Categories: Password Attacks

Password attack – Hacker Steals Millions of credentials from famous Internet Radio 8tracks

Major password breach at 8tracks, millions of credentials stolen by hackers, as like the one happened in Dropbox, Linkedin, and Rambler.

Users who signed up through Facebook or Gmail authentication or safe and not affected by this leak and the users who signed up directly with 8tracks are affected by this leak.

They don’t store sensitive client information, credit card numbers, phone numbers, or street addresses, so stolen data doesn’t have any credit card information. 8tracks use to store credentials encrypted, which is good. As the credentials are encrypted it can be decrypted only through brute force.

Also Read 100 Million unencrypted passwords Leaked From Russian portal

Brute force attack on the encrypted passwords is time-consuming and it will take lot of time even to decrypt a single password.

8tracks says "Passwords on 8tracks are hashed and salted, meaning that even we
can’t tell you what your password is by looking at the database. Although the
decryption of one particular user’s password through brute-force techniques is
unlikely, we recommend that users change their password on 8tracks and any sites
on which they may have used the same password to ensure their personal security."

Attack Vector

8tracks believe the attack was through their employee’s Github account, which doesn’t have two-factor Authentication. And they believe Hackers have no chance to get into the database of the live server, but they can reach the Backup server which has database tables and User’s data.

Also Read OneLogin Password Manager database Hacked Users

Now after the attack, they enforce 2-step authentication on Github, to keep code and validation keys isolated, and to enhance our password encryption.

Mitigation

Check with haveibeenpwned and change your passwords for 8tracks account and other online portals immediately.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese…

5 hours ago

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in…

6 hours ago

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against…

6 hours ago

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to…

6 hours ago

New Windows Zero-Day Vulnerability Let Attackers Steal Credentials From Victim’s Machine

A security researcher discovered a vulnerability in Windows theme files in the previous year, which…

6 hours ago

SYS01 InfoStealer Malware Attacking Meta Business Page To Steal Logins

The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to…

6 hours ago