Summer is here! For a lot of people, that has meant hot temperatures, swimming, and a much better summer than last year. For us at SSL.com, it means that it’s time to look back at June and see what transpired in digital security. Read on for what we’ve found, and let the knowledge guide you towards safe online experiences moving forward.
RockYou2021: Billions of Passwords Leaked Online
Well, it happened. The world’s largest collection of passwords has leaked, and all 8.4 billion of them were posted on a forum used by hackers. As Anthony Spadafora reports for techradar pro, the passwords were “likely combined from previous data leaks and breaches.” In typical forum post fashion, the hacker claimed the leak was ten times that amount—82 billion—but 8,459,060,239 unique passwords is bad enough. The article explains an unexpected social media connection to the MySpace era that gave the leak its title:
The forum user who posted the collection of passwords has dubbed the compilation ‘RockYou2021′ which is likely a reference to the RockYou data breach that occurred in 2009. At the time, cybercriminals hacked their way into the servers of the company that made widgets for users’ MySpace pages and were able to obtain more than 32m passwords stored in plain text.
The leak is more than double the previous largest data breach: “The Compilation of Many Breaches.” As the article notes, that is partially attributable to the fact that RockYou2021 includes all of the passwords from the Compilation of Many Breaches. In addition, it’s worth remembering that the number of passwords exceeds the number of people online, which is only 4.7 billion.
Meat Producer Pays $11 Million to Ransomware Attackers
Ransomware attacks have been making headlines lately, and it’s easy to see why. In yet another incident that disrupted international business, JBS Foods—the world’s largest meat supplier—revealed it had paid $11 million to fix an incident that threatened its international operations. A statement from the company, reported by Simon Sharwood of The Register, explains they made the decision to pay up “(i)n consultation with internal IT professionals and third-party cybersecurity experts … to mitigate any unforeseen issues related to the attack and ensure no data was exfiltrated.” The article continues:
“An investigation of the incident is ongoing. JBS wrote that it’s unable to offer “final determinations” about the incident and described the FBI’s opinion that the perpetrators being “one of the most specialized and sophisticated cybercriminal groups in the world”.
Indeed, the FBI has released a statement that attributes the attack to a group that has been linked to the Colonial Pipeline attack.
New York State Internal Code Repository Exposed
Oh boy. Tech Crunch’s Zach Whittaker reports that an internal code bank used by the New York State IT office was thrown open for the world to see. That’s bad news, as the repository contained “secret keys and passwords associated with state government systems.” SpiderSilk, a Dubai cybersecurity company, discovered the GitLab server, which was “acessible from the internet and configured so that anyone from outside the organization could create a user account and log in unimpeded” according to SpiderSilk’s chief security officer Mossab Hussein via TechCrunch.
After affirming that the server was open and accepting new user accounts, TechCrunch contacted the governor’s office, and the server went offline after it had apparently been up since at least March. Eventually, a spokesperson attributed the security breach to a vendor and denied that there was any data at risk.
ALPACA: New Study of Cross-Protocol Attacks on HTTPS
This one is a little complicated, but it’s important, so please bear with us. Essentially, a new study looks at the potential havoc a man-in-the-middle attacker could create by confusing a browser that is trying to connect to an HTTPS website and “tricking” it into connecting to a server running a different protocol, such as an FTP or email server. The researchers have dubbed this sort of application layer content confusion attack “ALPACA.” As Ars Technica reports in a piece by Dan Goodin,
Because the browser is communicating in HTTPS and the email or FTP server is using SMTP, FTPS, or another protocol, the possibility exists that things might go horribly wrong—a decrypted authentication cookie could be sent to the attacker, for instance, or an attacker could execute malicious code on the visiting machine…In a research paper published on Wednesday, Brinkmann and seven other researchers investigated the feasibility of using what they call cross-protocol attacks to bypass TLS protections. The technique involves an MitM attacker redirecting cross-origin HTTP requests to servers that communicate over SMTP, IMAP, POP3, or FTP, or another communication protocol.
The article notes that, overall, such an attack “is very situational and targets individual users,” making the risk to the general public not that high at the moment. However, as more services are protected with TLS, it could become a more widespread pattern, so the time to mitigate the threat is now. The ALPACA Attack study authors recommend the use of the Application Layer Protocol Negotiation (ALPN) and Server Name Indication (SNI) TLS extensions to mitigate the threat.