this stolen information.

Only D3 accounts start getting stolen right after release? Far more likely that people are clicking stuff they shouldn't be.


All blizzard accounts are linked. My point was that if it happened now it could have happened before.
YungLee
Profile Joined February 2011
29 Posts
August 10 2012 02:55 GMT
#201
the automated process
EvanED
Profile Joined October 2009
United States111 Posts
Last Edited: 2012-08-10 03:08:47
August 10 2012 03:03 GMT
#202
On August 10 2012 10:30 Wuster wrote:
1 business week isn't all that long. What they said is pretty reasonable at face value.

After all, the PSN mess was exacerbated by them claiming that no personal data was lost, then no financial data was lost, then 'actually they got everything'. That's not just bad PR, it also prevents customers from actually doing anything about the security breach in a timely manner

So does not saying anything for a week...

On August 10 2012 10:58 Sir.Kimmel wrote:
This takes into account a basic desktop server..... which can do roughly I think 25k passwords a second with standard bruteforcing it really depends... while our system at work using 4 gpus (mmm cuda) can do 1.7 billion a second... there are custom password cracking machines such as Reliks which does 25 billion a second http://www.hackingtheuniverse.com/infosec/tools/gpu-password-cracking

Their time numbers are based off of 4 billion passwords/sec.

On August 10 2012 11:30 Sinensis wrote:
People should learn to use passphrases. Contrary to popular belief having numbers and symbols in your password does not make it more difficult to crack. Adding length to your password is the only way to make it more secure.

That's not true! It's barely even partly true.

Common substitutions like "1" for "l" and "0" for "o" don't add nearly as much security as you might think, nor do non-alphanumeric characters stuck at the beginning or end of you passwords. However, "not adding as much as you think" is still adding some, and better application of symbols can add quite a bit of extra strength without adding length.

(Now, that said... I have pass "phrases" (somewhere between a phrase and an XKCD-style "correct horse battery staple" collection of unrelated words) that I use for a couple of my higher-value accounts. (That is, those that I don't use "hunter2" on. :-)) So I'm not dissing the idea -- in fact, I'd recommend it. Though I'd go for a much less common phrase than any of your examples.)
Deleted User 135096
Profile Blog Joined December 2010
3624 Posts
August 10 2012 03:19 GMT
#203
On August 10 2012 07:42 mataxp wrote:
As a PSN user, dejá vu

save for the whole unencrypted text file full of sensitive information...or am I not remembering that right?
Administrator
Azera
Profile Blog Joined December 2010
3800 Posts
August 10 2012 03:21 GMT
#204
Goddamit, I really don't want to change passwords just to stay safe...
Check out some great music made by TLers - http://bit.ly/QXYhdb , by intrigue. http://bit.ly/RTjpOR , by ohsea.toc.
TheEmulator
Profile Blog Joined July 2010
28090 Posts
August 10 2012 03:23 GMT
#205
This is so annoying. I have to spend 3 minutes changing my password.
Administrator
Ballistixz
Profile Joined January 2010
United States1269 Posts
August 10 2012 03:28 GMT
#206
this was bound to happen sooner or later. the sheer ammount of ignorance and arrogance blizzard was posing with there security has finnally backfired on them. the thousands of hacks D3 got during the first few weeks/months of D3s released was brushed aside by blizzard saying "lol get an authenticator." at times they act like they couldnt be breached just because of the fact that "we have never been breached before in all of blizzards history".

maybe now blizz will finnally step up there damn security instead of telling everyone and there mom to "get a authenticator and u will be 99.99% safe derp".
julianto
Profile Joined December 2010
2292 Posts
Last Edited: 2012-08-10 03:31:55
August 10 2012 03:28 GMT
#207
On August 10 2012 12:23 TheEmulator wrote:
This is so annoying. I have to spend 3 minutes changing my password.

I spent 30 minutes changing passwords and security questions connected in any way to my blizzard account. Now all I need to do is change my security questions for battlenet itself. Too bad there wasn't an option to change the security questions in the first place.

edit: I'd really like Blizzard's password character limit to be much, much higher.

On August 10 2012 11:13 Nosferatos wrote:
I've been e-mailed by an "fake" blizzard e-mail account since the 25th of last month, with new mails every 3rd day since. Asking me to give up personal/account info, because im trying to "Sell my Diablo 3 Account". I venture to guess that the breach must have happend around the 25th of July, if so the detection time was pretty slow....

If I was in your situation, I'd troll them back. Give them some derogatory message in the form of a password.
¯\_(ツ)_/¯
Zato-1
Profile Blog Joined March 2009
Chile4253 Posts
August 10 2012 03:32 GMT
#208
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

Salted hashes of passwords are still easy to crack if the password itself is common (read: if it can be found on a password dictionary that hackers use to brute force passwords), and Battle.net passwords are capped at 16 characters for some stupid reason, so I'd wager that a large percentage of these "cryptographically scrambled" versions of passwords can and will be cracked.

So as Probe said... change your passwords, yeah.
Go here http://vina.biobiochile.cl/ and input the Konami Code (up up down down left right left right B A)
Dodgin
Profile Blog Joined July 2011
Canada39254 Posts
August 10 2012 03:33 GMT
#209
On August 10 2012 12:28 Ballistixz wrote:
this was bound to happen sooner or later. the sheer ammount of ignorance and arrogance blizzard was posing with there security has finnally backfired on them. the thousands of hacks D3 got during the first few weeks/months of D3s released was brushed aside by blizzard saying "lol get an authenticator." at times they act like they couldnt be breached just because of the fact that "we have never been breached before in all of blizzards history".

maybe now blizz will finnally step up there damn security instead of telling everyone and there mom to "get a authenticator and u will be 99.99% safe derp".


Well, if you have an authenticator you would be safe even if they did get your password.
zhurai
Profile Blog Joined September 2010
United States5660 Posts
August 10 2012 03:39 GMT
#210
On August 10 2012 10:16 Integra wrote:
Show nested quote +
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.

maybe if they try cracking it on one computer with a single core
Twitter: @zhurai | Site: http://zhurai.com
bakedace
Profile Blog Joined March 2010
United States672 Posts
August 10 2012 03:40 GMT
#211
On August 10 2012 12:28 Ballistixz wrote:
this was bound to happen sooner or later. the sheer ammount of ignorance and arrogance blizzard was posing with there security has finnally backfired on them. the thousands of hacks D3 got during the first few weeks/months of D3s released was brushed aside by blizzard saying "lol get an authenticator." at times they act like they couldnt be breached just because of the fact that "we have never been breached before in all of blizzards history".

maybe now blizz will finnally step up there damn security instead of telling everyone and there mom to "get a authenticator and u will be 99.99% safe derp".


Nothing is ever completely secure. Anything can be hacked. Using an authenticator is just common sense for anything you want to protect on the internet.
Aberu
Profile Blog Joined April 2010
United States968 Posts
Last Edited: 2012-08-10 03:49:25
August 10 2012 03:48 GMT
#212
On August 10 2012 07:42 mataxp wrote:
As a PSN user, dejá vu


Well not quite, Blizzard wasn't storing their passwords unencrypted.

I'm not panicking my password would take over 63 million years to crack apparently.
srsly
babysimba
Profile Joined November 2010
10466 Posts
August 10 2012 03:49 GMT
#213
It's not a big deal getting hacked if your bnet acct only has sc2, or you didn't invest too much into WoW/D3. There's nothing valuable in a sc2 acct. Just don't have your bnet password link to your more personal accounts, and you can easily recover it back.

All in all, I learn quite a few things about passwords in this thread though :D
Integra
Profile Blog Joined January 2008
Sweden5626 Posts
Last Edited: 2012-08-10 03:56:20
August 10 2012 03:54 GMT
#214
On August 10 2012 10:34 ggrrg wrote:
Show nested quote +
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.


I feel like you're somewhat overdoing it ^^ Do you really feel like typing 29 characters just to enter bnet?
According to that website my bnet password is crackable in 19 seconds... I use this password for most stuff I don't care about. But my "secure" password feels somewhat weak, too. 345k years for a regular desktop... I guess it's time to add a number and a special character.

I'm a IT specialist, so its a habit from work. My normal passwords (yes I have a different password for each website and program I use) usually are around 50 letters. All websites can't take those kinds of passwords though. And the time constraints is no problem for me since I'm a seasoned programmer, I type fairly fast, hell it happens that I even use programming code, like parts of functions as my passwords Think I used some newly developed php code I made for the simpleMachine forum as my password for my twitter account, lol
"Dark Pleasure" | | I survived the Locust war of May 3, 2014
Jedclark
Profile Blog Joined February 2011
United Kingdom903 Posts
August 10 2012 03:56 GMT
#215
It's a good day to live in Europe. Wonder who the hackers were, and what their purpose was once they got the information.
"They make it so scrubnubs can PM me. They make it so I can't ignore scrubnubs!" - "I'm gonna show you how great I am." MKP fan since GSL Open Season 2 #hipsternerd
Zato-1
Profile Blog Joined March 2009
Chile4253 Posts
August 10 2012 04:07 GMT
#216
On August 10 2012 12:39 zhurai wrote:
Show nested quote +
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.

maybe if they try cracking it on one computer with a single core

Actually, if you're serious about cracking a large number of passwords then you don't care so much about your processor, you'll get a high-end graphics card to do the brunt of the work because they have orders of magnitude more computing power for this purpose. Also, in its estimate, that site makes the rather huge (and probably incorrect) assumption that the programs hackers use will be sequentially trying completely random sequences of characters, when there are substantially more efficient ways to crack more than enough bad passwords to make it worth your while.
Go here http://vina.biobiochile.cl/ and input the Konami Code (up up down down left right left right B A)
EvanED
Profile Joined October 2009
United States111 Posts
August 10 2012 04:07 GMT
#217
The good part of this is it finally kicked me to go fix my password situation a bit. I was using the same password on Battle.Net as a few other, moderate-importance sites, including my Google account. So I went through and fixed those and now they have different and stronger passwords.

And that password strength site says that my new Google password will take 97,807,199,722,288,020,000,000,000,000,000,000,000,000,000 (97 tredecillion) years to crack :-).

On the downside, I also figured I'd bump up the length on the password for my bank, and... it has a max length of 10 characters. That just boggles my mind, especially because otherwise they're really quite good and have a pretty sophisticated and nice web banking setup.
Pucca
Profile Blog Joined January 2012
Taiwan1280 Posts
August 10 2012 04:10 GMT
#218
I really hope they did not get access to my cards on my account I hate when I read these things it always make me anxious!
Master Chief
MVega
Profile Joined November 2010
763 Posts
August 10 2012 04:11 GMT
#219
To the people speculating whether the phishing emails are related to the breach, or wondering if when you first received such an email was the start of the "breach": No. If that were the case the breach occured back in 2005. That's when WoW players started getting spammed with those emails. So no. That's just pretty standard phishing stuff that's not related. They seem to send those out at random. I know people that get those and don't even have WoW or Diablo accounts or even Battle.net accounts.
bumkin: How can you play like 50 games per day... I 4gate 2 times then it's nap time
sudosu
Profile Joined October 2011
France120 Posts
Last Edited: 2012-08-10 14:23:46
August 10 2012 04:12 GMT
#220
"cryptographically scrambled versions"
"each password would have to be deciphered individually"

And why the hell are the passwords ciphered and not hashed ? There is absolutely no reason to store ciphered passwords because there is even less reason to decipher a password.

Anyway Blizzard seems to have reacted in a good and quick way, that's nice.
zhurai
Profile Blog Joined September 2010
United States5660 Posts
August 10 2012 04:13 GMT
#221
On August 10 2012 13:07 Zato-1 wrote:
Show nested quote +
On August 10 2012 12:39 zhurai wrote:
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.

maybe if they try cracking it on one computer with a single core

Actually, if you're serious about cracking a large number of passwords then you don't care so much about your processor, you'll get a high-end graphics card to do the brunt of the work because they have orders of magnitude more computing power for this purpose. Also, in its estimate, that site makes the rather huge (and probably incorrect) assumption that the programs hackers use will be sequentially trying completely random sequences of characters, when there are substantially more efficient ways to crack more than enough bad passwords to make it worth your while.

I know. I'm just saying that site is unrealistic which probably is a simulating a computer that can only work on one thing at a time rather than e.g. multithreading cracking, using dictionary tables, etc.

(read: sarcasm)
Twitter: @zhurai | Site: http://zhurai.com
sudosu
Profile Joined October 2011
France120 Posts
August 10 2012 04:32 GMT
#222
On August 10 2012 13:13 zhurai wrote:
Show nested quote +
On August 10 2012 13:07 Zato-1 wrote:
On August 10 2012 12:39 zhurai wrote:
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.

maybe if they try cracking it on one computer with a single core

Actually, if you're serious about cracking a large number of passwords then you don't care so much about your processor, you'll get a high-end graphics card to do the brunt of the work because they have orders of magnitude more computing power for this purpose. Also, in its estimate, that site makes the rather huge (and probably incorrect) assumption that the programs hackers use will be sequentially trying completely random sequences of characters, when there are substantially more efficient ways to crack more than enough bad passwords to make it worth your while.

I know. I'm just saying that site is unrealistic which probably is a simulating a computer that can only work on one thing at a time rather than e.g. multithreading cracking, using dictionary tables, etc.

(read: sarcasm)



Actually the chinese with their supercalculator may be able to break his password in a few months xD (can't remember how many units of 16 cores they have).
Droom
Profile Joined May 2009
23 Posts
Last Edited: 2012-08-10 04:38:25
August 10 2012 04:37 GMT
#223
So now I know why " FedExe delivery failure" and "Penis Enlargment" got through my spam.

Edit: Changing password now
Clazziquai10
Profile Blog Joined August 2011
Singapore1949 Posts
August 10 2012 04:41 GMT
#224
And blizzard screws up again. How surprising.
Chargelot
Profile Blog Joined December 2010
2275 Posts
Last Edited: 2012-08-10 04:52:50
August 10 2012 04:52 GMT
#225
On August 10 2012 13:41 Clazziquai10 wrote:
And blizzard screws up again. How surprising.

No. You're wrong. When you're a multibillion dollar corporation which operates with user information online, there are people constantly targeting you.

Bank vaults can be opened.
Safes can be cracked.
Door knobs can be picked.
Email passwords can be stolen.

So long as locks continue to have the singular flaw of allowing authorized users to bypass their security nothing which is kept behind locked doors will ever be completely safe. Imagine the number of attempts they have halted. Imagine how many times people have tried to access this data. Considering the frequency of their success, I would say Blizzard is doing a damned good job.
if (post == "stupid") { document.getElementById('post').style.display = 'none'; }
Parcelleus
Profile Joined January 2011
Australia1662 Posts
August 10 2012 04:55 GMT
#226
Thanks for the speedy heads-up BliZZ.

Password changed.
*burp*
zhurai
Profile Blog Joined September 2010
United States5660 Posts
August 10 2012 04:58 GMT
#227
On August 10 2012 13:52 Chargelot wrote:
Show nested quote +
On August 10 2012 13:41 Clazziquai10 wrote:
And blizzard screws up again. How surprising.

No. You're wrong. When you're a multibillion dollar corporation which operates with user information online, there are people constantly targeting you.

Bank vaults can be opened.
Safes can be cracked.
Door knobs can be picked.
Email passwords can be stolen.

So long as locks continue to have the singular flaw of allowing authorized users to bypass their security nothing which is kept behind locked doors will ever be completely safe. Imagine the number of attempts they have halted. Imagine how many times people have tried to access this data. Considering the frequency of their success, I would say Blizzard is doing a damned good job.

regarding security. never assume you're 100% safe.
Twitter: @zhurai | Site: http://zhurai.com
bokchoi
Profile Blog Joined March 2010
Korea (South)9498 Posts
August 10 2012 05:02 GMT
#228
Good thing I never had any credit card information associated with my US battle.net account.
Greggle
Profile Joined June 2010
United States1131 Posts
August 10 2012 05:03 GMT
#229
On August 10 2012 13:41 Clazziquai10 wrote:
And blizzard screws up again. How surprising.

In the past few years this has happened to far bigger names and with far worse outcomes. Nobody is safe from this.
Life is too short to take it seriously.
SwiftSpear
Profile Joined February 2010
Canada355 Posts
August 10 2012 05:09 GMT
#230
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

Cryptographically scrambled passwords aren't unbreakable, it just takes too much computational effort to unscramble the entire database. Cherry picked accounts can still easily be unscrambled.

It effectively means they have your password if they're willing to devote effort to acquiring it. If there are other places of significance where you use the same password and your identity is traceable through your account data, change those passwords as well.

So if you use your blizzard password as your bank password, and your email is basically your real name, change that shit.
fer
Profile Joined November 2010
Canada375 Posts
August 10 2012 05:11 GMT
#231
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Yes, trust math
WellPlayed.org <3
Shield
Profile Blog Joined August 2009
Bulgaria4824 Posts
August 10 2012 05:11 GMT
#232
Oh god... I know Blizzard are lazy, but now not secure enough...? -.-
Prophanity
Profile Joined January 2012
United States165 Posts
August 10 2012 05:27 GMT
#233
On August 10 2012 14:11 darkness wrote:
Oh god... I know Blizzard are lazy, but now not secure enough...? -.-


People can break into government agencies and you think it surprising that a videogame manufacturer isn't foolproof?

Welcome to the internet - nothing is ever truly safe.
Firenza
Profile Joined October 2011
United States51 Posts
August 10 2012 05:29 GMT
#234
This thread has been really insightful. Thanks to all the folks dropping some real security knowledge.

Good advice for sex and passwords: Don't fool around with ridiculous characters. Hash makes it better. Size matters.
Xapti
Profile Joined April 2010
Canada2473 Posts
August 10 2012 05:32 GMT
#235
I felt like Battle.net e-mails were leaked long before this. I kinda doubt it's a coincidence when I start getting blizzard-game-related spam mail a while after using the e-mail for a battle.net account.
"Then he told me to tell you that he wouldn't piss on you if you were on fire" — "Well, you tell him that I said that I wouldn't piss on him if he was on Jeopardy!"
EvanED
Profile Joined October 2009
United States111 Posts
Last Edited: 2012-08-10 05:39:03
August 10 2012 05:37 GMT
#236
On August 10 2012 13:12 sudosu wrote:
"cryptographically scrambled versions"
"each password would have to be deciphered individually"

Andwhy the hell are the passwords ciphered and not hashed ?

I'd guess that's what Blizzard actually does, and their webpage has simplified the description so that people who haven't gone through a CS undergrad know what it means. :-) (OK, that's an exgeration a bit, but I still think it's mostly true.)

Besides, the first quote is perfectly applicable to the hashing scenario anyway (and in fact the weird wording of the first quote just makes me more sure of my guess).

There is absolutely no reason to store ciphered passwords because there is even less reason to deciphered a password.

(The following isn't really meant to say you're wrong per se -- and definitely not in this scenario -- just to add some additional information that the above isn't some inviolable rule.)

So it's pretty inapplicable to the WWW scenario, but by my understanding there is actually one reason that storing passwords in encrypted (and not hashed) form is a fairly legitimate tactic: it allows mutual authentication without a trusted third-party.

Alice wants to talk to Bob, so Alice picks a random secret key to use in future messages (the "session key") and encrypts that key with her password, and forwards it off to Bob, along with "I'm Alice!" in plaintext. Bob looks up Alice's password (decrypting it if necessary), uses that to decrypt the session key. Now both Alice and Bob know the session key, and no one else can subject to the strength of Alice's password. They can then handshake to make sure they have the same session key -- if they do, then mutual authentication is successful. Mallory can't mimic Alice because he can't encrypt the session key without Alice's password, nor can he mimic Bob because he can't decrypt it for the same reason.

My understanding (though this is weak and stuff I learned quite a long time ago so I could be wrong) is this idea is behind Kerberos. Kerberos adds a bunch of additional layers (and protections against other attacks like replays), and calls the "password" the "password hash" -- but it's basically how it works. (What I mean by that password vs password hash comment is that everything you need to do to authenticate yourself in Kerberos -- if I'm right -- you can do with the password hash. The extra hash step bascially provides no protection except that an attacker would have a hard time reversing to the actual input from the user to try to apply to other sites.)

(SSL gets around this by having "trusted" third parties -- e.g. Verisign -- attest to the identity of one of the parties via its public key.)

(I'd appreciate any comments about how much of what I say here is correct. :-))
Droom
Profile Joined May 2009
23 Posts
August 10 2012 05:37 GMT
#237
Seeing this is my expertise, I can comment on this;

Bank vaults can be opened.
Safes can be cracked.
Door knobs can be picked.
Email passwords can be stolen

It's what you do with the info that matters!

I said that I received 3 emails that got through my filters, and that the FexEx asks for info (2009) ( my wife almost clicked).

I'm just trying to say that a lot of this stuff can be harmless but this 1 needs to be addressed


GoonFFS
Profile Joined April 2010
Denmark323 Posts
August 10 2012 05:38 GMT
#238
no probs
http://konvictgaming.com/ -> @KrugerFFS
Danglars
Profile Blog Joined August 2010
United States12133 Posts
August 10 2012 05:41 GMT
#239
I would never have expected Blizzard to be exploited in this way! Man, the site is such a rich hacking field, so many accounts reside on it. I'm like ... surely they've seen everything, are prepared against everything ... but wow, how meddlesome are the bugs that remain.

At least the passwords had cryptographic protection unlike controversies like Sony.
Great armies come from happy zealots, and happy zealots come from California!
TL+ Member
figq
Profile Blog Joined May 2010
12519 Posts
August 10 2012 05:56 GMT
#240
I just received recently a warning on my Battle.net email that someone unauthorized was trying to access it from North America. So these hackers are actively trying to break the emails, beware.

I was wondering how a hacker could even find this particular email, because I don't use it in any public forms, only for Battle.net.
If you stand next to my head, you can hear the ocean. - Day[9]
Shinta)
Profile Joined July 2010
United States1716 Posts
August 10 2012 05:57 GMT
#241
yeah... I got several (I think 6?) emails from Blizzard last week saying my bnet account was being hacked.... Idk if this and that are the same, but wtf man...
Suteki Da Ne 素敵だね Isn't it Wonderful
ZeroClick
Profile Joined March 2012
Brazil63 Posts
August 10 2012 06:09 GMT
#242
Ghosts...
kasik047
Profile Joined May 2010
United States33 Posts
August 10 2012 06:11 GMT
#243
Atleast blizz is owning up to the problem and being open about it.
pseudocalm
Profile Joined October 2010
Canada98 Posts
August 10 2012 06:12 GMT
#244
all accounts except chinese accounts.....i see
I'd put my sensor tower in her minimap
cYaN
Profile Joined May 2004
Norway3322 Posts
August 10 2012 06:27 GMT
#245
Sounds fine. At least they didn't get hacked and basically have a txt file with people's cc info. haha.
SoniC_eu
Profile Joined April 2011
Denmark1008 Posts
August 10 2012 06:57 GMT
#246
Changing passwords...NOW!
In order to succeed, your desire for success should be greater than your fear of failure. http://da.twitch.tv/sonic_eu
NrG.Bamboo
Profile Blog Joined December 2006
United States2756 Posts
August 10 2012 07:02 GMT
#247
On August 10 2012 13:37 Droom wrote:
So now I know why " FedExe delivery failure" and "Penis Enlargment" got through my spam.

Edit: Changing password now

I think that has more to do with your porn than your bnet account.
I need to protect all your life you can enjoy the vibrant life of your battery
imJealous
Profile Joined July 2010
United States1382 Posts
August 10 2012 07:14 GMT
#248
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

I do, but I'm still going to change my password and security questions because its incredibly easy
... In life very little goes right. "Right" meaning the way one expected and the way one wanted it. One has no right to want or expect anything.
valaki
Profile Joined June 2009
Hungary2476 Posts
August 10 2012 07:20 GMT
#249
Blizzard should have gotten authenticators, and this wouldn't have happened.
ggaemo fan
ravemir
Profile Joined April 2011
Portugal595 Posts
August 10 2012 07:21 GMT
#250
No EU acion needed? Phew, last time GOM TV needed this it was a hassle to memorize the new pass.

Also, "kudos" on the "scrambled" passwords. Even if anyone who knows computer security has it as no-brainer step to protecting data, it seems that people neglect it IRL more often than not.
"more gg, more skill"
_fool
Profile Joined February 2011
Netherlands677 Posts
August 10 2012 07:21 GMT
#251
To state the obvious: if both your email account and (a hashed version of) your password has leaked, AND you use that combination of mail address and password elsewhere (e.g. your webmail, or facebook) then make sure to change your login details on those sites too!

(GOM leaking all their passwords *plaintext* made me aware of how dangerous password reuse is)
"News is to the mind what sugar is to the body"
xcitenl
Profile Joined May 2012
Netherlands8 Posts
August 10 2012 07:25 GMT
#252
Oo Big props to blizzard for going clean, so early! Mostly companies try to keep it silent untill its leaked.
RaiKageRyu
Profile Joined August 2009
Canada4773 Posts
August 10 2012 07:26 GMT
#253
Holy shit. I knew of someone who bragged to me about getting account information of the #1 US Warrior in WoW and then used it to strip him of all his gear and stuff to allow himself to achieve the #1 rank. This was just a couple of days ago. Holy shit.
Someone call down the Thunder?
Reasonable
Profile Joined September 2010
Ukraine1432 Posts
August 10 2012 07:32 GMT
#254
Ahh wtf! Blizzard has dropped the ball big time. I'm more worried about them getting my email than the password I have a lot of stuff going on with that email.
Nausea_
Profile Joined July 2011
Sweden68 Posts
August 10 2012 07:32 GMT
#255
Authenticator every time I log in ftw.
najreteip
Profile Joined December 2010
Belgium4158 Posts
August 10 2012 07:33 GMT
#256
So uh, I have a secondary account on the US server, but it came after my EU account and uses the exact same login as my eu account, would I need to reset my password as well?
I have no quote!
stfouri
Profile Joined August 2010
Finland272 Posts
August 10 2012 07:34 GMT
#257
Well, atleast they informed us 6x faster than Sony did.
I still hold grudge to Sony for keeping their customers dark for so long.
yeint
Profile Joined May 2011
Estonia2329 Posts
August 10 2012 07:35 GMT
#258
On August 10 2012 07:51 SomeONEx wrote:
I feel bad for you guys in North America, I really do
This might not be a time to talk about happiness, but I'm a tiny bit relived that this didn't also include EU as I have the same password for almost everything

Still, if anyone can fix this fast (with the law, i.e not mafia) it's probably Blizzard. My hearts to you in America <3


Don't be so sure you're safe.

If you've ever accessed a Blizzard beta, you've logged on via the US authentication server.
Not supporting teams who take robber baron money.
imJealous
Profile Joined July 2010
United States1382 Posts
August 10 2012 07:41 GMT
#259
On August 10 2012 16:21 ravemir wrote:
No EU acion needed? Phew, last time GOM TV needed this it was a hassle to memorize the new pass.

Also, "kudos" on the "scrambled" passwords. Even if anyone who knows computer security has it as no-brainer step to protecting data, it seems that people neglect it IRL more often than not.

Make sure you don't use your GOMTV password anywhere else, they literally have zero encryption on their passwords when you log in. They made no changes to their security the first time they sent out the big notice that passwords had been compromised, I haven't bothered paying attention sense then. No point in changing the password if the new one is sent in plain text again every time I log in.
... In life very little goes right. "Right" meaning the way one expected and the way one wanted it. One has no right to want or expect anything.
RoberP
Profile Joined March 2011
United Kingdom101 Posts
August 10 2012 07:43 GMT
#260
If the passwords they stole are encrypted, the chances of breaking the cypher on an 8 letter password are about zero. They'd be better off just trying to guess your password ^^. Still worth changing the secret question though.
Trasko
Profile Blog Joined July 2010
Sweden983 Posts
August 10 2012 07:48 GMT
#261
On August 10 2012 07:42 mataxp wrote:
As a PSN user, dejá vu



loooool. Same here.... /fml
Jaedong <3
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
August 10 2012 07:48 GMT
#262
Every month another company loses customer data, when will this trend stop?

I use unique email adresses for everything i register to and it's funny to see new spam popping up all the time. The worst offenders are my sc2replayed@, buffed@ and startrekonline@ adresses, it got so annoying that i started blocking those completely since i stopped using those month before i started getting spam. I guess my blizzard[1-3]@ adresses will be next for the spam flood. I hope i'll never see the day where i have to block teamliquid@... but well, this site is protected by a wizard so it's unlikely to happen.

Well, at least on the other hand it shows me that some other companies are as bad as the one i work for.
Aterons_toss
Profile Joined February 2011
Romania1275 Posts
August 10 2012 07:56 GMT
#263
Well, at least i live in EU and i have a unique pas for blizzard.
But yeah, they are to incompetent to build an anti hack for there game and now they can't even protect customer info...
Are there no good gaming companies left out there ? When you start failing at game design that's one, when you fail at protecting customer info and not fixing bug that's another thing.
Oh well, CD projekt red for new blizzard ?
A good strategy means leaving your opponent room to make mistakes
imJealous
Profile Joined July 2010
United States1382 Posts
August 10 2012 08:01 GMT
#264
On August 10 2012 16:48 Morfildur wrote:
Every month another company loses customer data, when will this trend stop?

I use unique email adresses for everything i register to and it's funny to see new spam popping up all the time. The worst offenders are my sc2replayed@, buffed@ and startrekonline@ adresses, it got so annoying that i started blocking those completely since i stopped using those month before i started getting spam. I guess my blizzard[1-3]@ adresses will be next for the spam flood. I hope i'll never see the day where i have to block teamliquid@... but well, this site is protected by a wizard so it's unlikely to happen.

Well, at least on the other hand it shows me that some other companies are as bad as the one i work for.

+ trick for the win

I don't think you can call it a trend though, hackers finding a way in is like a fact of life.
... In life very little goes right. "Right" meaning the way one expected and the way one wanted it. One has no right to want or expect anything.
windzor
Profile Joined October 2010
Denmark1013 Posts
August 10 2012 08:02 GMT
#265
On August 10 2012 16:43 RoberP wrote:
If the passwords they stole are encrypted, the chances of breaking the cypher on an 8 letter password are about zero. They'd be better off just trying to guess your password ^^. Still worth changing the secret question though.


Actually wrong. It depends on what kind of hashed passwords they got. Seeing as they mention SRP i guess the hacker was eavesdropping the login information in that protocol, or else it makes no sense for blizzard to mention the protocol.

If it was the actual database of the passwords, which might be because they got hold of other account information, the standard way of hashing passwords was considered broken by the author 2 months ago. Then blizzard should have be scared.

But my money is still on the eavesdropping of the SRP which means blizzards security office isn't fired this time around.
Yeah
malaan
Profile Joined September 2010
365 Posts
August 10 2012 08:02 GMT
#266
wonderful... this comes 1 week after I just got all my money back from a card cloning...
Rannasha
Profile Blog Joined August 2010
Netherlands2398 Posts
August 10 2012 08:04 GMT
#267
On August 10 2012 17:02 windzor wrote:
Show nested quote +
On August 10 2012 16:43 RoberP wrote:
If the passwords they stole are encrypted, the chances of breaking the cypher on an 8 letter password are about zero. They'd be better off just trying to guess your password ^^. Still worth changing the secret question though.


If it was the actual database of the passwords, which might be because they got hold of other account information, the standard way of hashing passwords was considered broken by the author 2 months ago. Then blizzard should have be scared.


MD5 hasn't been the "standard way of hashing passwords" for years now. Some websites with terrible security may still use it, but anyone who knows anything about securing a system will have moved away from MD5 a long time ago.
Such flammable little insects!
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 08:04 GMT
#268
this entirely defeats the intent and purpose of an authenticator. the only reason to ever use one of these was the fact that it was completely secure and sold as an absolute level security. i am beyond annoyed by this and blizzard should kill themselves. teehee.
Team Liquid is the used the tampon of the starcraft community.
Eisregen
Profile Joined September 2011
Germany967 Posts
August 10 2012 08:07 GMT
#269
glad I never ever enter real information bout me or any finanial infos =)
They can spam my email if they want to, will bore me ^^
Photo-Noob@ http://www.flickr.com/photos/eisregen1983/
MaV_gGSC
Profile Blog Joined November 2010
Canada1345 Posts
August 10 2012 08:10 GMT
#270
better change my password asap. This reminds me of the PSN incident
Life's good :D
Ragnarork
Profile Blog Joined June 2011
France9034 Posts
Last Edited: 2012-08-10 08:14:45
August 10 2012 08:12 GMT
#271
On August 10 2012 16:48 Morfildur wrote:
Every month another company loses customer data, when will this trend stop?

I use unique email adresses for everything i register to and it's funny to see new spam popping up all the time. The worst offenders are my sc2replayed@, buffed@ and startrekonline@ adresses, it got so annoying that i started blocking those completely since i stopped using those month before i started getting spam. I guess my blizzard[1-3]@ adresses will be next for the spam flood. I hope i'll never see the day where i have to block teamliquid@... but well, this site is protected by a wizard so it's unlikely to happen.

Well, at least on the other hand it shows me that some other companies are as bad as the one i work for.


It won't...

I see one main reason for that (though I'm sure that there are more than one, I'm not sure which...)

The fact that companies sometimes overlook security to gain efficiency is playing a role. I think you know what happened with LinkedIn and the leaked hashed password, they were hashed with SHA1 without what we call a "salt" (a random sequence of numbers/letters attached to the hash of the password in order to make this hash unique, even for 2 identical passwords).

SHA1 is a hashing algorithm that we know since 2005 that it has security flaws ( for those interested in the details : http://en.wikipedia.org/wiki/SHA-1).
Not adding a salt to the hashs also makes the security very weak.
This weak security can be seen (personal opinion there) as either linkedIn wanting a fast encryption method, or plain stupidity.
Moreover, those password were stolen thanks to an SQL injection, a common security flaw that is now known for a long time.

Since we still have in 2012 companies that overlook security to gain efficiency, or just by plain stupidity, it won't help stopping this trend. I don't know if you remember Lulzsec, but they weren't "that" good as hackers. They just found very simple security breaches in companies that were quite carefree BEFORE being targeted by hackers. Today, any website that isn't secured against SQL injection is vulnerable to very simple (and easy to find) intrusive methods...

Then, I don't think Blizzard was quite lazy, but a thing they say in the FAQ is that being a huge company on the internet makes you a target tested and tested again on security, either by Black hats or (unofficial) white hats (that first crack, and then contact the company to reveal the flaw).
LiquipediaWanderer
Jinsho
Profile Joined March 2011
United Kingdom3101 Posts
August 10 2012 08:19 GMT
#272
Considering that the only personal data actually lost were email adresses, this is way harmless. Could have potentially been much worse.
klo8
Profile Joined August 2010
Austria1960 Posts
Last Edited: 2012-08-10 08:22:56
August 10 2012 08:22 GMT
#273
On August 10 2012 17:02 windzor wrote:
Show nested quote +
On August 10 2012 16:43 RoberP wrote:
If the passwords they stole are encrypted, the chances of breaking the cypher on an 8 letter password are about zero. They'd be better off just trying to guess your password ^^. Still worth changing the secret question though.


Actually wrong. It depends on what kind of hashed passwords they got. Seeing as they mention SRP i guess the hacker was eavesdropping the login information in that protocol, or else it makes no sense for blizzard to mention the protocol.

If it was the actual database of the passwords, which might be because they got hold of other account information, the standard way of hashing passwords was considered broken by the author 2 months ago. Then blizzard should have be scared.

But my money is still on the eavesdropping of the SRP which means blizzards security office isn't fired this time around.

MD5 has been considered unsafe for a long while now. Already in 1996, a researcher wrote:
"The presented attack does not yet threaten practical applications of MD5, but it comes rather close ... in the future MD5 should no longer be implemented...where a collision-resistant hash function is required."

And in 2005:
Later that year, MD5's designer Ron Rivest wrote, "md5 and sha1 are both clearly broken (in terms of collision-resistance)."


I guess, the point is: Don't use MD5 (or SHA1, or any hash function that you can evaluate very quickly) for hashing passwords, not even a salt value will help you out because MD5 is broken. Use Bcrypt or something similar instead.
This post is clearly not a hurr, as you can see from the graph, the durr never intersects with the derp.
teamamerica
Profile Blog Joined July 2010
United States958 Posts
Last Edited: 2012-08-10 09:00:00
August 10 2012 08:25 GMT
#274
Edit: Whoops I'm dumb. md5 != md5crypt.
RIP GOMTV. RIP PROLEAGUE.
XiWi
Profile Joined August 2012
11 Posts
August 10 2012 08:27 GMT
#275
I'm worried about what information exactly was stolen, and some hacker now social engineering to dig more information.
ChemBroTron
Profile Joined January 2011
Germany194 Posts
Last Edited: 2012-08-10 08:35:56
August 10 2012 08:34 GMT
#276
On August 10 2012 16:48 Morfildur wrote:
Every month another company loses customer data, when will this trend stop?


This will never end and it is not a trend, it is a criminal act. The question is: how save were for example the passwords stored. Save (like Blizzard says for itself, but better change the password for more safety) or unsave (like Sony/PSN).
seiferoth10
Profile Joined May 2010
3362 Posts
August 10 2012 08:40 GMT
#277
I'm honestly surprised it took this long. With 8 years of paying customers' info from WoW, I would imagine they have been a prime target for a long time.
Ragnarork
Profile Blog Joined June 2011
France9034 Posts
August 10 2012 08:41 GMT
#278
By the way I'm a bit confused. How can they say that, with the hackers possessing E-Mails AND security questions' answers, the accounts are safe... ? (Well, even before changing the answer...)
LiquipediaWanderer
GabrielB
Profile Joined February 2003
Brazil594 Posts
August 10 2012 08:48 GMT
#279
On August 10 2012 17:41 Ragnarork wrote:
By the way I'm a bit confused. How can they say that, with the hackers possessing E-Mails AND security questions' answers, the accounts are safe... ? (Well, even before changing the answer...)

I'm not sure how it works on Blizzard, but some sites ask for your email and the answer for your security question. If you provide them correctly, they send you an email with a link to reset your password. So the hacker would still need access to your email.
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 08:54 GMT
#280
so i am looking for a way to change my security question and am not finding it online. does this require a phone call for all of my accounts? that is further disappointing if the case... i don't even remember the questions atm, let alone the answers.
Team Liquid is the used the tampon of the starcraft community.
Tyree
Profile Joined November 2010
1508 Posts
August 10 2012 08:58 GMT
#281
I was baffled when people slammed Sony when the PSN thing happened, claiming that Sony didnt know what they were doing and how every other company knew better.

Yet its only a matter of time before someone breaches even Steam, people are trying on a daily basis and one day it will succeed, thats just the nature of the beast.

★ Top Gun ★
HansK
Profile Blog Joined March 2011
249 Posts
August 10 2012 09:03 GMT
#282
On August 10 2012 17:58 Tyree wrote:
I was baffled when people slammed Sony when the PSN thing happened, claiming that Sony didnt know what they were doing and how every other company knew better.

Yet its only a matter of time before someone breaches even Steam, people are trying on a daily basis and one day it will succeed, thats just the nature of the beast.


http://www.pcworld.idg.com.au/article/415207/hackers_probably_stole_steam_transaction_data_valve_says/

It happened already, afaik.
MrHoon *
Profile Blog Joined April 2008
10183 Posts
August 10 2012 09:11 GMT
#283
ya the steam thing already happened

Chances are the blizzard security breach wont be a too big of a deal

Hopefully
dats racist
ChemBroTron
Profile Joined January 2011
Germany194 Posts
August 10 2012 09:13 GMT
#284
On August 10 2012 17:58 Tyree wrote:
I was baffled when people slammed Sony when the PSN thing happened, claiming that Sony didnt know what they were doing and how every other company knew better.


They actually didn't know what they were doing. Sony's security flaws were very, very bad. Not updating there servers for over 6 months? Not good, not good.
Hypemeup
Profile Joined February 2011
Sweden2783 Posts
August 10 2012 09:16 GMT
#285
On August 10 2012 17:58 Tyree wrote:
I was baffled when people slammed Sony when the PSN thing happened, claiming that Sony didnt know what they were doing and how every other company knew better.

Yet its only a matter of time before someone breaches even Steam, people are trying on a daily basis and one day it will succeed, thats just the nature of the beast.



I thought Sony stored some of their information in plain text? ~~
SlaverR
Profile Joined November 2010
Germany87 Posts
August 10 2012 09:20 GMT
#286


Additionally, we'll prompt mobile authenticator users to update their authenticator software.


And since we got a situation of "fear" and "panic" ... LET'S EARN SOME MONEY! Well played Blizzard ....
sleeping is the cousin of death
nimbim
Profile Blog Joined June 2009
Germany984 Posts
August 10 2012 09:22 GMT
#287
On August 10 2012 18:20 SlaverR wrote:


Show nested quote +
Additionally, we'll prompt mobile authenticator users to update their authenticator software.


And since we got a situation of "fear" and "panic" ... LET'S EARN SOME MONEY! Well played Blizzard ....


You can download and update the mobile authenticator software for free.
GabrielB
Profile Joined February 2003
Brazil594 Posts
August 10 2012 09:22 GMT
#288
On August 10 2012 17:54 multiversed wrote:
so i am looking for a way to change my security question and am not finding it online. does this require a phone call for all of my accounts? that is further disappointing if the case... i don't even remember the questions atm, let alone the answers.

http://us.battle.net/support/en/blog/6940803/Battlenet_Secret_Question_Answer_Reset_Service_Forthcoming-8_9_2012#blog

There's now way yet, but they are implementing it. I suppose it should be ready in a couple of days.
Ph4ZeD
Profile Joined September 2011
United Kingdom753 Posts
August 10 2012 09:24 GMT
#289
On August 10 2012 18:20 SlaverR wrote:


Show nested quote +
Additionally, we'll prompt mobile authenticator users to update their authenticator software.


And since we got a situation of "fear" and "panic" ... LET'S EARN SOME MONEY! Well played Blizzard ....


The mobile authenticator apps are free, or have you not heard of smartphones?
DOUDOU
Profile Joined October 2011
Wales2940 Posts
Last Edited: 2012-08-10 09:25:52
August 10 2012 09:25 GMT
#290
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

not quite

change your damn security question instead

also, the SANS released a statement about the news
https://isc.sans.edu/diary.html?storyid=13870&rss


someone update the OP please
Feast | Grubby | Mvp | Polt | Fantasy | Last | MMA | forGG | Leenock | Soberphano | Scarlett cutiepie
skeldark
Profile Joined April 2010
Germany2223 Posts
August 10 2012 09:31 GMT
#291
On August 10 2012 18:25 DOUDOU wrote:
Show nested quote +
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

not quite

change your damn security question instead

also, the SANS released a statement about the news
https://isc.sans.edu/diary.html?storyid=13870&rss


someone update the OP please

You can not change that ^^
LOL, he suggest to enter SMS alert.
Prioblem: your data on blizzard got compromised
Solution: give blizzard more personal data
Oo
Save gaming: kill esport
DOUDOU
Profile Joined October 2011
Wales2940 Posts
August 10 2012 09:34 GMT
#292
On August 10 2012 18:31 skeldark wrote:
Show nested quote +
On August 10 2012 18:25 DOUDOU wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

not quite

change your damn security question instead

also, the SANS released a statement about the news
https://isc.sans.edu/diary.html?storyid=13870&rss


someone update the OP please

You can not change that ^^

well good job blizzard
Feast | Grubby | Mvp | Polt | Fantasy | Last | MMA | forGG | Leenock | Soberphano | Scarlett cutiepie
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 09:36:09
August 10 2012 09:34 GMT
#293
as someone qualified to give advice on such matters, the faster you change the e-mail password associated to your battle.net account as well as your actual account password, the less chance you have to be compromised. if your account password and e-mail account password are/were unique, you were at very little risk to begin with.

if they were the same password, there was a small window of risk. if you have changed your passwords, that window is now closed. if someone does not have access to your e-mail account, your battle.net account cannot be stolen (in relation to this matter only.)
Team Liquid is the used the tampon of the starcraft community.
mostevil
Profile Joined February 2011
United Kingdom611 Posts
August 10 2012 09:46 GMT
#294
On August 10 2012 09:26 nath wrote:
Show nested quote +
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

as a programmer, yes.

As a programmer who's done cryptography work, it depends on the algorithm used. If its a properly salted non reversible algorithm then yes, but we don't know that... Plus It sounds like they may have used reversable encryption, so no. Change your passwords.
我的媽和她的瘋狂的外甥都
halfies
Profile Joined November 2011
United Kingdom327 Posts
August 10 2012 09:46 GMT
#295
On August 10 2012 18:31 skeldark wrote:
Show nested quote +
On August 10 2012 18:25 DOUDOU wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

not quite

change your damn security question instead

also, the SANS released a statement about the news
https://isc.sans.edu/diary.html?storyid=13870&rss


someone update the OP please

You can not change that ^^
LOL, he suggest to enter SMS alert.
Prioblem: your data on blizzard got compromised
Solution: give blizzard more personal data
Oo

well, tbf, that does seem to be a good short term solution to the problem. unless the hackers are good enough to hack your phone network and divert your texts, or actually steal your phone, it would work.
and since the data breach has been fixed, its not gonna get stolen again before blizzard fixes this shit, at which point you can probably remove it
DOUDOU
Profile Joined October 2011
Wales2940 Posts
August 10 2012 09:48 GMT
#296
On August 10 2012 18:46 mostevil wrote:
Show nested quote +
On August 10 2012 09:26 nath wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

as a programmer, yes.

As a programmer who's done cryptography work, it depends on the algorithm used. If its a properly salted non reversible algorithm then yes, but we don't know that... Plus It sounds like they may have used reversable encryption, so no. Change your passwords.

even non reversible algorithms can have dictionaries
Feast | Grubby | Mvp | Polt | Fantasy | Last | MMA | forGG | Leenock | Soberphano | Scarlett cutiepie
Tom Cruise
Profile Joined July 2012
Denmark482 Posts
Last Edited: 2012-08-10 09:50:15
August 10 2012 09:50 GMT
#297
On August 10 2012 18:31 skeldark wrote:
Show nested quote +
On August 10 2012 18:25 DOUDOU wrote:
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

not quite

change your damn security question instead

also, the SANS released a statement about the news
https://isc.sans.edu/diary.html?storyid=13870&rss


someone update the OP please

You can not change that ^^
LOL, he suggest to enter SMS alert.
Prioblem: your data on blizzard got compromised
Solution: give blizzard more personal data
Oo


eh. of course that's a good idea, the more personal information you give them, the better chances of recovering a lost account (in case that happens)
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 09:50 GMT
#298
confidence only and always leads to failure in this industry. we don't gamble. ever. please change your passwords.
Team Liquid is the used the tampon of the starcraft community.
Maluk
Profile Joined August 2011
France987 Posts
August 10 2012 09:54 GMT
#299
I'm just wondering what exactly could the "hackers" do even if they catch my password ? I mean, if someone steals my account to ladder with it I won't be to mad, and aside from that what are the risks ?
ulan-bat
Profile Blog Joined August 2011
China403 Posts
August 10 2012 09:55 GMT
#300
On August 10 2012 15:12 pseudocalm wrote:
all accounts except chinese accounts.....i see

there is a specific battle.net for china

now you know
"Short games, shorts, summer weather, those things bring the heat!" - EG.iNcontroL
Rannasha
Profile Blog Joined August 2010
Netherlands2398 Posts
August 10 2012 10:03 GMT
#301
On August 10 2012 18:54 Maluk wrote:
I'm just wondering what exactly could the "hackers" do even if they catch my password ? I mean, if someone steals my account to ladder with it I won't be to mad, and aside from that what are the risks ?


For accounts with just SC2, there's not much to be gained. WoW and D3 accounts are rather interesting though, since they contain tradeable items and currency, making it easy to strip the account of valuable commodities to be sold for actual money at some later time.
Such flammable little insects!
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 10:05 GMT
#302
On August 10 2012 18:54 Maluk wrote:
I'm just wondering what exactly could the "hackers" do even if they catch my password ? I mean, if someone steals my account to ladder with it I won't be to mad, and aside from that what are the risks ?

it isn't really with battle.net, you only really risk the standard wow/diablo account steal if your e-mail had a unique password. the real risk would be if your battle.net password happened to be your paypal password and you hadn't changed it when it came time to farm this data.

we don't like to collect risk potential. we tend to try to stomp it out even if only a minor potential threat caused by user stupidity.
Team Liquid is the used the tampon of the starcraft community.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
August 10 2012 10:06 GMT
#303
I have a question to the "experts" here.

I'm always wondering about using Brute Force stuff for this. How do you know if a password is correct unless you have it checked on the servers? I mean wouldn't someone who using that method have to register millions of BNet enquiries, which would make it easy to prevent that? Some explanation on how that stuff works would be appreciated
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
Maluk
Profile Joined August 2011
France987 Posts
August 10 2012 10:10 GMT
#304
Tank you for the answers, Rannasha and multiversed, I guess I don't have to be concerned then. SC2 only ftw
greendestiny
Profile Blog Joined May 2010
Bosnia-Herzegovina114 Posts
August 10 2012 10:12 GMT
#305
I started receiving regular fake MoP invites to my mail about 2 months ago. I believe that Blizzard was hacked around the time of D3's release, and they found out just now about it
"The trespass into our internal network was detected by us on August 4, 2012."

I remember reading official D3 forums when there was a mass of users going: "Blizz, I take every possible precaution and I lost all my gear and gold, your servers have been hacked!" and the massive amount of verbal abuse they received. They should feel vindicated now.
How I appear to you is a reflection of you, not me.
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 10:32:33
August 10 2012 10:14 GMT
#306
i will explain in broad general terms...
brute forcing is most often done with a botnet (a large network of hacked computers.) if a single user attempted to enter 5 million passwords into a server, it would to get noticed. if 200,000 computers try 1-2 times each in a controlled method, the associated IP doesn't get flagged, logged, and banned. *this more the general theory, than the actual practice...*

i'd rather not go into more detail, as this is all stupidly easy to begin with. all it really requires is teenaged angst, or the equivalent.

edit: update for clarity. account was a poor choice of words.
Team Liquid is the used the tampon of the starcraft community.
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
August 10 2012 10:16 GMT
#307
On August 10 2012 19:06 Na_Dann_Ma_GoGo wrote:
I have a question to the "experts" here.

I'm always wondering about using Brute Force stuff for this. How do you know if a password is correct unless you have it checked on the servers? I mean wouldn't someone who using that method have to register millions of BNet enquiries, which would make it easy to prevent that? Some explanation on how that stuff works would be appreciated


If you have the hash and know the algorithm, you can hash millions of possible passwords and as soon as your hash and the password hash matches, you have the correct password. No need to check with the server, it will just do the same algorithm and will consider both equal.

There are databases of password/hash combinations - called rainbow tables - where the cleartext password is already matched to the hash in the database, so you can just search for the hash and get the cleartext as result. To counteract those, it is common practice to add a "salt", i.e. some additional data, to the password which makes it harder to get the correct result in the rainbow table.

Depending on the algorithm, salt, password length, etc., there is an infinitely small chance of two different passwords generating the same hash (0.000....01%) but that actually won't matter because as long as the end result is the same, the server will still accept it as valid because it doesn't know the difference either.
Rannasha
Profile Blog Joined August 2010
Netherlands2398 Posts
August 10 2012 10:18 GMT
#308
On August 10 2012 19:12 greendestiny wrote:
I started receiving regular fake MoP invites to my mail about 2 months ago. I believe that Blizzard was hacked around the time of D3's release, and they found out just now about it
"The trespass into our internal network was detected by us on August 4, 2012."


I've been receiving these phising mails for years, so they're not really new. They tend to pop up whenever a new expansion/game is in beta. I use different email addresses for different websites and I've only ever received these fake mails on 2 addresses I used for some community websites that are known to have been compromised (since they announced it to their users). I have never received any such mail on the address I use for my Battle.net account.

I remember reading official D3 forums when there was a mass of users going: "Blizz, I take every possible precaution and I lost all my gear and gold, your servers have been hacked!" and the massive amount of verbal abuse they received. They should feel vindicated now.


Except that they're not vindicated. The people that lost their D3 account back then simply didn't have the appropriate security measures. It didn't help that Blizzard gave their SMS service that didn't work with D3 the name "SMS Authenticator", which was the main source of people saying that they did have an authenticator and still lost their account. Blizzard has since then renamed the thing to something like SMS Protect or so.
Such flammable little insects!
Dakkas
Profile Joined October 2010
2550 Posts
August 10 2012 10:26 GMT
#309
I must say it's quite contrasting when comparing SC2 gamer's response with D3 gamer's response on this Blizzard security breach. From what I see in this thread, most people are being quite objective and understanding of it however on the D3 forum, the general opinion is "LOL BLIZZARD SUX DIX SO BAD FAIL".

Fuchsteufelswild
Profile Joined October 2009
Australia2028 Posts
August 10 2012 10:28 GMT
#310
I only just changed my password a couple of months ago and I'm not playing SC2 often nowadays, so stuff it until I get reason to get them to lock it. I have no money on the account.
ZerO - FantaSy - Calm - Nal_rA - Jaedong - NaDa - EffOrt - Bisu - by.hero - StarDust - Welmu - Nerchio - Supernova - Solar - Squirtle - LosirA - Grubby - IntoTheRainbow - Golden... ~~~ Incredible Miracle and Woongjin Stars 화이팅!
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
August 10 2012 10:39 GMT
#311
@ Morfildur
Aye thanks.

But then there shouldn't be much to worry about at the moment since acquiring the algorithm should be night impossible right?
I mean it shouldn't be straight away available to the hackers and reverse engineering is one hell of a task I'd imagine.

WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 10:42 GMT
#312
that is the hope/assumption. it would take lifetimes without the key to the door. so to speak.
Team Liquid is the used the tampon of the starcraft community.
Xanthopsia
Profile Joined November 2010
Australia41 Posts
August 10 2012 10:57 GMT
#313
Very unfortunate that this happened however I'm really happy with how honest Blizzard are being telling customers exactly what information was compromised and steps to protect your account rather than avoiding what information was compromised or keeping it to themselves.

Horrible that it has happened, however kudos to Blizzard for handling it the best way possible.
paralleluniverse
Profile Joined July 2010
4065 Posts
August 10 2012 11:01 GMT
#314
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.
fishjie
Profile Blog Joined September 2010
United States1519 Posts
August 10 2012 11:05 GMT
#315
unfortunately since i use the same pw for a lot of websites including financial now i have to change /sigh
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
Last Edited: 2012-08-10 11:08:59
August 10 2012 11:07 GMT
#316
On August 10 2012 19:39 Na_Dann_Ma_GoGo wrote:
@ Morfildur
Aye thanks.

But then there shouldn't be much to worry about at the moment since acquiring the algorithm should be night impossible right?
I mean it shouldn't be straight away available to the hackers and reverse engineering is one hell of a task I'd imagine.



Companies all use standard algorithms and with some practice you can limit the amount of possible algorithms by just looking at the hash, the only factor that can make it hard is the salt and the password complexity.

The more complex the password is, the less likely it's in a rainbow table and the harder it is to brute force.

A more in-depth Explanation:
A password of length 1 that consists of only lowercase characters (a-z) has a complexity of 26^1, i.e. 26.
A password of length 1 that consists of lower- & uppercase has a complexity of 52
A password of length 1 that consists of lower- & uppercase & numbers and a selection of 50 special characters has a complexity of 112.
A password with those properties but of length 2 has a complexity of 112^2, i.e. 12 544
A password of length 10 with only lowercase characters just has a complexity of 26^10, i.e. 141 167 095 653 376
A password of length 10 with the 112 characters has a complexity of 112^10, i.e. 310 584 820 834 420 916 224

complexity means the range of possible passwords that have to be hashed to find the correct password.

If you add a salt of 10 characters from a selection of 112 characters, it suddenly becomes 112^20 which is a 40 digit number.

Now as for the actual time it takes to hash the password and brute force it, the stronger algorithms take longer than simple algorithms like MD5. You can calculate several million up to several billion ( http://www.codinghorror.com/blog/2012/04/speed-hashing.html ) MD5 hashes per second depending on your PC, so to definitively crack the lowercase-only password, it takes a few hours or at most a few days. To crack the complex password it still takes a few weeks.
Other algorithms like SHA256, etc. are slower, so it takes 10-100 times longer to brute force passwords. Add the salt and it suddenly becomes an eternity.

That is why the rainbow tables exist. Basically each lower- & uppercase only combination for passwords of up to 10-15 characters in length is included in rainbow tables which makes a search for it a matter of seconds.

Most of those that steal a huge amount of password hashes don't bother brute forcing, if it's not in the rainbow tables, they ignore those but still might sell or release those users&hashes. That means that someone who targets a specific user/group can still try to brute force the passwords.

So in summary the best way to protect your password is:
1. Have long password using special characters, numbers and a mix of upper and lower characters to maximize it's complexity
2. Hope that the one storing your password uses a strong salt
3. Hope that the one storing your password uses a strong&slow algorithm.
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 11:09:29
August 10 2012 11:07 GMT
#317
On August 10 2012 19:26 Dakkas wrote:
I must say it's quite contrasting when comparing SC2 gamer's response with D3 gamer's response on this Blizzard security breach. From what I see in this thread, most people are being quite objective and understanding of it however on the D3 forum, the general opinion is "LOL BLIZZARD SUX DIX SO BAD FAIL".


That's because a lot of people were hacked when D3 launched, because they were too stupid to protect their accounts from keyloggers and phishing scams. They blamed Blizzard. They accused Blizzard of being hacked, even though Blizzard had never been hacked at that time.

They said it was greedy and unfair they had to buy an authenticator to secure their accounts, without realizing that you don't need an authenticator if you're not stupid.

And now that Blizzard has been "hacked", they've actually been proven completely wrong. Blizzard got hacked and nothing that would allowed unauthorized access to any account has been compromised. No account will be hacked as a direct result of Blizzard getting hacked.

The D3 community -- what were you expecting from a bunch of people with no internet skills who were dumb enough to get phished and hacked?
Ganondorf
Profile Joined April 2010
Italy600 Posts
Last Edited: 2012-08-10 11:11:04
August 10 2012 11:10 GMT
#318
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..
Wroshe
Profile Joined June 2011
Netherlands1051 Posts
August 10 2012 11:10 GMT
#319
On August 10 2012 19:26 Dakkas wrote:
I must say it's quite contrasting when comparing SC2 gamer's response with D3 gamer's response on this Blizzard security breach. From what I see in this thread, most people are being quite objective and understanding of it however on the D3 forum, the general opinion is "LOL BLIZZARD SUX DIX SO BAD FAIL".


I honestly feel that the response here is influenced by a lot on how blizzard has handled this. They came clean and divulged quite a lot of info on what was taken and how it was stored.

I feel that the response would have been a lot less friendly if for example they stored their passwords in plain text (like GOMTV) or if credit card information had been taken.
BlitzerSC
Profile Joined May 2011
Italy8800 Posts
August 10 2012 11:13 GMT
#320
So these hackers now only have my email since I only have an EU account, right ?
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 11:19:59
August 10 2012 11:19 GMT
#321
On August 10 2012 20:10 Ganondorf wrote:
Show nested quote +
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 11:23:50
August 10 2012 11:21 GMT
#322
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bane of every network administrator everywhere.
Team Liquid is the used the tampon of the starcraft community.
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 11:26:39
August 10 2012 11:26 GMT
#323
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 11:28 GMT
#324
On August 10 2012 20:26 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


please don't waste the effort put into this post.

On August 10 2012 20:07 Morfildur wrote:
Show nested quote +
On August 10 2012 19:39 Na_Dann_Ma_GoGo wrote:
@ Morfildur
Aye thanks.

But then there shouldn't be much to worry about at the moment since acquiring the algorithm should be night impossible right?
I mean it shouldn't be straight away available to the hackers and reverse engineering is one hell of a task I'd imagine.



Companies all use standard algorithms and with some practice you can limit the amount of possible algorithms by just looking at the hash, the only factor that can make it hard is the salt and the password complexity.

The more complex the password is, the less likely it's in a rainbow table and the harder it is to brute force.

A more in-depth Explanation:
A password of length 1 that consists of only lowercase characters (a-z) has a complexity of 26^1, i.e. 26.
A password of length 1 that consists of lower- & uppercase has a complexity of 52
A password of length 1 that consists of lower- & uppercase & numbers and a selection of 50 special characters has a complexity of 112.
A password with those properties but of length 2 has a complexity of 112^2, i.e. 12 544
A password of length 10 with only lowercase characters just has a complexity of 26^10, i.e. 141 167 095 653 376
A password of length 10 with the 112 characters has a complexity of 112^10, i.e. 310 584 820 834 420 916 224

complexity means the range of possible passwords that have to be hashed to find the correct password.

If you add a salt of 10 characters from a selection of 112 characters, it suddenly becomes 112^20 which is a 40 digit number.

Now as for the actual time it takes to hash the password and brute force it, the stronger algorithms take longer than simple algorithms like MD5. You can calculate several million up to several billion ( http://www.codinghorror.com/blog/2012/04/speed-hashing.html ) MD5 hashes per second depending on your PC, so to definitively crack the lowercase-only password, it takes a few hours or at most a few days. To crack the complex password it still takes a few weeks.
Other algorithms like SHA256, etc. are slower, so it takes 10-100 times longer to brute force passwords. Add the salt and it suddenly becomes an eternity.

That is why the rainbow tables exist. Basically each lower- & uppercase only combination for passwords of up to 10-15 characters in length is included in rainbow tables which makes a search for it a matter of seconds.

Most of those that steal a huge amount of password hashes don't bother brute forcing, if it's not in the rainbow tables, they ignore those but still might sell or release those users&hashes. That means that someone who targets a specific user/group can still try to brute force the passwords.

So in summary the best way to protect your password is:
1. Have long password using special characters, numbers and a mix of upper and lower characters to maximize it's complexity
2. Hope that the one storing your password uses a strong salt
3. Hope that the one storing your password uses a strong&slow algorithm.

Team Liquid is the used the tampon of the starcraft community.
Ragnarork
Profile Blog Joined June 2011
France9034 Posts
Last Edited: 2012-08-10 11:34:06
August 10 2012 11:33 GMT
#325
On August 10 2012 20:26 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...
LiquipediaWanderer
HaruRH
Profile Blog Joined August 2011
Singapore2780 Posts
August 10 2012 11:40 GMT
#326
Ugh. I was hit by this. My account had been locked and all my game accounts were locked as well. I needed to unlock ALL my game accounts, one by one. I had to bind my account with an authenticator because those blizzard folks won't let me unlock my accounts without one. There you go.
It is fucking D4 and you are still alive as a CONFIRMED FUCKING TOWN. This is how fucking terrible scum thinks you are - Koshi
Broodwurst
Profile Joined June 2011
Germany1586 Posts
August 10 2012 11:46 GMT
#327
On August 10 2012 20:19 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293


Fanboys = (ウ╹◡╹)ウ /// I like smiley faces
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 12:05:23
August 10 2012 11:50 GMT
#328
On August 10 2012 20:33 Ragnarork wrote:
Show nested quote +
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...

Yes, it is just math, and it's well known that an exponential function, x^a, increases more rapidly as a function of the exponent, a, than it does as a function of the base, x.

On my keyboard I count 32 symbols, 26 letters, and 10 numbers, which is a total of 68. So there are 68^x passwords of length x if we don't allow for upper case. If we do allow for upper case, there are 94 characters, so 94^x passwords of length x.

Now, how much more characters does a password excluding upper case characters need to have before it becomes stronger than one with upper case characters? Well, just solve 68*(x+e) > 94^x for e. The solution is e > x*log(94/68)/log(68) = 0.0767x.

So a 10 letter password allowing for upper case characters has equal strength as a 10.767 password disallowing upper case characters, which means an 11 letter password not allowing upper case characters is better.
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 11:55:03
August 10 2012 11:54 GMT
#329
On August 10 2012 20:50 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:33 Ragnarork wrote:
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...

Yes, it is just math, and it's well known that an exponential function, x^a, increases more rapidly as a function of the exponent, a, than it does as a function of the base, x.

On my keyboard I count 32 symbols, 26 letters, and 10 numbers, which is a total of 68. So there are 68^x passwords of length x if we don't allow for upper case. If we do allow for upper case, there are 94 characters, so 94^x passwords of length x.

Now, how much more characters does a password excluding upper case characters need to have before it becomes stronger than one with upper case characters? Well, just solve 68*(x+e) > 94^x for e. The solution is e > x*log(94/68)/log(68) = 0.0767x.

So a 10 letter password allowing for upper case characters has equal strength as an 10.767 password disallowing upper case characters, which means an 11 letter password without upper case is better.

thus not making you an idiot. the math checks out.
Team Liquid is the used the tampon of the starcraft community.
paralleluniverse
Profile Joined July 2010
4065 Posts
August 10 2012 11:56 GMT
#330
On August 10 2012 20:46 Broodwurst wrote:
Show nested quote +
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.
Arcanefrost
Profile Blog Joined August 2010
Belgium1257 Posts
August 10 2012 11:57 GMT
#331
what if the hackers need the password resets for their true masterplan, and this is exactly what they want
Valor is a poor substitute for numbers.
Broodwurst
Profile Joined June 2011
Germany1586 Posts
Last Edited: 2012-08-10 12:08:42
August 10 2012 12:08 GMT
#332
On August 10 2012 20:56 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:46 Broodwurst wrote:
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.


Still not flawless.
Also
http://www.teamliquid.net/forum/viewmessage.php?topic_id=79222
(:
Fanboys = (ウ╹◡╹)ウ /// I like smiley faces
Blacktion
Profile Joined November 2010
United Kingdom1148 Posts
August 10 2012 12:15 GMT
#333
Meh, even if they got everything from the Europe users it wouldnt effect me much, my account has no payment info linked to it because i bought a physical copy of SC2, the only blizzard game i own.
Also pretty sure i registered it with an email account i almost never use.
Where's Boxer, there's victory! - figq
Kreb
Profile Joined September 2010
4834 Posts
Last Edited: 2012-08-10 12:28:10
August 10 2012 12:27 GMT
#334
On August 10 2012 21:08 Broodwurst wrote:
Show nested quote +
On August 10 2012 20:56 paralleluniverse wrote:
On August 10 2012 20:46 Broodwurst wrote:
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.


Still not flawless.
Also
http://www.teamliquid.net/forum/viewmessage.php?topic_id=79222
(:

Flawless or not (define 'flawless' in the context first...), your attempts at taking cheap points by posting links about any possible Blizzards mistakes are quite petty. The last one isnt even about Blizzard but about Blizzards employees. Do yourself a favor and stop.

Of course Blizz arent perfect, no one is. But flawless or not, Blizz has very good security in place.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
Last Edited: 2012-08-10 12:47:37
August 10 2012 12:31 GMT
#335
edit: sry, was writing in wrong thread and thus even double posted >.<
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
Last Edited: 2012-08-10 12:47:50
August 10 2012 12:33 GMT
#336
edit:
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
SwiftSpear
Profile Joined February 2010
Canada355 Posts
August 10 2012 12:35 GMT
#337
On August 10 2012 19:28 Fuchsteufelswild wrote:
I only just changed my password a couple of months ago and I'm not playing SC2 often nowadays, so stuff it until I get reason to get them to lock it. I have no money on the account.

The people who need to be most concerned are those who use 1 password for everything. At this point, you should consider your username/email and password in the property of criminals, which means you now should change that password everywhere you've used it where you don't want to lose personal data.

I don't care too much, for example, if someone hacks my team liquid account, but if I believed someone had the capability of accessing my banking data I would be remiss to not change that password.
DOUDOU
Profile Joined October 2011
Wales2940 Posts
August 10 2012 12:39 GMT
#338
On August 10 2012 21:31 Na_Dann_Ma_GoGo wrote:
Hmm he adds more Queens instead of using spores, interesting.

yet, slightly irrelevant to the topic
Feast | Grubby | Mvp | Polt | Fantasy | Last | MMA | forGG | Leenock | Soberphano | Scarlett cutiepie
CamoPillbox
Profile Joined April 2012
Czech Republic229 Posts
August 10 2012 12:48 GMT
#339
with patch 1.5 no one cares stolen data cause no one play after this highly game ruiner patch sc2.....case locked.....
Czech Terran(Hots) player
Ryder.
Profile Joined January 2011
1117 Posts
August 10 2012 13:27 GMT
#340
Are we supposed to change our secret question/answer? It is not immediately obvious to me on how to do it myself, does Blizzard expect we contact them and do it or will that not be necessary?
ymir233
Profile Blog Joined June 2010
United States8275 Posts
August 10 2012 13:40 GMT
#341
Good thing Blizzard learned from the Sony incident.
Come motivate me to be cynical about animus at http://infinityandone.blogspot.com/ // Stork proxy gates are beautiful.
Sekken
Profile Joined August 2012
Afghanistan248 Posts
August 10 2012 13:40 GMT
#342
If I hacked Blizzard, I would just change their password so they couldn't get back on to fix anything. Hackers are so dumb these days

Also... I am too lazy to change my PW :c

If I get hacked, so be it ^^
High dia terran, and slayer of Zergs -.-
Rannasha
Profile Blog Joined August 2010
Netherlands2398 Posts
August 10 2012 13:43 GMT
#343
On August 10 2012 22:27 Ryder. wrote:
Are we supposed to change our secret question/answer? It is not immediately obvious to me on how to do it myself, does Blizzard expect we contact them and do it or will that not be necessary?


Players with accounts in the NA region will have their secret question reset by Blizzard in a few days or so. There is no regular option to change your SQ/SA.
Such flammable little insects!
EnE
Profile Blog Joined June 2012
417 Posts
Last Edited: 2012-08-10 13:46:36
August 10 2012 13:44 GMT
#344
If I was a hacker or hacking group, I'd probably target the company who released a patch with EPM and APM backwards and it remained like that for months and had the successor to their massive RPG crash all day, every day for like the first week of it's release too.

Can't blame them.
I'm embarrased by my past actions and even more ashamed of my present thoughts and future endeavors to clear my name.
andrewlt
Profile Joined August 2009
United States7702 Posts
August 10 2012 13:45 GMT
#345
Looks like nothing of value was taken. Hackers already know my e-mail address because I stupidly used it to register an account with mmo-champion. And since Blizzard doesn't use case sensitive passwords, I've been using the least secure of the passwords I have memorized for their service.
ThirdDegree
Profile Joined February 2011
United States329 Posts
August 10 2012 13:46 GMT
#346
I got the following email last sunday:

+ Show Spoiler +
We've received a request to reset the password for this Battle.net account. Please click this link to reset your password:
https://us.battle.net/account/support/password-reset-confirm.......

If you no longer wish to make the above change, or if you did not initiate this request, please disregard and/or delete this e-mail.

If you have any questions regarding your Battle.net account, click here for answers to frequently asked questions and contact information for the Blizzard Billing & Account Services team.

Sincerely,
The Battle.net Account Team
Online Privacy Policy


I suppose this might be connected.
I am terrible
dudeman001
Profile Blog Joined February 2010
United States2412 Posts
August 10 2012 13:55 GMT
#347
Hackers are going to be hacking every site we know. I'm very glad that Blizzard protected its information well enough so that none of my critical info is out there. Thank you, Blizzard.
Sup.
MasterMonkey
Profile Joined September 2010
United States96 Posts
August 10 2012 14:09 GMT
#348
No wonder my email said it had been accessed from China the other day... what the F! I have important info in there
Keep your oars in the brothel where they belong.
Nizaris
Profile Joined May 2010
Belgium2230 Posts
Last Edited: 2012-08-10 14:13:19
August 10 2012 14:10 GMT
#349
On August 10 2012 20:26 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.

hahaha. goes to show how clueless you are. case sensitive passwords are allot harder to crack then case insensitive since 'a' and 'A' are 2 different letters therefore u have exponentially more possibilities.

It pisses you off that websites forces you not to use a retarded password ? some ppl...

who uses upper cases letter in their passwords ? smart ppl do.
Gorsameth
Profile Joined April 2010
Netherlands21685 Posts
August 10 2012 14:18 GMT
#350
On August 10 2012 23:10 Nizaris wrote:
Show nested quote +
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.

hahaha. goes to show how clueless you are. case sensitive passwords are allot harder to crack then case insensitive since 'a' and 'A' are 2 different letters therefore u have exponentially more possibilities.

It pisses you off that websites forces you not to use a retarded password ? some ppl...

who uses upper cases letter in their passwords ? smart ppl do.


Actualy it barely matters at all. Brute forcing passwords (the only situation in which A/a matters) is just not viable. Keyloggers / man in the middle / other security breaches are how passwords get stolen. Not some computer trying out a trillion possible combinations.
It ignores such insignificant forces as time, entropy, and death
rast
Profile Joined July 2012
Poland44 Posts
August 10 2012 14:20 GMT
#351
Most peaple here doesn't realise the fact that their stolen hashes are probably decyphered into their passwords already by said hackers. Nowadays hackers doesn't needs to crack your hash to get the passwords. There's a thing called "rainbow tables", which is basically hugh dictionary containing the password and its possible hash. Those tables are traded between hacking organisations. If somebodie acuires your hash and has access to this rainbow table all he needs to do is look up possible password which generate mentioned hash. Also as someone stateb before, the algorithm used to hash the password can be determined just by looking at sample hashes, to some extent.

Also there's a confusion in this topic between the protocol and actual authenticatuion. SRP is just a protocol which "carry" your password between diffrent services, similar to SSH. It has no use in authentication process, which essentially checks if your password is correct or not. Whether Blizz implemented any kind of protocol is irrelevant to actual authentication mechanism, which tends to be just converting your password into hash.

The true question is how good is Blizz mechanism of storing passwords is, does the hashes ware generated using "salt", are salt stored in same DB etc. No info given by them on this matter and unfortunately the IT tends to treat such matters really poorly.

Long story short - it would be best for everyone affected to change the password everywhere they are using it .
sudosu
Profile Joined October 2011
France120 Posts
August 10 2012 14:27 GMT
#352
On August 10 2012 17:22 klo8 wrote:
Show nested quote +
On August 10 2012 17:02 windzor wrote:
On August 10 2012 16:43 RoberP wrote:
If the passwords they stole are encrypted, the chances of breaking the cypher on an 8 letter password are about zero. They'd be better off just trying to guess your password ^^. Still worth changing the secret question though.


Actually wrong. It depends on what kind of hashed passwords they got. Seeing as they mention SRP i guess the hacker was eavesdropping the login information in that protocol, or else it makes no sense for blizzard to mention the protocol.

If it was the actual database of the passwords, which might be because they got hold of other account information, the standard way of hashing passwords was considered broken by the author 2 months ago. Then blizzard should have be scared.

But my money is still on the eavesdropping of the SRP which means blizzards security office isn't fired this time around.

MD5 has been considered unsafe for a long while now. Already in 1996, a researcher wrote:
Show nested quote +
"The presented attack does not yet threaten practical applications of MD5, but it comes rather close ... in the future MD5 should no longer be implemented...where a collision-resistant hash function is required."

And in 2005:
Show nested quote +
Later that year, MD5's designer Ron Rivest wrote, "md5 and sha1 are both clearly broken (in terms of collision-resistance)."


I guess, the point is: Don't use MD5 (or SHA1, or any hash function that you can evaluate very quickly) for hashing passwords, not even a salt value will help you out because MD5 is broken. Use Bcrypt or something similar instead.


SHA512 is perfectly fine too (for the moment).
Rannasha
Profile Blog Joined August 2010
Netherlands2398 Posts
August 10 2012 14:56 GMT
#353
On August 10 2012 23:20 rast wrote:
Most peaple here doesn't realise the fact that their stolen hashes are probably decyphered into their passwords already by said hackers. Nowadays hackers doesn't needs to crack your hash to get the passwords. There's a thing called "rainbow tables", which is basically hugh dictionary containing the password and its possible hash. Those tables are traded between hacking organisations. If somebodie acuires your hash and has access to this rainbow table all he needs to do is look up possible password which generate mentioned hash. Also as someone stateb before, the algorithm used to hash the password can be determined just by looking at sample hashes, to some extent.


This is only true when the password is hashed without any added salt. Once you add salts to the hashing function, the use of rainbow tables becomes far less effective. Sophisticated salting techniques can negate pretty much any efficient attack with rainbow tables. Consequently, any well-designed authentication system uses salts in their hashing function.
Such flammable little insects!
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 14:58 GMT
#354
On August 10 2012 23:20 rast wrote:
Most peaple here doesn't realise the fact that their stolen hashes are probably decyphered into their passwords already by said hackers. Nowadays hackers doesn't needs to crack your hash to get the passwords. There's a thing called "rainbow tables", which is basically hugh dictionary containing the password and its possible hash. Those tables are traded between hacking organisations. If somebodie acuires your hash and has access to this rainbow table all he needs to do is look up possible password which generate mentioned hash. Also as someone stateb before, the algorithm used to hash the password can be determined just by looking at sample hashes, to some extent.

Also there's a confusion in this topic between the protocol and actual authenticatuion. SRP is just a protocol which "carry" your password between diffrent services, similar to SSH. It has no use in authentication process, which essentially checks if your password is correct or not. Whether Blizz implemented any kind of protocol is irrelevant to actual authentication mechanism, which tends to be just converting your password into hash.

The true question is how good is Blizz mechanism of storing passwords is, does the hashes ware generated using "salt", are salt stored in same DB etc. No info given by them on this matter and unfortunately the IT tends to treat such matters really poorly.

Long story short - it would be best for everyone affected to change the password everywhere they are using it .

i was just explaining the other half of the process. i got lazy. thank you.
Team Liquid is the used the tampon of the starcraft community.
GohgamX
Profile Joined April 2011
Canada1096 Posts
August 10 2012 15:06 GMT
#355
This sucks. Going to change now.
Time is a great teacher, unfortunate that it kills all its pupils ...
windzor
Profile Joined October 2010
Denmark1013 Posts
August 10 2012 15:09 GMT
#356
On August 10 2012 17:22 klo8 wrote:
Show nested quote +
On August 10 2012 17:02 windzor wrote:
On August 10 2012 16:43 RoberP wrote:
If the passwords they stole are encrypted, the chances of breaking the cypher on an 8 letter password are about zero. They'd be better off just trying to guess your password ^^. Still worth changing the secret question though.


Actually wrong. It depends on what kind of hashed passwords they got. Seeing as they mention SRP i guess the hacker was eavesdropping the login information in that protocol, or else it makes no sense for blizzard to mention the protocol.

If it was the actual database of the passwords, which might be because they got hold of other account information, the standard way of hashing passwords was considered broken by the author 2 months ago. Then blizzard should have be scared.

But my money is still on the eavesdropping of the SRP which means blizzards security office isn't fired this time around.

MD5 has been considered unsafe for a long while now. Already in 1996, a researcher wrote:
Show nested quote +
"The presented attack does not yet threaten practical applications of MD5, but it comes rather close ... in the future MD5 should no longer be implemented...where a collision-resistant hash function is required."

And in 2005:
Show nested quote +
Later that year, MD5's designer Ron Rivest wrote, "md5 and sha1 are both clearly broken (in terms of collision-resistance)."


I guess, the point is: Don't use MD5 (or SHA1, or any hash function that you can evaluate very quickly) for hashing passwords, not even a salt value will help you out because MD5 is broken. Use Bcrypt or something similar instead.


MD5crypt and the MD5 hash function is 2 different algorithms for 2 different problems. So what you are linking too is like comparing apples and oranges. MD5crypt was the defacto standard to password hashing until 2 months ago, and most systems which are older still uses it because it. The MD5crypt weakness was first discovered by the author after Linkedin was hacked and their hashed passwords got hacked...
Yeah
kubiks
Profile Blog Joined March 2011
France1328 Posts
August 10 2012 15:48 GMT
#357
On August 10 2012 23:20 rast wrote:
Most peaple here doesn't realise the fact that their stolen hashes are probably decyphered into their passwords already by said hackers. Nowadays hackers doesn't needs to crack your hash to get the passwords. There's a thing called "rainbow tables", which is basically hugh dictionary containing the password and its possible hash. Those tables are traded between hacking organisations. If somebodie acuires your hash and has access to this rainbow table all he needs to do is look up possible password which generate mentioned hash. Also as someone stateb before, the algorithm used to hash the password can be determined just by looking at sample hashes, to some extent.

Also there's a confusion in this topic between the protocol and actual authenticatuion. SRP is just a protocol which "carry" your password between diffrent services, similar to SSH. It has no use in authentication process, which essentially checks if your password is correct or not. Whether Blizz implemented any kind of protocol is irrelevant to actual authentication mechanism, which tends to be just converting your password into hash.

The true question is how good is Blizz mechanism of storing passwords is, does the hashes ware generated using "salt", are salt stored in same DB etc. No info given by them on this matter and unfortunately the IT tends to treat such matters really poorly.

Long story short - it would be best for everyone affected to change the password everywhere they are using it .


Not sure if I understand what a "rainbow table" is, but if your password isn't a word of the dictionnary, how can thoses tables can store all the passwords and his hash ? I understand if the pass is less than 6 caracter long, but beyond it just look like this kind of table would just be way too big...(as, too big to be stored on anything)
Juanald you're my hero I miss you -> best troll ever on TL <3
DertoQq
Profile Joined October 2010
France906 Posts
August 10 2012 15:55 GMT
#358
On August 10 2012 23:18 Gorsameth wrote:
Show nested quote +
On August 10 2012 23:10 Nizaris wrote:
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.

hahaha. goes to show how clueless you are. case sensitive passwords are allot harder to crack then case insensitive since 'a' and 'A' are 2 different letters therefore u have exponentially more possibilities.

It pisses you off that websites forces you not to use a retarded password ? some ppl...

who uses upper cases letter in their passwords ? smart ppl do.


Actualy it barely matters at all. Brute forcing passwords (the only situation in which A/a matters) is just not viable. Keyloggers / man in the middle / other security breaches are how passwords get stolen. Not some computer trying out a trillion possible combinations.


This thread is clearly talking about some hackers managing to get the hash pw of users. Brute Force / Dictionary attacks / Rainbow tables is not only "viable", but it is the only way to use those hash. Having a complicated password is the only thing you can do to prevent having issues with that.
"i've made some empty promises in my life, but hands down that was the most generous" - Michael Scott
DertoQq
Profile Joined October 2010
France906 Posts
Last Edited: 2012-08-10 16:06:19
August 10 2012 16:01 GMT
#359
On August 11 2012 00:48 kubiks wrote:
Show nested quote +
On August 10 2012 23:20 rast wrote:
Most peaple here doesn't realise the fact that their stolen hashes are probably decyphered into their passwords already by said hackers. Nowadays hackers doesn't needs to crack your hash to get the passwords. There's a thing called "rainbow tables", which is basically hugh dictionary containing the password and its possible hash. Those tables are traded between hacking organisations. If somebodie acuires your hash and has access to this rainbow table all he needs to do is look up possible password which generate mentioned hash. Also as someone stateb before, the algorithm used to hash the password can be determined just by looking at sample hashes, to some extent.

Also there's a confusion in this topic between the protocol and actual authenticatuion. SRP is just a protocol which "carry" your password between diffrent services, similar to SSH. It has no use in authentication process, which essentially checks if your password is correct or not. Whether Blizz implemented any kind of protocol is irrelevant to actual authentication mechanism, which tends to be just converting your password into hash.

The true question is how good is Blizz mechanism of storing passwords is, does the hashes ware generated using "salt", are salt stored in same DB etc. No info given by them on this matter and unfortunately the IT tends to treat such matters really poorly.

Long story short - it would be best for everyone affected to change the password everywhere they are using it .


Not sure if I understand what a "rainbow table" is, but if your password isn't a word of the dictionnary, how can thoses tables can store all the passwords and his hash ? I understand if the pass is less than 6 caracter long, but beyond it just look like this kind of table would just be way too big...(as, too big to be stored on anything)


it is pretty big.

for example, a Rainbow table for password of length 9 (or less) containing numbers and upper case would be a file of ~800GB.

"i've made some empty promises in my life, but hands down that was the most generous" - Michael Scott
windzor
Profile Joined October 2010
Denmark1013 Posts
August 10 2012 16:11 GMT
#360
On August 11 2012 00:48 kubiks wrote:
Show nested quote +
On August 10 2012 23:20 rast wrote:
Most peaple here doesn't realise the fact that their stolen hashes are probably decyphered into their passwords already by said hackers. Nowadays hackers doesn't needs to crack your hash to get the passwords. There's a thing called "rainbow tables", which is basically hugh dictionary containing the password and its possible hash. Those tables are traded between hacking organisations. If somebodie acuires your hash and has access to this rainbow table all he needs to do is look up possible password which generate mentioned hash. Also as someone stateb before, the algorithm used to hash the password can be determined just by looking at sample hashes, to some extent.

Also there's a confusion in this topic between the protocol and actual authenticatuion. SRP is just a protocol which "carry" your password between diffrent services, similar to SSH. It has no use in authentication process, which essentially checks if your password is correct or not. Whether Blizz implemented any kind of protocol is irrelevant to actual authentication mechanism, which tends to be just converting your password into hash.

The true question is how good is Blizz mechanism of storing passwords is, does the hashes ware generated using "salt", are salt stored in same DB etc. No info given by them on this matter and unfortunately the IT tends to treat such matters really poorly.

Long story short - it would be best for everyone affected to change the password everywhere they are using it .


Not sure if I understand what a "rainbow table" is, but if your password isn't a word of the dictionnary, how can thoses tables can store all the passwords and his hash ? I understand if the pass is less than 6 caracter long, but beyond it just look like this kind of table would just be way too big...(as, too big to be stored on anything)


rainbow tables are really really big. But they don't have all possible combinations. But the more storage you have the more combinations you will have in the table.

But people are stupid, so you don't need all possible combinations. People are really really bad at remembering passwords, so a very larger portion of the passwords are made up of a string of number (birthdays/phone number) words in dictionnaries, or combinations of those two. Heck even "secure" passwords which in theory is "impossible" to bruteforce often has a system for people in which you can then generate all possible combination for.

But the beauty of rainbow tables is they are structered in a way which gives really good storage and search times. So you would be surprised how many passwords you can store with a table of only 20 gb.
Yeah
Daehlie
Profile Joined September 2010
United States43 Posts
August 10 2012 16:38 GMT
#361
My passwords, they feel so dirty and used. I'll be in the shower until I feel clean again.
SK.MC ftw
Panthae
Profile Joined May 2011
Canada205 Posts
August 10 2012 16:48 GMT
#362
Im pretty sure people who have D3 are in more trouble than people that have SC2.
For Aïur?
HolydaKing
Profile Joined February 2010
21254 Posts
August 10 2012 16:58 GMT
#363
On August 11 2012 01:48 Panthae wrote:
Im pretty sure people who have D3 are in more trouble than people that have SC2.

I'm pretty sure many if not most have both of them. Still you are of course right in terms of value of the account.
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
August 10 2012 16:58 GMT
#364
On August 11 2012 00:48 kubiks wrote:
Show nested quote +
On August 10 2012 23:20 rast wrote:
Most peaple here doesn't realise the fact that their stolen hashes are probably decyphered into their passwords already by said hackers. Nowadays hackers doesn't needs to crack your hash to get the passwords. There's a thing called "rainbow tables", which is basically hugh dictionary containing the password and its possible hash. Those tables are traded between hacking organisations. If somebodie acuires your hash and has access to this rainbow table all he needs to do is look up possible password which generate mentioned hash. Also as someone stateb before, the algorithm used to hash the password can be determined just by looking at sample hashes, to some extent.

Also there's a confusion in this topic between the protocol and actual authenticatuion. SRP is just a protocol which "carry" your password between diffrent services, similar to SSH. It has no use in authentication process, which essentially checks if your password is correct or not. Whether Blizz implemented any kind of protocol is irrelevant to actual authentication mechanism, which tends to be just converting your password into hash.

The true question is how good is Blizz mechanism of storing passwords is, does the hashes ware generated using "salt", are salt stored in same DB etc. No info given by them on this matter and unfortunately the IT tends to treat such matters really poorly.

Long story short - it would be best for everyone affected to change the password everywhere they are using it .


Not sure if I understand what a "rainbow table" is, but if your password isn't a word of the dictionnary, how can thoses tables can store all the passwords and his hash ? I understand if the pass is less than 6 caracter long, but beyond it just look like this kind of table would just be way too big...(as, too big to be stored on anything)


What a lot of rainbow tables did when they started a long time ago is not to randomly generate stuff but instead gather cleartext passwords from a lot of sources and then started from there. Since a lot of people use similar passwords it already covered 75% of all passwords that way.

Now that storage has become cheap those databases are so huge that basically any <8 character password is covered for most of the common hashing algorithms and the only thing you can hope for if your password is that short is that the password has a good salt.
snively
Profile Blog Joined August 2011
United States1159 Posts
Last Edited: 2012-08-10 17:04:39
August 10 2012 17:03 GMT
#365
changed password. i hope its enough o_O
My religion is Starcraft
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
August 10 2012 17:05 GMT
#366
On August 11 2012 02:03 snively wrote:
Show nested quote +
On August 10 2012 22:46 ThirdDegree wrote:
I got the following email last sunday:

+ Show Spoiler +
We've received a request to reset the password for this Battle.net account. Please click this link to reset your password:
https://us.battle.net/account/support/password-reset-confirm.......

If you no longer wish to make the above change, or if you did not initiate this request, please disregard and/or delete this e-mail.

If you have any questions regarding your Battle.net account, click here for answers to frequently asked questions and contact information for the Blizzard Billing & Account Services team.

Sincerely,
The Battle.net Account Team
Online Privacy Policy


I suppose this might be connected.


i got this too. can anyone confirm if its legit?


Did you click on the "reset password" button? If not, delete that mail.
paralleluniverse
Profile Joined July 2010
4065 Posts
August 10 2012 17:31 GMT
#367
On August 10 2012 23:10 Nizaris wrote:
Show nested quote +
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.

hahaha. goes to show how clueless you are. case sensitive passwords are allot harder to crack then case insensitive since 'a' and 'A' are 2 different letters therefore u have exponentially more possibilities.

It pisses you off that websites forces you not to use a retarded password ? some ppl...

who uses upper cases letter in their passwords ? smart ppl do.

http://www.teamliquid.net/forum/viewmessage.php?topic_id=359393&currentpage=17#328
http://www.teamliquid.net/forum/viewmessage.php?topic_id=359393&currentpage=18#350
paralleluniverse
Profile Joined July 2010
4065 Posts
August 10 2012 17:34 GMT
#368
Can someone with more knowledge on cryptography offer their thoughts on this article: http://www.opine.me/blizzards-battle-net-hack/

It basically says that the SRP protocol, which is what Blizzard uses to encrypt passwords, is very easy to crack.
rast
Profile Joined July 2012
Poland44 Posts
Last Edited: 2012-08-10 18:01:36
August 10 2012 18:00 GMT
#369
On August 11 2012 02:34 paralleluniverse wrote:
Can someone with more knowledge on cryptography offer their thoughts on this article: http://www.opine.me/blizzards-battle-net-hack/

It basically says that the SRP protocol, which is what Blizzard uses to encrypt passwords, is very easy to crack.


This article is true, as I said before, SRP is just a protocol which "carry" your password to Blizzard.

Imagine you want to send a message to your friend few blocks away. You tell this message to your fellow postman. The postman is very relliable, and even if someone kidnaps him, bits him, and torture him for several days, he wont tell anyone your message. When postman arrives in your friends home, he writes down this message and leaves it on his table.

The SRP is that relliable postman. What hackers stole, is the message that postman left on your friends table. They dont need to crack "postman" to read out your messaage.

Of course the password are probably salted, and it might be that salt is keept seperately from passwords. But all they need now is perform a dictionary attack or maybe use a rainbow table if there is no salt or the salt is really weak.

Also, lest not forget that hackers has access to some big botnets, whichs computing power might challange best super computers, but this is just assumption.
MrTortoise
Profile Joined January 2011
1388 Posts
Last Edited: 2012-08-10 18:15:23
August 10 2012 18:04 GMT
#370
tbh given the extent they were compramised they seem to of actually got their security right

good job blizz.


The point is the security bought TIME. That is all it can buy.
Your accoutn could be hacked directly through permutations of passwords directly ito the client... that would take hundreds of years.
This gives them a short cut but it still gives users a decent amount of time untill a significant proportion of passwords get cracked


Personally i use bcrypt on one of its hardest settings to hash things ... but that is because i can afford to.

As a developer who comes down on any security breach like a ton of bricks (we havent found out how and if it turns out to be a sql injection attack i will reverse this statement VERY quickly) - it seem like blizzard has done a lot of what is reasonable to secure things.

SHA1 is recognised as a good strong hash. Its only weakness is that it is quite a quick hash and so not the best choice for password hashing (it is great for h ashing LARGE file streams) - where you want to choose a slow algorithm as that massivley reduces number of guesses pe5r second.

The problem with slow algorithms is that they EAT cpu ... and go back to D3 release when authentication servers kept falling over. You see the really hard spot they were in ... ie they seemingly couldn't afford to use blowfish due to the scale of their operations as their servers cant cope with a fast sha1 algorithm.
cLAN.Anax
Profile Blog Joined July 2012
United States2847 Posts
August 10 2012 18:16 GMT
#371
Gaaah. I have to get on Battle.net again, lol. Thanks for the warning, and I'm glad they're working to take care of it. :-)
┬─┬___(ツ)_/¯ 彡┻━┻ I am the 4%. "I cant believe i saw ANAL backwards before i saw the word LAN." - Capped
Viliphied
Profile Joined July 2012
United States2 Posts
August 10 2012 18:16 GMT
#372
On August 11 2012 00:55 DertoQq wrote:
Show nested quote +
On August 10 2012 23:18 Gorsameth wrote:
On August 10 2012 23:10 Nizaris wrote:
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.

hahaha. goes to show how clueless you are. case sensitive passwords are allot harder to crack then case insensitive since 'a' and 'A' are 2 different letters therefore u have exponentially more possibilities.

It pisses you off that websites forces you not to use a retarded password ? some ppl...

who uses upper cases letter in their passwords ? smart ppl do.


Actualy it barely matters at all. Brute forcing passwords (the only situation in which A/a matters) is just not viable. Keyloggers / man in the middle / other security breaches are how passwords get stolen. Not some computer trying out a trillion possible combinations.


This thread is clearly talking about some hackers managing to get the hash pw of users. Brute Force / Dictionary attacks / Rainbow tables is not only "viable", but it is the only way to use those hash. Having a complicated password is the only thing you can do to prevent having issues with that.


The thing is, if your password is 8+ characters of only lower case and numbers, adding another character adds more complexity than adding case sensitivity.
DertoQq
Profile Joined October 2010
France906 Posts
August 10 2012 18:32 GMT
#373
On August 11 2012 03:16 Viliphied wrote:
Show nested quote +
On August 11 2012 00:55 DertoQq wrote:
On August 10 2012 23:18 Gorsameth wrote:
On August 10 2012 23:10 Nizaris wrote:
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.

hahaha. goes to show how clueless you are. case sensitive passwords are allot harder to crack then case insensitive since 'a' and 'A' are 2 different letters therefore u have exponentially more possibilities.

It pisses you off that websites forces you not to use a retarded password ? some ppl...

who uses upper cases letter in their passwords ? smart ppl do.


Actualy it barely matters at all. Brute forcing passwords (the only situation in which A/a matters) is just not viable. Keyloggers / man in the middle / other security breaches are how passwords get stolen. Not some computer trying out a trillion possible combinations.


This thread is clearly talking about some hackers managing to get the hash pw of users. Brute Force / Dictionary attacks / Rainbow tables is not only "viable", but it is the only way to use those hash. Having a complicated password is the only thing you can do to prevent having issues with that.


The thing is, if your password is 8+ characters of only lower case and numbers, adding another character adds more complexity than adding case sensitivity.


True, but I was responding to a post saying that password complexity doesn't matter because hackers won't brute force it, which is completely false.

Password complexity is really important. Upper case DO increase it, even though it is not needed because you can achieve better results by increasing the length.
"i've made some empty promises in my life, but hands down that was the most generous" - Michael Scott
NIIINO
Profile Blog Joined July 2010
Slovakia1320 Posts
August 10 2012 19:11 GMT
#374
What if they hacked Mikes mail too, so they can ask us to change our passwords on the site they are monitoring ?
Shenghi
Profile Joined August 2010
167 Posts
August 10 2012 19:17 GMT
#375
On August 11 2012 04:11 NIIINO wrote:
What if they hacked Mikes mail too, so they can ask us to change our passwords on the site they are monitoring ?

Then just follow the golden rule: Blizzard will never ask you for your password.
People are not born stupid, they choose to be stupid. If you made that choice, please change your mind.
Integra
Profile Blog Joined January 2008
Sweden5626 Posts
Last Edited: 2012-08-10 19:38:21
August 10 2012 19:37 GMT
#376
On August 11 2012 01:58 Morfildur wrote:
Show nested quote +
On August 11 2012 00:48 kubiks wrote:
On August 10 2012 23:20 rast wrote:
Most peaple here doesn't realise the fact that their stolen hashes are probably decyphered into their passwords already by said hackers. Nowadays hackers doesn't needs to crack your hash to get the passwords. There's a thing called "rainbow tables", which is basically hugh dictionary containing the password and its possible hash. Those tables are traded between hacking organisations. If somebodie acuires your hash and has access to this rainbow table all he needs to do is look up possible password which generate mentioned hash. Also as someone stateb before, the algorithm used to hash the password can be determined just by looking at sample hashes, to some extent.

Also there's a confusion in this topic between the protocol and actual authenticatuion. SRP is just a protocol which "carry" your password between diffrent services, similar to SSH. It has no use in authentication process, which essentially checks if your password is correct or not. Whether Blizz implemented any kind of protocol is irrelevant to actual authentication mechanism, which tends to be just converting your password into hash.

The true question is how good is Blizz mechanism of storing passwords is, does the hashes ware generated using "salt", are salt stored in same DB etc. No info given by them on this matter and unfortunately the IT tends to treat such matters really poorly.

Long story short - it would be best for everyone affected to change the password everywhere they are using it .


Not sure if I understand what a "rainbow table" is, but if your password isn't a word of the dictionnary, how can thoses tables can store all the passwords and his hash ? I understand if the pass is less than 6 caracter long, but beyond it just look like this kind of table would just be way too big...(as, too big to be stored on anything)


What a lot of rainbow tables did when they started a long time ago is not to randomly generate stuff but instead gather cleartext passwords from a lot of sources and then started from there. Since a lot of people use similar passwords it already covered 75% of all passwords that way.

Now that storage has become cheap those databases are so huge that basically any <8 character password is covered for most of the common hashing algorithms and the only thing you can hope for if your password is that short is that the password has a good salt.

To simplify the difference between bruteforce and rainbow tables. Bruteforce uses process power to calculate various test passwords and then compare them with the real password to be cracked, what Rainbow tables does is that each test password is already saved in a database table. Then Instead of using raw process power you simply have huge tables of already pre-calculated test passwords that you simply fetch from the table instead of generating new ones. to simply fetch already created passwords goes allot faster compared to computing new ones each time.
Bruteforce requires allot of process power while rainbow tables requires allot of HD space.

And that is the difference between brute force and rainbow tables.

"Dark Pleasure" | | I survived the Locust war of May 3, 2014
Finalmastery
Profile Blog Joined October 2011
United States58 Posts
August 10 2012 19:42 GMT
#377
Thanks for this post I had no idea that this happened I'll be changing my password right away.
" The will to win is nothing without the will to prepare" - Juma Ikaanga
windzor
Profile Joined October 2010
Denmark1013 Posts
August 10 2012 19:48 GMT
#378
On August 11 2012 03:00 rast wrote:
Show nested quote +
On August 11 2012 02:34 paralleluniverse wrote:
Can someone with more knowledge on cryptography offer their thoughts on this article: http://www.opine.me/blizzards-battle-net-hack/

It basically says that the SRP protocol, which is what Blizzard uses to encrypt passwords, is very easy to crack.


This article is true, as I said before, SRP is just a protocol which "carry" your password to Blizzard.

Imagine you want to send a message to your friend few blocks away. You tell this message to your fellow postman. The postman is very relliable, and even if someone kidnaps him, bits him, and torture him for several days, he wont tell anyone your message. When postman arrives in your friends home, he writes down this message and leaves it on his table.

The SRP is that relliable postman. What hackers stole, is the message that postman left on your friends table. They dont need to crack "postman" to read out your messaage.

Of course the password are probably salted, and it might be that salt is keept seperately from passwords. But all they need now is perform a dictionary attack or maybe use a rainbow table if there is no salt or the salt is really weak.

Also, lest not forget that hackers has access to some big botnets, whichs computing power might challange best super computers, but this is just assumption.


But then again this article assumes that the hacker got the verifier database, which isn't totally clear from the blizzard statement if this is true. The statement could just be a eavesdrop of the data between the machine who has the verifier database and the login service. But anyway people should still not believe their password to be secure.
Yeah
discomatt
Profile Joined March 2012
113 Posts
Last Edited: 2012-08-10 20:08:50
August 10 2012 20:01 GMT
#379
On August 11 2012 02:34 paralleluniverse wrote:
Can someone with more knowledge on cryptography offer their thoughts on this article: http://www.opine.me/blizzards-battle-net-hack/

It basically says that the SRP protocol, which is what Blizzard uses to encrypt passwords, is very easy to crack.


It's still difficult. Unless you're using a common password found in that list of 1,000,000 the attacker wants to test, you have nothing to worry about.

Each digest must be brute-forced individually. Even 1billion computations/day doesn't come close to the number of possible alphanumeric, lowercase, 8-character passwords for a single user.

36^8 = Nearly 3-trillion possible combinations. Even if the attacker finds a match 50% through the attack, it would still cost him just under $1,500 to recover a single user's password via Amazon EC2.

As for rainbow tables, this method uses individual salts. Rainbow tables are useless.


On August 11 2012 03:00 rast wrote:
This article is true, as I said before, SRP is just a protocol which "carry" your password to Blizzard.

Imagine you want to send a message to your friend few blocks away. You tell this message to your fellow postman. The postman is very relliable, and even if someone kidnaps him, bits him, and torture him for several days, he wont tell anyone your message. When postman arrives in your friends home, he writes down this message and leaves it on his table.

The SRP is that relliable postman. What hackers stole, is the message that postman left on your friends table. They dont need to crack "postman" to read out your messaage.

Of course the password are probably salted, and it might be that salt is keept seperately from passwords. But all they need now is perform a dictionary attack or maybe use a rainbow table if there is no salt or the salt is really weak.

Also, lest not forget that hackers has access to some big botnets, whichs computing power might challange best super computers, but this is just assumption.


Pretty over-simplified here. Salts are considered public data. They aren't meant to be private, they're meant to make 2 identical passwords produce different digests. Unique salts are part of SRP, so it's pretty safe to assume they were used.

The analogy is a terrible one, and flat out wrong. The same message given to the postman is written on the paper. The postman doesn't know what the original message even was, and that's the point of SRP.

Finally, botnets aren't usually used to harness CPU power... the idea is for the zombie computer to never realize they're infected. Stealing CPU cycles isn't a good way to do this. You're much better off simply renting a cluster of high-powered floating point processors and using that.
Kvz
Profile Joined March 2010
United States463 Posts
August 10 2012 22:53 GMT
#380
in the last day my cell phone has been spammed with telemarketers (hasn't happened ever) and im getting spam emails. is this coincidence or due to this security breach?
NrG.Kvz
MisterD
Profile Blog Joined June 2010
Germany1338 Posts
August 10 2012 23:24 GMT
#381
On August 11 2012 07:53 Kvz wrote:
in the last day my cell phone has been spammed with telemarketers (hasn't happened ever) and im getting spam emails. is this coincidence or due to this security breach?

No, if you had your phone registered in the battle.net database, it's likely that this isn't a coincidence. Contrary to destroying someones ladder rank for fun, which isn't profitable, selling stolen addresses and phone numbers to advertisers actually does generate profits for the hackers, so those are some of the things to be expected.
Gold isn't everything in life... you need wood, too!
Wuster
Profile Joined May 2011
1974 Posts
August 10 2012 23:42 GMT
#382
On August 11 2012 08:24 MisterD wrote:
Show nested quote +
On August 11 2012 07:53 Kvz wrote:
in the last day my cell phone has been spammed with telemarketers (hasn't happened ever) and im getting spam emails. is this coincidence or due to this security breach?

No, if you had your phone registered in the battle.net database, it's likely that this isn't a coincidence. Contrary to destroying someones ladder rank for fun, which isn't profitable, selling stolen addresses and phone numbers to advertisers actually does generate profits for the hackers, so those are some of the things to be expected.


Probably worth plugging this to all the Americans effected.
https://www.donotcall.gov/

Hopefully there's something equivalent in other countries.
Nymphaceae
Profile Blog Joined November 2010
United States350 Posts
August 11 2012 01:48 GMT
#383
I've had my account hacked twice. The first time, I was supposedly selling gold to friends on WoW, and the 2nd time, some one was trying to sell a D3 account under my user name.
Onlinejaguar
Profile Joined April 2010
Australia2823 Posts
August 11 2012 03:00 GMT
#384
While this sucks to hear im glad blizzard told us right away.
Elegance
Profile Blog Joined February 2009
Canada917 Posts
August 11 2012 03:07 GMT
#385
"At this time, we’ve found no evidence that financial information such as credit cards, billing addresses, or real names were compromised"

But they probably don't have evidence that they weren't compromised right?
Power of Ze
nAgeDitto
Profile Joined April 2011
United States428 Posts
August 11 2012 03:27 GMT
#386
On August 11 2012 12:07 Elegance wrote:
"At this time, we’ve found no evidence that financial information such as credit cards, billing addresses, or real names were compromised"

But they probably don't have evidence that they weren't compromised right?


In this case, the lack of evidence (yet) could be evidence that they weren't compromised


Oaky
Profile Joined August 2012
United States95 Posts
August 11 2012 06:29 GMT
#387
Sounds pretty bad, but i have faith in blizzard. Just gonna change my password and no worries ya kno? people shudnt freak out.
SOOOOOOO MANY BANELINGS!
rast
Profile Joined July 2012
Poland44 Posts
Last Edited: 2012-08-11 10:08:41
August 11 2012 10:08 GMT
#388
On August 11 2012 05:01 discomatt wrote:
Finally, botnets aren't usually used to harness CPU power... the idea is for the zombie computer to never realize they're infected. Stealing CPU cycles isn't a good way to do this. You're much better off simply renting a cluster of high-powered floating point processors and using that.


Botnets are mainly used to send tone of spam or perform DDoS attacks, which essentially steals CPU cycles, so I assume they wont be concerned to add some additional CPU overhead to their zombie net . Essentially they can do what they want with botnets, and this include hash cracking. And for them its free, so its quite cheaper than renting a cluster of servers.
ysnake
Profile Joined June 2012
Bosnia-Herzegovina261 Posts
Last Edited: 2012-08-11 12:03:21
August 11 2012 10:14 GMT
#389
Wasn't this done so they could screw players in that WoW tournament? Someone was getting DDoSed constantly there and a couple of accounts were hacked.
You are no longer automatically breathing and blinking.
Abacus1
Profile Joined August 2011
Australia45 Posts
August 11 2012 11:57 GMT
#390
Personally pretty happy they came out and addressed worries of the community before rumors started first. Not too worried based on what was said.
'We all got our choices to make...'
KoiKetv
Profile Joined December 2011
Canada7 Posts
August 11 2012 13:04 GMT
#391
My account got hacked that day. Only good thing about it the guy reactivated my WoW account and paid 55$ for a server/race transfer. I'm enjoying some free time -_-
Live free or die
DreamChaser
Profile Blog Joined February 2011
1649 Posts
August 12 2012 00:22 GMT
#392
On August 11 2012 22:04 KoiKetv wrote:
My account got hacked that day. Only good thing about it the guy reactivated my WoW account and paid 55$ for a server/race transfer. I'm enjoying some free time -_-


Thats the good guy hacker, he just gives you free stuff while you try to figure out what happened
Plays against every MU with nexus first.
ChiknAdobo
Profile Joined November 2010
United States208 Posts
August 12 2012 02:36 GMT
#393
So I changed my password, but the next day I forgot it so I had to change it again lol.
ZERg
ImNightmare
Profile Joined May 2012
1575 Posts
August 12 2012 02:37 GMT
#394
On August 11 2012 22:04 KoiKetv wrote:
My account got hacked that day. Only good thing about it the guy reactivated my WoW account and paid 55$ for a server/race transfer. I'm enjoying some free time -_-

why does that never happen to me.
Zzoram
Profile Joined February 2008
Canada7115 Posts
August 12 2012 06:29 GMT
#395
The email I used for my Battle.net account got hacked either today or not much longer ago, I can't access that email anymore. That can't be a co-incidence, it must be due to this Battle.net server hack.
TsGBruzze
Profile Blog Joined April 2012
Sweden1190 Posts
August 12 2012 06:57 GMT
#396
blizzard handled this very good!
''you got to yolo things up to win''
paralleluniverse
Profile Joined July 2010
4065 Posts
August 12 2012 06:57 GMT
#397
On August 12 2012 15:29 Zzoram wrote:
The email I used for my Battle.net account got hacked either today or not much longer ago, I can't access that email anymore. That can't be a co-incidence, it must be due to this Battle.net server hack.

Did you use the same secret question and answer on the B.net account and email account?
whetherby
Profile Joined May 2010
United States53 Posts
August 13 2012 00:33 GMT
#398
How do I change my answers to the secret questions?
KaluGOSU
Profile Blog Joined May 2010
United States171 Posts
August 13 2012 07:41 GMT
#399
I lose all my items on WoW and D3 thanks blizzard
Halt! Thou shalt not pass. Thou hast much anger, young one
Shenghi
Profile Joined August 2010
167 Posts
August 13 2012 08:57 GMT
#400
On August 13 2012 16:41 KaluGOSU wrote:
I lose all my items on WoW and D3 thanks blizzard

This is most likely unrelated. Those who are capable of breaching Blizzard security, are not interested in your game accounts. They have better things to gain.

This besides the fact that, if you had a decent password to begin with, there is no way that it could have been breached already.
People are not born stupid, they choose to be stupid. If you made that choice, please change your mind.
Kotreb
Profile Joined June 2011
Croatia1392 Posts
August 13 2012 12:32 GMT
#401
China ftw!
If you don't sin Jesus died for nothing.
rezzan
Profile Joined November 2010
Sweden329 Posts
August 13 2012 13:26 GMT
#402
move along people theres nothing to see here, this happens all the time and ive yet to hear from anyone that has actually been affected by this, but its still a nuisance for blizzard that there is people that constantly tries to do this.
Sponsored by Play3r.net and eurodomination.net www.twitch.tv/tacowtf
kevinmon
Profile Joined January 2011
United States540 Posts
August 13 2012 14:01 GMT
#403
Wow Blizzard suckzorz.
BreAKerTV
Profile Blog Joined November 2011
Taiwan1658 Posts
Last Edited: 2012-08-13 15:08:02
August 13 2012 15:06 GMT
#404
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

Me too. I had a WoW account linked to my mainstream email and I got an email informing me that blizzard was aware that I was trying to sell my account.

Funny thing is I never actually paid cash to play WoW, and only spent enough time to produce a single level 23 Night Elf Hunter.

EDIT: And I haven't played wow in like 2 years.
Retired caster / streamer "BingeHD". Digital Nomad.
-Archangel-
Profile Joined May 2010
Croatia7457 Posts
August 13 2012 15:12 GMT
#405
Hmm global emails were taken. I need to make sure each Blizzard mail I get is really from Blizzard :D
SilSol
Profile Joined April 2012
Sweden2744 Posts
August 13 2012 15:14 GMT
#406
oh jesus christ! not good at all ;(
http://fragbite.se/user/117868/silsol since 2006 http://www.reddit.com/u/silsol77
Antimatterz
Profile Blog Joined October 2010
United States1010 Posts
August 13 2012 15:23 GMT
#407
On August 10 2012 07:46 MstrJinbo wrote:
Show nested quote +
On August 10 2012 07:42 mataxp wrote:
As a PSN user, dejá vu


Doesn't sound as bad as the PSN breach. Just Emails and hashed passwords being compromised. That being said I'm still changing my password.


The PSN breach was awful, I don't even know how you get that complacent in the first place as a group that just mass produces high end technology. I can't even remember how long PSN was down, wasn't it around 2 or 3 months?
"HotBid [11:45 AM]: i dunno i kinda like the big muta shooting smaller mutas out"
hobbidude
Profile Joined December 2010
Canada171 Posts
August 13 2012 16:46 GMT
#408
Careful. I just received a spam fraud email attempting to get you to change passwords that convienently times up with this hacking.
TheRealzz
Profile Joined November 2010
150 Posts
Last Edited: 2012-08-14 00:39:42
August 14 2012 00:38 GMT
#409
Whats real funny is ... Did Blizz just name the protocol they use on these password protections ? Secure Remote Password protocol (SRP) - wouldn't that provide the intruders a would be starting point on cracking ? ... Or is that actually mis-information ?

EVEN MORE LOL - is if I look it up and see ITS A WINDOWS TECHnology!!!! xD ROFL
One-base play is aggression ?
jinglesassy
Profile Joined December 2011
United States15 Posts
August 14 2012 01:09 GMT
#410
No, SRP is just a generic term for a few hundred different encryption protocols. It wouldnt help the hackers at all.
julianto
Profile Joined December 2010
2292 Posts
August 14 2012 01:12 GMT
#411
I can't believe we still aren't allowed to change our secret questions yet.
http://us.battle.net/support/en/blog/6940803
¯\_(ツ)_/¯
ZenithM
Profile Joined February 2011
France15952 Posts
August 14 2012 01:15 GMT
#412
Mike Morhaime... is a badass.
TheRealzz
Profile Joined November 2010
150 Posts
August 14 2012 01:39 GMT
#413
On August 14 2012 10:09 jinglesassy wrote:
No, SRP is just a generic term for a few hundred different encryption protocols. It wouldnt help the hackers at all.



I guess I will be searching for the Microsoft one then ? And then Microsofts excuse is its to be patched shortly ?
One-base play is aggression ?
TheRealzz
Profile Joined November 2010
150 Posts
August 14 2012 01:40 GMT
#414
On August 14 2012 10:15 ZenithM wrote:
Mike Morhaime... is a badass.


Mike Tyson is a BEAST we all know who the fck that is .... NOW ... who is Morhaime ?
One-base play is aggression ?
TheRealzz
Profile Joined November 2010
150 Posts
August 14 2012 04:25 GMT
#415
Arrrrrrgh catching old posts; this one was SOOooOOoo pipped for MS trolling ....
One-base play is aggression ?
Holytornados
Profile Joined November 2011
United States1022 Posts
August 14 2012 04:35 GMT
#416
On August 14 2012 00:06 Enders116 wrote:
Show nested quote +
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

Me too. I had a WoW account linked to my mainstream email and I got an email informing me that blizzard was aware that I was trying to sell my account.

Funny thing is I never actually paid cash to play WoW, and only spent enough time to produce a single level 23 Night Elf Hunter.

EDIT: And I haven't played wow in like 2 years.


That's probably not from Blizzard.

That's a common scam actually.
CLG/Liquid ~~ youtube.com/reddedgaming
nayc
Profile Joined August 2010
Germany42 Posts
August 14 2012 09:53 GMT
#417
i guess there are some people here who might find this interesting (and are able to understand it:-)
http://arstechnica.com/security/2012/08/hacked-blizzard-passwords-not-hard-to-crack/
There is no "i" in "fuck you!"
nayc
Profile Joined August 2010
Germany42 Posts
August 14 2012 09:53 GMT
#418
On August 14 2012 00:12 -Archangel- wrote:
Hmm global emails were taken. I need to make sure each Blizzard mail I get is really from Blizzard :D


how is that different from before?
There is no "i" in "fuck you!"
Tobberoth
Profile Joined August 2010
Sweden6375 Posts
August 14 2012 10:09 GMT
#419
Even if they had my password info from Blizz, I wouldn't care. They will in all probability not break the encryption, and if they do, my authenticator already makes sure they can't do crap.
Lorch
Profile Joined June 2011
Germany3683 Posts
August 14 2012 10:17 GMT
#420
On August 14 2012 19:09 Tobberoth wrote:
Even if they had my password info from Blizz, I wouldn't care. They will in all probability not break the encryption, and if they do, my authenticator already makes sure they can't do crap.


Thats exactly how I feel about this as well. Yeah sure let them steal all the shit, thats what I got a authenticator for in the first place anyways...
-Archangel-
Profile Joined May 2010
Croatia7457 Posts
August 14 2012 11:22 GMT
#421
Damn it, I would sell my D3 account if it wasn't also part of my WC3 and SC2 accounts :D
Serek
Profile Joined May 2011
United Kingdom459 Posts
August 14 2012 23:27 GMT
#422
On August 14 2012 18:53 nayc wrote:
i guess there are some people here who might find this interesting (and are able to understand it:-)
http://arstechnica.com/security/2012/08/hacked-blizzard-passwords-not-hard-to-crack/


I was about to post this same link until I saw your post. The article says that Blizzard's claim that the passwords are safe is not verifiable because we don't have enough public information about their security setup. It goes on to speculate how much processing power would it require to crack the passwords in a couple scenarios. According to their exercise, with the information we have available it would not be overly difficult to crack the weakest passwords in a relatively short period of time.

If I were to venture a guess, I'd say most weak passwords were cracked even before we were informed of the breach (remember there was a gap between the time Blizzard found out and the public announcement). There are bound to be some compromised accounts where Bnet password is the same as the Bnet email and those would be first to fall.

So who benefits? Easiest way to cash up on this is by quickly transferring gold/items to farmer accounts, since there's already an "infrastructure" to handle this (WoW hackers have a lot of experience in this regard). Rainbow tables and dictionaries will improve by adding thousands of new passwords to their databases, facilitating future hacks. People may have further non-Bnet accounts compromised if hackers gain access to their emails. And remember we don't know yet whether billing information was also accessed.

So no, I don't feel this is a non-issue as others in this thread do.
skyR
Profile Joined July 2009
Canada13817 Posts
August 16 2012 01:19 GMT
#423
You can update your secret question & answer and reset your authenticator now through account management.

http://us.battle.net/d3/en/blog/6983564/North_American_Battlenet_Account_Update_-8_15_2012
SilSol
Profile Joined April 2012
Sweden2744 Posts
August 16 2012 01:24 GMT
#424
On August 16 2012 10:19 skyR wrote:
You can update your secret question & answer and reset your authenticator now through account management.

http://us.battle.net/d3/en/blog/6983564/North_American_Battlenet_Account_Update_-8_15_2012


ah thx!
http://fragbite.se/user/117868/silsol since 2006 http://www.reddit.com/u/silsol77
rebuffering
Profile Joined December 2010
Canada2436 Posts
August 17 2012 01:39 GMT
#425
Hey guys, battle.net sent me an email, saying someone changed the account email address, and i can no longer log into battle.net, or SC2, is my only option to Call up Blizzard support? tried making a ticket, but its asking me to log in to make the support ticket, so, i cant do it obviously. any help is appreciated.
http://www.twitch.tv/rebufferingg
Nick_54
Profile Blog Joined November 2007
United States2230 Posts
August 17 2012 13:56 GMT
#426
Blizzard told me there was suspicious activity with my account, so I changed my password again. I think this means that they might have been trying to access my account, but couldnt get the password. Any thoughts?
jakethesnake
Profile Blog Joined May 2011
Canada4948 Posts
August 17 2012 14:03 GMT
#427
On August 17 2012 22:56 Nick_54 wrote:
Blizzard told me there was suspicious activity with my account, so I changed my password again. I think this means that they might have been trying to access my account, but couldnt get the password. Any thoughts?


Same here. At least they have a way to change the secret question now, although it is terrible (I couldn't even read the whole question). It was a hassle, but makes me glad I changed my password when I did.
Community Newsjjakji || jjakji || jjakji || jjakji || jjakji || jjakji || jjakji nshoseo.jpg
guN-viCe
Profile Joined March 2010
United States687 Posts
August 19 2012 15:52 GMT
#428
My account has been hacked. I called their support number and they gave me instructions on what to do. Now I'm just waiting.
Never give up, never surrender!!! ~~ Extraordinary claims require extraordinary evidence -Sagan
Darth Irule
Profile Joined August 2012
United States1 Post
August 20 2012 04:28 GMT
#429
I too have gotten an email saying my email was being changed. Tried to log in, password/email wasnt working. Tried to answer my security question but that one was changed.


Time to call blizzard as soon as their support line opens tomorrow morning....
EvilTeletubby
Profile Blog Joined January 2004
Baltimore, USA22254 Posts
August 20 2012 06:58 GMT
#430
Fucking Christ.

I feel like murdering somebody now.
Moderatorhttp://carbonleaf.yuku.com/topic/408/t/So-I-proposed-at-a-Carbon-Leaf-concert.html ***** RIP Geoff
rebuffering
Profile Joined December 2010
Canada2436 Posts
August 22 2012 15:51 GMT
#431
omg, calling blizzard support to try and get my account back, they tell me, sorry our queues are full, than it hangs up on me. Call back 5 mins later, it says estimated 25 mins wait. Jesus christ, i hope call support cost you a lot of money Blizz, tired of your bullshit.
http://www.twitch.tv/rebufferingg
Silidons
Profile Blog Joined September 2010
United States2813 Posts
August 24 2012 23:11 GMT
#432
Yeah one of my accounts just got hacked but I got it back. I had forgotten about it, all it had was diablo 2 & d2 lod on it anyhow.

So they did indeed get the passwords
"God fights on the side with the best artillery." - Napoleon Bonaparte
Phanekim
Profile Joined April 2003
United States777 Posts
August 27 2012 04:59 GMT
#433
Luckily for me no one has hacked me yet.....

Will changing password be enough?
i like cheese
nBk
Profile Blog Joined July 2010
174 Posts
Last Edited: 2012-08-27 05:14:36
August 27 2012 05:08 GMT
#434
Just tried to login and this is what I am greeted with...

Due to suspicious activity, this account has been locked. A message has been sent to this account’s email address containing details on how to resolve this issue. Visit http://us.battle.net/account/locked.html for more information.


Lovely... I was just on it a little over an hour ago too.. x.x

edit: resolved. Scared me for a minute.
We all die. The goal isn't to live forever, the goal is to create something that will.
StarStruck
Profile Blog Joined April 2010
25339 Posts
August 27 2012 05:10 GMT
#435
I thought this would happen eventually.

Okay then.
Mechanism4
Profile Joined March 2011
United States20 Posts
Last Edited: 2012-08-27 05:44:00
August 27 2012 05:28 GMT
#436
My account was one of the ones that got hacked. I had changed my password a little bit shortly after seeing the news but it wasn't enough for me.

I was playing sc2 one of the nights a little while ago. Then next day I got home from work and found that they had changed my email used to login. I was able to get my account back by doing the 'I think I got hacked'.


I am pleased to have gotten a response and a fix, pretty much, after about 8 hours. My sc2 was still locked for about a day after but I was able to play sc2 again after a short while.
Belial88
Profile Blog Joined November 2010
United States5217 Posts
August 27 2012 05:35 GMT
#437
Should I change my pass still?

So is just like a single guy/group hacking into accounts and stripping them? Why would anyone bother stealing an SC2 account, especially when it's so easy to get it returned back to you?
How to build a $500 i7-3770K Ultimate Computer:http://www.teamliquid.net/blogs/viewblog.php?topic_id=392709 ******** 100% Safe Razorless Delid Method! http://www.overclock.net/t/1376206/how-to-delid-your-ivy-bridge-cpu-with-out-a-razor-blade/0_100
nBk
Profile Blog Joined July 2010
174 Posts
August 27 2012 06:32 GMT
#438
On August 27 2012 14:35 Belial88 wrote:
Should I change my pass still?

So is just like a single guy/group hacking into accounts and stripping them? Why would anyone bother stealing an SC2 account, especially when it's so easy to get it returned back to you?


I would to be safe. I saw this announcement the very day it came about and never changed mine and almost lost my account today all because i thought "Oh it could never happen to me, my account isn't worth anything, just an SC2 account."
We all die. The goal isn't to live forever, the goal is to create something that will.
6NR
Profile Joined March 2012
United States1472 Posts
August 27 2012 06:38 GMT
#439
This is bad
SolHeiM
Profile Blog Joined April 2010
Sweden1264 Posts
August 27 2012 06:41 GMT
#440
On August 27 2012 15:32 nBk wrote:
Show nested quote +
On August 27 2012 14:35 Belial88 wrote:
Should I change my pass still?

So is just like a single guy/group hacking into accounts and stripping them? Why would anyone bother stealing an SC2 account, especially when it's so easy to get it returned back to you?


I would to be safe. I saw this announcement the very day it came about and never changed mine and almost lost my account today all because i thought "Oh it could never happen to me, my account isn't worth anything, just an SC2 account."


You can't think that you "just have an SC2 account," because the hackers have no idea what's on your account. All they know is an account name and a password. If there is nothing to steal, they will use your account as a botting account, where they'll buy a game and start using it.

My brother got his level 47 Witch Doctor account hacked, and the hackers leveled his character to 60, decked him out in full GF% gear and farmed for a couple of days before my brother figured out that he had been hacked.
Csong
Profile Joined March 2012
Canada396 Posts
August 27 2012 06:51 GMT
#441
wow, didnt really expect anyone to get hacked
i already changed my password what else can i do
to make sure i dont get hacked?(only have sc2 acc btw)
and what do i need to get my acc back if i do get hacked?
maartendq
Profile Blog Joined December 2010
Belgium3115 Posts
August 27 2012 07:35 GMT
#442
On August 27 2012 15:51 Csong wrote:
wow, didnt really expect anyone to get hacked
i already changed my password what else can i do
to make sure i dont get hacked?(only have sc2 acc btw)
and what do i need to get my acc back if i do get hacked?

Get an authenticator. If you do get hacked, contact blizzard with proof that the account is yours (picture of your game box with key, receipts,...).
IcedBacon
Profile Joined May 2011
Canada906 Posts
August 27 2012 08:32 GMT
#443
Whys this keep getting necro'd :/
"I went Zerg because Artosis is a douchebag." -IdrA
Normal
Please log in or register to reply.
Live Events Refresh
Next event in 3h 17m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
-ZergGirl 66
ProTech61
StarCraft: Brood War
ggaemo 1243
actioN 387
Stork 343
Leta 222
Backho 56
Nal_rA 52
Noble 50
Bale 15
Sharp 3
Dota 2
XaKoH 597
BananaSlamJamma181
ODPixel164
Fuzer 103
XcaliburYe98
League of Legends
JimRising 649
Counter-Strike
Stewie2K1309
shoxiejesuss446
Other Games
summit1g7798
shahzam639
WinterStarcraft535
ceh9403
SortOf88
Pyrionflax77
NeuroSwarm67
JuggernautJason45
Organizations
Other Games
gamesdonequick1057
BasetradeTV40
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 13 non-featured ]
StarCraft 2
• Berry_CruncH233
• davetesta31
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• HerbMon 58
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
Upcoming Events
Wardi Open
3h 17m
OSC
16h 17m
Stormgate Nexus
2 days
uThermal 2v2 Circuit
2 days
The PondCast
3 days
Replay Cast
3 days
LiuLi Cup
4 days
uThermal 2v2 Circuit
4 days
RSL Revival
4 days
RSL Revival
5 days
[ Show More ]
uThermal 2v2 Circuit
5 days
Sparkling Tuna Cup
6 days
uThermal 2v2 Circuit
6 days
Liquipedia Results

Completed

ASL Season 20: Qualifier #2
FEL Cracow 2025
CC Div. A S7

Ongoing

Copa Latinoamericana 4
Jiahua Invitational
BSL 20 Team Wars
KCM Race Survival 2025 Season 3
BSL 21 Qualifiers
HCC Europe
IEM Cologne 2025
FISSURE Playground #1
BLAST.tv Austin Major 2025
ESL Impact League Season 7
IEM Dallas 2025

Upcoming

ASL Season 20
CSLPRO Chat StarLAN 3
BSL Season 21
BSL 21 Team A
RSL Revival: Season 2
Maestros of the Game
SEL Season 2 Championship
WardiTV Summer 2025
uThermal 2v2 Main Event
Thunderpick World Champ.
MESA Nomadic Masters Fall
CS Asia Championships 2025
Roobet Cup 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.