http://krebsonsecurity.com
The recent data breach at Adobe that exposed user
account information and prompted a flurry of password reset emails
impacted at least 38 million users, the company now says. It also
appears that the already massive source code leak at Adobe is broadening
to include the company’s Photoshop family of graphical design products.
In a breach first announced on this blog Oct. 3, 2013,
Adobe said hackers had stolen nearly 3 million encrypted customer
credit card records, as well as login data for an undetermined number of
Adobe user accounts.
At time time, a massive trove of stolen Adobe account data viewed by
KrebsOnSecurity indicated that — in addition to the credit card records
– tens of millions of user accounts across various Adobe online
properties may have been compromised in the break-in. It was difficult
to fully examine many of the files on the hackers’ server that housed
the stolen source because many of the directories were password
protected, and Adobe was reluctant to speculate on the number of users
potentially impacted.
But just this past weekend, AnonNews.org posted a
huge file called “users.tar.gz” that appears to include more than 150
million username and hashed password pairs taken from Adobe. The 3.8 GB
file looks to be the same one Hold Security CTO Alex Holden and I found on the server with the other data stolen from Adobe.
Adobe spokesperson Heather Edell said the company
has just completed a campaign to contact all existing users whose login
and encrypted password information was stolen, urging those users to
reset their passwords. She said Adobe has no indication that there has
been any unauthorized activity on any Adobe ID involved in the incident.
“So far, our investigation has confirmed that the attackers obtained
access to Adobe IDs and (what were at the time valid), encrypted
passwords for approximately 38 million active users,” Edell
said [emphasis added]. “We have completed email notification of these
users. We also have reset the passwords for all Adobe IDs with valid,
encrypted passwords that we believe were involved in the
incident—regardless of whether those users are active or not.”
Edell said Adobe believes that the attackers also obtained access to
many invalid Adobe IDs, inactive Adobe IDs, Adobe IDs with invalid
encrypted passwords, and test account data. “We are still in the process
of investigating the number of inactive, invalid and test accounts
involved in the incident,” she wrote in an email. “Our notification to
inactive users is ongoing.”
==> Read More
Subscribe to:
Post Comments (Atom)
Popular Post
Archive Blog
Powered by Blogger.
Category
Adobe
(1)
android
(1)
Application Security
(3)
APT
(1)
Cheat Sheet
(3)
Facebook
(2)
Forensic
(16)
General Security
(7)
google
(1)
Hacking
(28)
Hijacking
(3)
iOS
(1)
Linux
(5)
Linux Command
(1)
Malware
(2)
Mobile Device
(2)
Nmap
(1)
OWASP
(1)
Password
(2)
Research
(2)
Reverse Engineering
(5)
SANS
(1)
Scripts
(1)
Security
(7)
Security Tools
(3)
Social media
(1)
SSL
(1)
SysAdmins
(1)
Twitter
(1)
Video
(8)
Vulnerability
(1)
Wi-Fi
(1)
XSS
(2)
ohh..its bad to hear that adobe breached it. I never have such kind of impression about adobe. I hope that everything will be ok very soon. Thanks!
ReplyDeletedigital signature