Categories: Password Attacks

Password attack – Hacker Steals Millions of credentials from famous Internet Radio 8tracks

Major password breach at 8tracks, millions of credentials stolen by hackers, as like the one happened in Dropbox, Linkedin, and Rambler.

Users who signed up through Facebook or Gmail authentication or safe and not affected by this leak and the users who signed up directly with 8tracks are affected by this leak.

They don’t store sensitive client information, credit card numbers, phone numbers, or street addresses, so stolen data doesn’t have any credit card information. 8tracks use to store credentials encrypted, which is good. As the credentials are encrypted it can be decrypted only through brute force.

Also Read 100 Million unencrypted passwords Leaked From Russian portal

Brute force attack on the encrypted passwords is time-consuming and it will take lot of time even to decrypt a single password.

8tracks says "Passwords on 8tracks are hashed and salted, meaning that even we
can’t tell you what your password is by looking at the database. Although the
decryption of one particular user’s password through brute-force techniques is
unlikely, we recommend that users change their password on 8tracks and any sites
on which they may have used the same password to ensure their personal security."

Attack Vector

8tracks believe the attack was through their employee’s Github account, which doesn’t have two-factor Authentication. And they believe Hackers have no chance to get into the database of the live server, but they can reach the Backup server which has database tables and User’s data.

Also Read OneLogin Password Manager database Hacked Users

Now after the attack, they enforce 2-step authentication on Github, to keep code and validation keys isolated, and to enhance our password encryption.

Mitigation

Check with haveibeenpwned and change your passwords for 8tracks account and other online portals immediately.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks

The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has been…

8 hours ago

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers, suspected…

8 hours ago

The State of AI Malware and Defenses Against It

AI has recently been added to the list of things that keep cybersecurity leaders awake.…

9 hours ago

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed

A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave over…

9 hours ago

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks

The threat actor known as GOFFEE has launched a series of targeted attacks against critical…

9 hours ago

A Seven‑Year‑Old Cisco Flaw Now Lets Hackers Execute Code Remotely on Network Gear

A Cisco’s Smart Install protocol (CVE-2018-0171), first patched in 2018, remains a pervasive threat to…

9 hours ago