this post was submitted on 06 Oct 2023
354 points (98.6% liked)

News

23367 readers
2960 users here now

Welcome to the News community!

Rules:

1. Be civil


Attack the argument, not the person. No racism/sexism/bigotry. Good faith argumentation only. This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban. Do not respond to rule-breaking content; report it and move on.


2. All posts should contain a source (url) that is as reliable and unbiased as possible and must only contain one link.


Obvious right or left wing sources will be removed at the mods discretion. We have an actively updated blocklist, which you can see here: https://lemmy.world/post/2246130 if you feel like any website is missing, contact the mods. Supporting links can be added in comments or posted seperately but not to the post body.


3. No bots, spam or self-promotion.


Only approved bots, which follow the guidelines for bots set by the instance, are allowed.


4. Post titles should be the same as the article used as source.


Posts which titles don’t match the source won’t be removed, but the autoMod will notify you, and if your title misrepresents the original article, the post will be deleted. If the site changed their headline, the bot might still contact you, just ignore it, we won’t delete your post.


5. Only recent news is allowed.


Posts must be news from the most recent 30 days.


6. All posts must be news articles.


No opinion pieces, Listicles, editorials or celebrity gossip is allowed. All posts will be judged on a case-by-case basis.


7. No duplicate posts.


If a source you used was already posted by someone else, the autoMod will leave a message. Please remove your post if the autoMod is correct. If the post that matches your post is very old, we refer you to rule 5.


8. Misinformation is prohibited.


Misinformation / propaganda is strictly prohibited. Any comment or post containing or linking to misinformation will be removed. If you feel that your post has been removed in error, credible sources must be provided.


9. No link shorteners.


The auto mod will contact you if a link shortener is detected, please delete your post if they are right.


10. Don't copy entire article in your post body


For copyright reasons, you are not allowed to copy an entire article into your post body. This is an instance wide rule, that is strictly enforced in this community.

founded 1 year ago
MODERATORS
top 36 comments
sorted by: hot top controversial new old
[–] hamster@kbin.social 80 points 1 year ago (1 children)

https://owasp.org/www-community/attacks/Credential_stuffing

Credential stuffing is the automated injection of stolen username and password pairs (“credentials”) in to website login forms, in order to fraudulently gain access to user accounts.

Since many users will re-use the same password and username/email, when those credentials are exposed (by a database breach or phishing attack, for example) submitting those sets of stolen credentials into dozens or hundreds of other sites can allow an attacker to compromise those accounts too.

[–] doppelgangmember@lemmy.world 27 points 1 year ago* (last edited 1 year ago) (3 children)

So they brute forced the login?

No request limiting?

Wtf

Edit: yeah it's just a brute force with less steps. That's fuckn embarrassing "Credential Stuffing is a subset of the brute force attack category. Brute forcing will attempt to try multiple passwords against one or multiple accounts; guessing a password, in other words. Credential Stuffing typically refers to specifically using known (breached) username / password pairs against other websites."

[–] spookedbyroaches@lemm.ee 12 points 1 year ago (1 children)

Just because this method is a subset of the brute force attack doesn't mean that they don't have request limiting. They are reusing known breached passwords from other platforms, which makes it basically a guarantee that they will get the right password if they don't use a password manager. Their computer systems are secure, it's just their business model that's a privacy nightmare.

[–] doppelgangmember@lemmy.world 1 points 1 year ago

I mean true, there's nothing you can do with a successful attempt.

But i feel like this still could have been limited. Required 2FA obvi comes to mind... You can limit rate in a lot of ways.

[–] PixxlMan@lemmy.world 3 points 1 year ago (1 children)

According to the quote they would've used breached passwords. You don't know anything about request limiting. It wasn't just randomly entering passwords unrestricted, as per your own quote.

[–] doppelgangmember@lemmy.world 1 points 1 year ago

Okay 2FA then. Limit it somehow

[–] KillAllPoorPeople@lemmy.world 1 points 1 year ago* (last edited 1 year ago) (1 children)

Limits aren't a concern if you're controlling a bunch of zombies. The big guys usually have thousands if not hundreds of thousands of 'em.

[–] doppelgangmember@lemmy.world 1 points 1 year ago

Mandatory 2FA.

Easy.

[–] fartsparkles@sh.itjust.works 63 points 1 year ago (2 children)

Never re-use a password between services; every password for every system should be unique. Use a “password manager” to help.

Enable two-factor authentication (2FA) / multi-factor authentication (MFA) on any platform/service you can. It makes logging in a little longer but it makes these kinds of attacks much harder to pull off.

[–] SeaJ@lemm.ee 13 points 1 year ago* (last edited 1 year ago) (1 children)

Suggested password manager: Bitwarden

[–] Salamendacious@lemmy.world 17 points 1 year ago (1 children)

Whatever password manager you choose don't choose last pass lasspass breach

[–] Airazz@lemmy.world 5 points 1 year ago (3 children)

They'll all get hacked sooner or later. Ironically, a physical paper notebook might be the safest option right now.

if by all you mean the closed source ones where they probably don't even encrypt your passwords, sure

but open source ones (bitwarden) are really good and have a clear track record, you can even verify they encrypt everything by checking the source code.

If you wanna go ultra paranoid, however, you can also use something like keepassxc, where not only it gets encrypted, but it stays on your device.

[–] floofloof@lemmy.ca 3 points 1 year ago* (last edited 1 year ago)

Or an encrypted db like KeePass or KeePass XC and your own storage sync arrangement. It has the advantage of not storing your passwords alongside everyone else's.

But a decent password manager will be better protected than LastPass was, even if hackers steal the database. If you use a good one and a strong master password which you keep secret, the risk from that kind of attack is not great. They'll get useless encrypted data.

Of course there are still other attacks like your master password being stolen through a keylogger, so two-factor authentication is important too.

[–] Salamendacious@lemmy.world 2 points 1 year ago

Evening has an upside and a downside.

[–] deft@ttrpg.network -3 points 1 year ago (2 children)

If it is data someone can get it.

I do not know the solution. In a few years password managers will be seen as bad things, it's a collection of all your passwords ffs how is that really any safer?

[–] Cethin@lemmy.zip 7 points 1 year ago* (last edited 1 year ago)

If it's stored locally, has a strong password (it should be a very strong passphrase. I don't know how long mine is, but more than 40 characters), and is encrypted (which any good password manager should be), then it should be fine. I don't see any issue, at least not a reasonable alternative. Now using a password manager service that you're trusting with your data probably isn't a great idea.

I use KeepassXC. It's free and open source. The android app I use is KeepassDX, though there are others, and I use Synchthing to synchronize changes between devices.

[–] PixxlMan@lemmy.world 0 points 1 year ago

Not if it's encrypted ;-)

[–] Pistcow@lemm.ee 32 points 1 year ago (2 children)

This only happened because we expected it to happen.

[–] aceshigh@lemmy.world 4 points 1 year ago

So we caused it. Got it.

[–] spookedbyroaches@lemm.ee 2 points 1 year ago

What should have 23andme done?

[–] dannym@lemmy.escapebigtech.info 26 points 1 year ago (2 children)

I'm always astonished by the amount of information that people give away freely without securing it properly.

As for yet another billion dollar company's data being stolen... well... that's just a normal Friday. I'm not one for government intervention, especially considering how our governments act nowadays, but I seriously think that our privacy laws should be a lot more useful and a lot more severe.

I don't even know what this company was thinking, what goes through someone's brain to not stop for 20 seconds and think that storing this information unencrypted and just behind a simple login screen is a bad idea? Isn't it just blatantly obvious that they should've used e2e encryption? Require people to generate a key before they send their sample? Or if you want to make it moron proof, was it really impossible to write a unique seed phrase on each box and require users to type that to see their PRIVATE GENETIC INFORMATION?

I'm not anti capitalism, but the audacity of certain companies especially in the us is a sight to behold

they wouldn't be able to give info to the feds if it was encrypted

[–] mintakka@lemmy.world 3 points 1 year ago (1 children)

We desperately need data privacy laws like the EU. I think a lot of people are totally ignorant w/ respect to what bad actors (whether they’re hackers or private companies) can actually do with their data.

GDPR is honestly not that good, it's a step in the right direction but it's not even close to being a decent solution.

We should consider implementing penalties harsh enough to actually incentivize behavioral change. Ideally, we’d see a system where a failure to reform would result in fines doubling each subsequent month, ensuring that even a giant like Google feels the sting, otherwise nothing is gonna change.

[–] ultranaut@lemmy.world 19 points 1 year ago (3 children)

I contacted them to find out if my account was hacked and their automated system claimed they have not experienced a breach and then tried to connect me with an actual person.

[–] LordOfTheChia@lemmy.world 23 points 1 year ago

Verify they're a person by having them read you the last 4 base pairs of their DNA.

[–] money_loo@1337lemmy.com 17 points 1 year ago

Well they weren’t technically hacked, so that’s probably why they responded the way they did.

They literally used people’s passwords to login.

If you re-use your passwords across multiple sites then that is what would put you at risk for this.

Just change your 23andMe to a unique password and you should be good.

[–] ultranaut@lemmy.world 8 points 1 year ago (1 children)

It's been a few hours of "waiting for an agent" without progress so I'm giving up for the day. I think 23andme must be very busy with unhappy customers, or is massively understaffed.

[–] bappity@lemmy.world 15 points 1 year ago

and nobody was suprised

[–] willywonkawashere@lemmy.world 6 points 1 year ago

It has already been handed over to the governments of the world

[–] ShooBoo@lemmy.world 6 points 1 year ago (1 children)

Perfect example as to why you don't use the same password for every account you create on the internet. And use the same email address for everything you do. And like to use the same username on every site you sign up for.

[–] Lightsong@lemmy.world 5 points 1 year ago (1 children)

Yeah is it so hard to have like 50+ different email addresses as well as passwords for them?

[–] olympicyes@lemmy.world 2 points 1 year ago

I know that’s a joke but even Apple offers that in iCloud. I for sure use different passwords but forget that obscured email is even an option.