TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Weebly hacked, 43M credentials stolen

192 pointsby ttamover 8 years ago

10 comments

drusenkoover 8 years ago
Obviously, this is a very disappointing situation for us -- we&#x27;ve always taken security very seriously since day 1, it&#x27;s something that&#x27;s been core to who we are from the beginning.<p>That said, how you respond in this situation can be just as important, and so we are making sure to be incredibly proactive in addressing the situation &amp; transparent in how we communicate the details with our customers. Our top and immediate concern has been our users and the safety of their accounts.<p>A few days ago we became aware that an unauthorized party obtained email addresses&#x2F;usernames, last login IP addresses and bcrypt hashed passwords for a large number of customers (anyone who signed up prior to March 1 of this year).<p>At this point we do not have evidence of any customer website&#x2F;account being improperly accessed. It&#x27;s also worth noting that we do not store any full credit card numbers on Weebly servers, so any credit card information was not part of this incident.<p>We immediately starting working on taking steps to notify our customers, and were able to get this out in a matter of a few days. We&#x27;re initiating password resets as of this morning, and we&#x27;ve also made several improvements to the application including new password complexity requirements and a new dashboard that gives customers an overview of recent log-in history of their Weebly account to track account activity. We also increased our bcrypt work factor from 8 to 10, and all passwords will be automatically upgraded as of the next time a user logs in.<p>We&#x27;ve hired an incident response firm who is working with our internal team to complete a full investigation. In the meantime, we&#x27;re examining our stack top to bottom and taking many steps to enhance our network and application security. This is an area we take very seriously and we&#x27;ll be putting in tremendous effort to ensure this doesn&#x27;t happen again.
评论 #12757958 未加载
评论 #12757604 未加载
评论 #12758981 未加载
评论 #12757434 未加载
评论 #12758173 未加载
papayawhipover 8 years ago
Responsible disclosure and proper handling of passwords as well as not storing credit cards. Barring no breach at all, this is about as well as something like this can go.
评论 #12757451 未加载
评论 #12757878 未加载
drinchevover 8 years ago
Every time when this happens I ask myself only one question.<p>What about all those hacked servers that we don&#x27;t know that are hacked yet?<p>There are ( and I&#x27;m pretty sure ) lots of hackers that do this on a daily basis, but don&#x27;t try to do anything malicious on a large scale ( like dumping the whole db of customers, DDoS, etc. ). They probably target medium-large or small companies&#x27; servers, put a backdoor there and analyze. Either stealing some business secrets or leave it like that for one of the dark days when some political-corporate person will need their help.<p>Having the whole human knowledge on the palm of my hand made also our own lives public-knowledge.
评论 #12760242 未加载
mattjaynesover 8 years ago
More details and background: <a href="https:&#x2F;&#x2F;www.leakedsource.com&#x2F;blog&#x2F;weebly&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.leakedsource.com&#x2F;blog&#x2F;weebly&#x2F;</a>
ksecover 8 years ago
I really like Google&#x27;s Recent Log in Activity and Location. So anyone logging into your account from a Different location, you are automatically notified. But one of the problem with this is that once hacked, it exposed your location as well.<p>2nd thing is 2FA. I hope 2FA becomes the standard for all login. Even SMS. ( I know SMS is not save in US, but I am not sure if similar can be said in EU or Japan )
stevesun21over 8 years ago
I wonder if the hacker really interested in decoding credential or they just want to collect the email addresses which is really valuable for email marketing.
评论 #12757263 未加载
评论 #12757988 未加载
lrvickover 8 years ago
I have talked to a number of current and former Weebly employees trying to convince them to use things like hardware token based 2FA, hardened servers, hardened workstations, and strong end to end encrypted password management that can&#x27;t be trivially decrypted from a private key stolen from memory. I had such things written off as being too paranoid when they are too easy -not- to set up.<p>I was not at all shocked by this headline.<p>I don&#x27;t want to just single out Weebly here as I discuss these sorts of things with people at different companies all over the bay out of personal interest and anything harder than using something like lastpass to reach production systems is considered too much work. Honestly Google and Facebook are the only large companies I have seen deploy fairly decent security practices out of the dozens I have exposure to. I credit this to the fact the employ teams people who have the specific job of continually auditing and enforcing all available security tools on their systems and fostering a culture that security is everyone&#x27;s job.<p>You will pay for security either way. Either up front paying teams of capable people, or in lost customer trust after the fact.<p>Security apathy in the valley is a cancer impacting companies of all sizes. Sure you can&#x27;t make anything perfectly secure, but you can at least force your attacker to burn a 0day. Don&#x27;t make it as easy as spoofing an email and getting an employee to click a malicious link.<p>If you have any sort if privileged access to PII data of your customers and are not even doing basics like using hardware tokens to gate your server and db access you are one keykogger or XSS away from a serious breach. If you know how to set such things up and still don&#x27;t do it, you are additionally a terrible person.<p>At the very least the data required to readily plaintext the passwords is not public in this case which is a lot better off than companies using only simple hashing like md5. Some credit is due here for sure, but I can&#x27;t help but strongly suspect the issues here and in now countless other orgs are a result of people having access to PII that don&#x27;t really care about security or respect the privacy of the user data they are responsible for.
评论 #12760896 未加载
mirekrusinover 8 years ago
But on the website it says they have 30m users only?
评论 #12757123 未加载
评论 #12757258 未加载
allerhellstenover 8 years ago
Credentials aren&#x27;t stolen for sure. I can still log in.
guessmynameover 8 years ago
And here I am, trying to apply for a Senior position there [1].<p>[1] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12752642" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12752642</a>
评论 #12757096 未加载
评论 #12757089 未加载
评论 #12757170 未加载