Database Hack Puts Social Media, Webmail Users at Risk

A massive hack has served up the user names and passwords of nearly 2 million Facebook, Twitter, Google and Yahoo accounts, among others. TrustWaveEUs SpiderLabs first reported the database breach, which it said was made possible by the Pony Botnet Controller.

EUWith the source code of Pony leaked and in the wild, we continue to see new instances and forks of Pony 1.9,EU Daniel Chechik of SpiderLabs wrote in a blog post.

In addition to hundreds of thousands of Facebook, Twitter, Google and Yahoo accounts, SpiderLabs reports the breached database also let loose credentials for 1.58 million Web site log ins, 320,000 e-mail accounts, 41,000 FTP accounts, 3,000 remote desktops, and 3,000 shell accounts. But the leak itself is only one part of the story.

EUIn our analysis, passwords that use all four character types and are longer than eight characters are considered EUexcellent,EU whereas passwords with four or less characters of only one type are considered EUterribleEU,EU Chechik said. EUUnfortunately, there were more terrible passwords than excellent ones, more bad passwords than good, and the majority, as usual, is somewhere in between in the medium category.EU

The Unreported Threat

We turned to Matthew Standart, director of threat intelligence at HBGary, the technology security division of ManTech International, to get his take on the database leak. He told us it appears that Trustwave infiltrated a control server for the massive Pony botnet that was dumping credentials that it had harvested from compromised computers around the world.

What hasn't been reported, he added, is that compromised endpoints are the actual threat and they should not be overlooked. As Standart sees it, the challenge comes in that many end users rely only on antivirus software products to detect and remove malware -- but today's sophisticated malware threats slip past sensors and aren't being regularly detected....

Comments are closed.