|
|
|
Administrator 1025 posts
Registered: Apr 2006
In swedish, but check the list: http://www.aftonbladet.se/nyheter/article13838087.ab
For foreigners, it says about: "A swedish hacker has hacked the following sites"
I haven't got confirmed by Zalon or any other site admin, but it seems like he got a hold of the databases on all those sites.
So users that have the same password here as on other sites: CONSIDER CHANGING YOUR PASSWORD ON THOSE SITES.
//dimman
EDIT: The hacker confirms that the qw.nu database has been compromised: Still in swedish (qw.nu is on the list of sites of which got their databases dumped): https://www.flashback.org/p32277168#p32277168
Member 3 posts
Registered: Feb 2006
Yeah, I saw the same, for once I was glad I did not change my password from the randomized one I got the last time I requested a password change.
Btw, this is what it says if you request a new password :-)
"An e-mail has been sent to the specified address with instructions on how to change your password. If it does not arrive you can contact the forum administrator at hack@hack.com."
Member 693 posts
Registered: Jan 2006
If I recall correctly from when I coded most of qw.nu many years ago, the passwords are stored in the database as an md5 hash, so it shouldn't be possible for the hackers to view or work out your actual password. However, if you have to physically login post-hack, it is possible that he/she has changed the login mechanism to record your non-hashed password elsewhere.
So don't login if you're not already logged in via cookie.
News Writer 1267 posts
Registered: Jun 2007
The site was hacked like what, a week ago? I guess many have logged in physically by now :/
Administrator 1025 posts
Registered: Apr 2006
If I recall correctly from when I coded most of qw.nu many years ago, the passwords are stored in the database as an md5 hash, so it shouldn't be possible for the hackers to view or work out your actual password. However, if you have to physically login post-hack, it is possible that he/she has changed the login mechanism to record your non-hashed password elsewhere.
So don't login if you're not already logged in via cookie. Its major failure if its MD5 hashes only. MD5 is severly broken. I haven't looked it up all that much lately, but a identical checksum can be created within seconds, thus even if not revealing your real password, its not much help if the false password generates the same checksum.
Member 693 posts
Registered: Jan 2006
The login is based on the punBB software, which yes only uses MD5 hashes (afaik). If I was coding it again now I'd know better...
edit: I was just trying to reassure that the hacker probably can't recover your actual password, which is hopefully good news for people that use the same password here as they do on their email accounts, facebook, paypal, amazon etc (and remember that your email address is also in the database).
Member 80 posts
Registered: Jan 2006
I don't think theyve made changes to the site, but can't be 100% sure. I know from the thread on flashback when I read through that all people did was look up sites with vulnerabilities in their database. After that it seems some person did an sql injection and dumped the database from a majority of those sites, all in all around 700 000 password were stolen I think. The best thing for people is to just change the password here to something that they don't use on other sites where they have their email registered.
Most of those sites hacked also used MD5, one of them being a majorsite called "Bloggtoppen". MD5 is as Dimman said really easy to get past either with bruteforce or from various sites where you can easily match the checksum with the ones in their database already. Just change the password on your other sites if you have a similar password. I've kept the same password here since I first registered my account, this site has been hacked like 3 times already? I just keep this password completely different from my other sites.
News Writer 646 posts
Registered: Mar 2006
I have issue with the term "hacker", but of course you already know this. People that run "hack_websites.exe" overnight on their dell PC are not hackers.
Also it is sad news that md5 is no longer secure (source?) - is it possible to upgrade to sha1 or something similar?
Administrator 2059 posts
Registered: Jan 2006
Checking the source of punbb it seems md5 was used at the beginning, but there is a function when logging in that checks if you have a md5 hash in the DB, and if so, saves it as SHA1 instead. www.facebook.com/QuakeWorld
Administrator 1025 posts
Registered: Apr 2006
I have issue with the term "hacker", but of course you already know this. People that run "hack_websites.exe" overnight on their dell PC are not hackers.
Also it is sad news that md5 is no longer secure (source?) - is it possible to upgrade to sha1 or something similar? Not that I care if you have an issue with it or not, but I didn't know thats what he did. According to what I've found from him, it seems like he knows what he's doing, and himself doesn't like script-kiddies (which i think is the term your looking for). But what do I know, feel free if you have any other info to share. It has been public info that MD5 is broken for several years. Google "md5 broken". Åke Vader: Allright, atleast that's better. I'm assuming you are checking the source used at qw.nu (which Zalon told me was really old)? Then the remaining problem is the vulnerability mainly from SQL injections
Member 1102 posts
Registered: Jan 2006
So I guess the recent admin account takeover was related to this?
Administrator 1025 posts
Registered: Apr 2006
So I guess the recent admin account takeover was related to this? Yes, most likely.
|
|
|
|