back to article .GIF garage Imgur plugs 1.7 million-subscriber creds breach

The world's self-described “most awesome” collection of images, Imgur, has confessed to leaking 1.7 million user records in 2014. The company was advised of the breach by HaveIBeenPwned administrator Troy Hunt on November 23, 2017. Imgur's chief operating officer Roy Sehgal posted confirmation of the breach. Hunt took to …

  1. Mark 85

    Three years and no one noticed they had been breached? Is this bad management, off-shored IT Security, or just plain incompetence?

    The mind boggles.... oh wait... only emails and passwords... I guess there's no way to this info will be misused and Imgur says they take security very seriously, of course.

    1. Notas Badoff
      Facepalm

      Tech horror movie title: "It crawled out of the Bin"

      My bet's on a to-be-destroyed disk being diverted to recycling for the planet's health. Or something like that...

    2. Lysenko

      Three years and no one noticed they had been breached? Is this bad management, off-shored IT Security, or just plain incompetence?

      If someone gets through security and just copies some files there isn't really anything to "notice" until/unless the miscreant in question starts to publically do something with the thieved data. Skiddies like to brag about system breaches or dump/sell the results, but I suspect professional thieves mostly keep quiet about it and use the data for targetted attacks on individuals in ways that can't readily be traced to the original leak (the people using passwords short enough to make brute forcing SHA256 feasible are likely the same ones reusing passwords for different accounts).

    3. Adam 1

      Unless it is published somewhere or someone tries to blackmail them, or a suspicious enumeration pattern is detected, then why is it such a surprise that the vendor wouldn't know? If whatever IDS they use (or don't as the car may be) didn't detect the leak, then you don't know what you don't know. In a good deal of cases, the breached data might be circling but no-one knows the origin site. By all means, rouse on them for losing data that should have been private, but that turnaround time is impressive.

    4. Adam 52 Silver badge

      We don't yet know how they were breached. It's a little early to draw any conclusions.

    5. Anonymous Coward
      Anonymous Coward

      "Three years and no one noticed they had been breached? "

      Netcraft says it's running Linux. Trying to secure that on the internet is like trying cork the holes in a colander...

      1. Doctor Syntax Silver badge

        Warning - shill alert.

        "Three years and no one noticed they had been breached? "

        They don't realise you can see them a mile off.

  2. joed

    no PII but

    "The compromised account information included only email addresses and passwords. Imgur has never asked for real names, addresses, phone numbers, or other personally-identifying information (“PII”), so the information that was compromised did NOT include such PII." - since some emails do contain 1st and last name, it's really up to users privacy awareness to keep these off the wide net (and we know how this works). Obviously linking emails between different services makes discovery fairly easy (only "paranoid" keep different emails for distinct "junk" accounts). But then, the person posting pictures to Imgur had likely nothing to hide and spent remaining free time on FB divulging the rest.

    1. Doctor Syntax Silver badge

      Re: no PII but

      only "paranoid" keep different emails for distinct "junk" accounts

      Why would you not do that? You don't need to be paranoid about security, just pissed off with spam. Even if you don't use your own domain let Google or Microsoft choke on the spamverts, just use a given address for a couple of months then set up a new one.

      An address to be used for a service you're going to keep using needs to survive for longer than that so make it unique to that service. If it leaks to spam you can discontinue that particular address and either set up a new one or drop the service.

    2. Anonymous Coward
      Anonymous Coward

      Re: no PII but

      You mean everyones email is not johnsmith1978(at)hotmail(dot)com?

  3. Bronek Kozicki

    SHA-256 brute force?

    It is a tricky proposition. Assuming salt was used it would be very difficult to brute force such stored passwords. Even though there are plenty of ASICs specialised in SHA-256 thanks to bitcoin mining, we are talking about computational load measured in ages of universe ("billions of guesses per minute" does not cut it)

    1. DJO Silver badge

      Re: SHA-256 brute force?

      Depends if they have a crib or not. If I was in the business of stealing data like this I'd be sure to sign up to the service first so I know the plain text for at least one hashed password in the cache, with that's it's relatively easy to brute force the salt and once you have the salt it's not too tricky, processor intensive and time consuming, but not technically challenging.

    2. Lysenko

      Re: SHA-256 brute force?

      Assuming salt was used it would be very difficult to brute force such stored passwords.

      Plenty of systems like this use the email address as salt (utility: close to zero, especially in a case like this) so the issue comes down to brute forcing the passwords using rainbow tables. On that basis, you can crack a typical password in seconds and that's without counting the inevitable instances of "qwerty12" and "Password1"[1].

      [1] And "p@$$w0rD!" isn't significantly stronger. l33+ speak passwords should be banned. They're a menace. You're much more secure with a long password comprised of only lower case alpha characters because you're less likely to need to write it down. Personally, I've just retired: "isthisadaggerwhichiseebeforeme".

      1. Anonymous Coward
        Anonymous Coward

        Re: SHA-256 brute force?

        Plenty of systems like this use the email address as salt (utility: close to zero, especially in a case like this)

        I've seen this quite a lot of times. It's usually when they can't be bothered (or unable) to add a "salt" field.

        The salt doesn't need to be secret, but it needs to be unique (to the site at the very least), otherwise people using the same email + password will have the same hash.

        I no longer store passwords on front-end servers.

      2. handleoclast

        Re: SHA-256 brute force?

        @Lysenko

        Plenty of systems like this use the email address as salt

        Really? I'm not doubting you here, just sitting here with my jaw dropped wondering at the sheer stupidity involved. I'm astounded that even one person would do it, but that there are plenty of them???

        Have these people never heard of /dev/urandom? Or the entropy-gathering daemon that preceded it?

        Hell, there's even EGDW for Windows.

        If you were stupid enough to use the e-mail address for salt, why not at least throw in the IP address too? Predictable in some cases, not in most cases.

        Sheesh. Use the e-mail address as salt. Gah!

        1. Lysenko

          Re: SHA-256 brute force?

          @handleoclast

          Really? I'm not doubting you here, just sitting here with my jaw dropped wondering at the sheer stupidity involved. I'm astounded that even one person would do it, but that there are plenty of them???

          I come across it several times doing DB support. The problem is usually DBA's who understand hashes but only from the perspective of them being fancy CRCs useful for deduplicating BLOBs and so forth.

        2. Doctor Syntax Silver badge

          Re: SHA-256 brute force?

          "Have these people never heard of /dev/urandom? Or the entropy-gathering daemon that preceded it?"

          Just a date-time stamp should be enough.

      3. tiggity Silver badge

        Re: SHA-256 brute force?

        @Lysenko

        A long memorable password of only lower case chars is potentially great.

        Shame that so many sites insist on short passwords (and must contain mix of case, number, etc, etc)

        Though the worst are the ones that use a short password and do not tell you that they have just truncated the long password you entered!

        1. Lysenko

          Re: SHA-256 brute force?

          Though the worst are the ones that use a short password and do not tell you that they have just truncated the long password you entered!

          That's insane though, as with the poster above, I don't doubt it happens. There is no possible excuse for limiting password size unless you're announcing to the world that you plan to store the plaintext (!!!???).

          1. Doctor Syntax Silver badge

            Re: SHA-256 brute force?

            "unless you're announcing to the world that you plan to store the plaintext"

            That doesn't follow, it could just be a string limit somewhere between the input form and the hash algorithm.

        2. Doctor Syntax Silver badge

          Re: SHA-256 brute force?

          "Though the worst are the ones that use a short password and do not tell you that they have just truncated the long password you entered!"

          Or barf on some characters but don't tell you which.

  4. Anonymous Coward
    Anonymous Coward

    "60 per cent of the email addresses he examined could already in the HaveIBeenPwned database"

    This fits with my own experiments. It would be interesting to track the trend.

  5. Anonymous Coward
    Anonymous Coward

    "most awesome" my a*se!!

    I was blissfully unaware of Imgur before I read this story :)

    Having now looked at the site, I realise where a lot of the cr*p comes from on FB and the like! :(

    I wish the hackers had managed to delete the entire site and all the backups! :))

    1. Doctor Syntax Silver badge

      Re: "most awesome" my a*se!!

      Well, the sub-head does say "self described" so any business with a half conscious marketing bod will have claim some such puffery. Even a fully conscious marketing bod will still lack the self-awareness to realise how naff it is.

  6. Dave559 Silver badge

    Data breaches are the new normal?

    Not very impressed by that comment. Any competent site should make every effort to make sure that its database is protected from unauthorised access.

    It’s not as if OWASP and similar initiatives haven’t been going on about best practices for, literally, years…

    Yes, even then, a site may still be at risk, but I’m sure there is still far too much rather low hanging fruit out there for the stealing.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like