Tuesday, June 18, 2024

Password attack – Hacker Steals Millions of credentials from famous Internet Radio 8tracks

Major password breach at 8tracks, millions of credentials stolen by hackers, as like the one happened in Dropbox, Linkedin, and Rambler.

Users who signed up through Facebook or Gmail authentication or safe and not affected by this leak and the users who signed up directly with 8tracks are affected by this leak.

They don’t store sensitive client information, credit card numbers, phone numbers, or street addresses, so stolen data doesn’t have any credit card information. 8tracks use to store credentials encrypted, which is good. As the credentials are encrypted it can be decrypted only through brute force.

Also Read 100 Million unencrypted passwords Leaked From Russian portal

Brute force attack on the encrypted passwords is time-consuming and it will take lot of time even to decrypt a single password.

8tracks says "Passwords on 8tracks are hashed and salted, meaning that even we
can’t tell you what your password is by looking at the database. Although the
decryption of one particular user’s password through brute-force techniques is
unlikely, we recommend that users change their password on 8tracks and any sites
on which they may have used the same password to ensure their personal security."

Attack Vector

8tracks believe the attack was through their employee’s Github account, which doesn’t have two-factor Authentication. And they believe Hackers have no chance to get into the database of the live server, but they can reach the Backup server which has database tables and User’s data.

Also Read OneLogin Password Manager database Hacked Users

Now after the attack, they enforce 2-step authentication on Github, to keep code and validation keys isolated, and to enhance our password encryption.

Mitigation

Check with haveibeenpwned and change your passwords for 8tracks account and other online portals immediately.

Website

Latest articles

Singapore Police Arrested Two Individuals Involved in Hacking Android Devices

The Singapore Police Force (SPF) has arrested two men, aged 26 and 47, for...

CISA Conducts First-Ever Tabletop Exercise Focused on AI Cyber Incident Response

On June 13, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) made history by...

Europol Taken Down 13 Websites Linked to Terrorist Operations

Europol and law enforcement agencies from ten countries have taken down 13 websites linked...

New ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux Systems

Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data.ARM's...

Operation Celestial Force Employing Android And Windows Malware To Attack Indian Users

A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...

Hackers Employing New Techniques To Attack Docker API

Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles