TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Reddit Security Incident

308 点作者 pyreal将近 7 年前

24 条评论

packetized将近 7 年前
Interesting that the data accessed was very specifically only limited to:<p>* A complete copy of an old database backup containing very early Reddit user data -- from the site’s launch in 2005 through May 2007<p>* Logs containing the email digests we sent between June 3 and June 17, 2018<p>Also of note:<p>&quot;Already having our primary access points for code and infrastructure behind strong authentication requiring two factor authentication (2FA), we learned that SMS-based authentication is not nearly as secure as we would hope, and the main attack was via SMS intercept.&quot;<p>If this doesn&#x27;t put the nail in the coffin of SMS-based 2FA, I&#x27;m not sure what will.
评论 #17665990 未加载
评论 #17665281 未加载
评论 #17666455 未加载
评论 #17665118 未加载
评论 #17666348 未加载
评论 #17664474 未加载
slg将近 7 年前
The hacker(s) took a database backup from 2007. I have never worked anywhere that has kept a backup that long. It is possible it is some sort of final archive before a large migration, redesign, or something like that. However if the intent is to keep it forever it should at least be encrypted. As far as I&#x27;m aware, the only strong reason to not enable encryption on backups is to allow a secondary backup or mirroring system to compare the changes between backup files rather than reprocessing the entire thing as a single new file. That reason disappears for an archived backup.
评论 #17664629 未加载
评论 #17664611 未加载
zokier将近 7 年前
While everyone is piling on how SMS 2FA is oh so bad, it is worth noting that it is supposed to be the second factor here. So what happened to the first factor is the obvious question. Someone was using weak&#x2F;compromised password or got social engineered would be my guesses, neither which are very good options.
评论 #17669228 未加载
评论 #17672837 未加载
JoblessWonder将近 7 年前
This incident report glosses over the depth of what access was given to focus on the user data that was compromised... but it sure seems like they got pretty deep:<p>* A complete copy of an old database backup containing user data from launch in 2005 through May 2007 including:<p><pre><code> -usernames, -salted&#x2F;hashed passwords, -e-mails, -all content including private messages </code></pre> * Reddit source code<p>* Internal logs<p>* configuration files<p>* other employee workspace files [?]
评论 #17665740 未加载
评论 #17665669 未加载
Deimorz将近 7 年前
The scary part of this is probably for people that had accounts on reddit in 2007 but later deleted them, or just completely forgot they existed. Reddit&#x27;s not going to be able to contact the owners of those accounts.<p>Did you have an account 11 years ago? Did you vote on anything embarrassing, or send any compromising messages? How sure are you?<p>I don&#x27;t even know the answer to those questions for myself.
评论 #17665144 未加载
评论 #17666690 未加载
评论 #17667900 未加载
newman8r将近 7 年前
If the logs contained IP addresses, they could be used to correlate multiple accounts, leading to throwaway accounts being doxxed.<p>It doesn&#x27;t sound like IP address data was compromised, but I wouldn&#x27;t be surprised.
评论 #17667020 未加载
lsllc将近 7 年前
Alright, 2FA tokens came up the other day on HN and now we have this. Time to make the switch.<p>Yubikey 4 &#x2F; Feitian looks interesting, but it seems it only works in Chrome with Gmail etc. etc.<p>Anyone have any thoughts on solutions that include Safari on Mac and&#x2F;or iOS? The NEO claims NFC support but I doubt that works on iOS.
评论 #17664978 未加载
评论 #17666378 未加载
Canada将近 7 年前
For what reason was a decade old backup kept online for? That is insane. If they have hygine that poor I&#x27;m really worried about what other problems they have.
评论 #17665815 未加载
Dowwie将近 7 年前
If you are using SMS based 2FA, understand the risk:. &quot;Already having our primary access points for code and infrastructure behind strong authentication requiring two factor authentication (2FA), we learned that SMS-based authentication is not nearly as secure as we would hope, and the main attack was via SMS intercept. We point this out to encourage everyone here to move to token-based 2FA.&quot;
NVRM将近 7 年前
In comment from the admin: « In other news, we hired our very first Head of Security, and he started 2.5 months ago. » No comment.<p>«Old salted and hashed passwords» This sentence mean: All hashed were readable. It also mean, if they are still needed on their servers, that they are probably still in use. It would had been easy to salt this hashes.<p>First fix holes, then redesign...
jandrese将近 7 年前
SMS is not about securing an account. It&#x27;s only use is as a proof of work (money) to make it harder&#x2F;more expensive to make a bot account.<p>Using it as a security measure is a mistake.
tluyben2将近 7 年前
I keep telling my bank SMS 2fa is bad but they say it is not. Many banks replaced tokens with SMS unfortunately.
评论 #17670556 未加载
评论 #17665852 未加载
评论 #17665738 未加载
samstave将近 7 年前
I got the alert to change my PW. I had had the same PW for 12 years!<p>Edit: 12 years, not 13.<p>-------------------------------<p><i></i><i>Account credentials from 2007 compromised</i><i></i><p><i></i><i>from reddit</i><i></i><p><i></i><i>[A] sent 35 minutes ago</i><i></i><p><i></i><i>Hi,</i><i></i><p><i></i><i>TL;DR: As part of the security incident described here, we&#x27;ve determined that your account credentials may have been compromised. You&#x27;ll need to reset your password to continue using Reddit. Details below.</i><i></i><p><i></i><i>On June 19, Reddit was alerted about a security incident during which an attacker gained access to account credentials from 2007 (usernames + salted password hashes).</i><i></i><p><i></i><i>We&#x27;re messaging you because your Reddit account credentials were among the data that was accessed.</i><i></i><p><i></i><i>If there&#x27;s a chance the credentials relate to your current password, we&#x27;ll prompt you to reset the password on your Reddit account. Also, think about whether you still use the password you used on Reddit 11 years ago on any other sites today. If there&#x27;s a chance the credentials relate to the password you&#x27;re currently using on Reddit, we&#x27;ll make you reset your Reddit account password. You can find more information about the incident in the announcement post linked above. If you have other questions not answered there, feel free to contact us at contact@reddit.com.</i><i></i>
评论 #17665417 未加载
hyder_m29将近 7 年前
How would an attacker go about intercepting an SMS?
评论 #17664674 未加载
评论 #17665024 未加载
评论 #17664853 未加载
评论 #17665109 未加载
评论 #17664932 未加载
评论 #17664634 未加载
评论 #17664836 未加载
评论 #17665072 未加载
erikb将近 7 年前
You mean they tell us 1.5 months after the event that our emails and passwords might be compromised?
ojosilva将近 7 年前
Would someone kindly explain how a SMS can be intercepted during 2FA and how&#x2F;why tokens otoh are safer?<p>A friend and I were brainstorming the design of a fraud prevention app&#x2F;startup just this week and we naively thought SMS would be the way to go. Yikes!
评论 #17664695 未加载
评论 #17664690 未加载
评论 #17664715 未加载
评论 #17664840 未加载
评论 #17664707 未加载
评论 #17664976 未加载
danbtl将近 7 年前
How does SMS interception actually work in practice? Wouldn&#x27;t this require physical access to the phone&#x2F;SIM, or are there any known remote exploits?
评论 #17664669 未加载
评论 #17665434 未加载
barking将近 7 年前
So what&#x27;s to stop a hijacker persuading the website to take off 2FA or switch you from TOTP to SMS.<p>Seems just as possible as hijacking your phone.
vxxzy将近 7 年前
SMS Interception is what got them. Moving to offline 2FA needs to happen. SMS Interception is on the rise.
评论 #17666152 未加载
评论 #17666548 未加载
vram22将近 7 年前
Was the notification to Reddit users about the incident, sent from noreply@redditnewsletters.com ?
empath75将近 7 年前
&gt;In other news, we hired our very first Head of Security<p>wow...
评论 #17666566 未加载
pandasun将近 7 年前
Edit: nevermind
评论 #17665065 未加载
hindsightbias将近 7 年前
&gt;In other news, we hired our very first Head of Security, and he started 2.5 months ago.<p>Uh huh.
Alex3917将近 7 年前
SMS hijacking? Really?<p>How is it that Reddit’s security team is continually learning security lessons that have been common knowledge among non-technical people for 5+ years? They seem to treat their production systems more carelessly than the average person treats their Nintendo switch account.
评论 #17664785 未加载
评论 #17664752 未加载
评论 #17664977 未加载
评论 #17666070 未加载
评论 #17664751 未加载