View Full Version : More user passwords dumped, this time from alleged Billabong.com hack

07-13-12, 12:30 PM
Hackers dumped another huge cache of stolen passwords, this time exposing what they said are as many 35,000 plaintext passcodes from the website of clothing maker Billabong International.

A post on CodePaste.net claimed 20,000 to 35,000 user names and corresponding passwords were retrieved in the hack of billabong.com (http://www.billabong.com/). But the post included only 1,435 plaintext user credentials and didn't explain the discrepancy. Australia-based Billabong provides the accounts to customers to make frequent online purchasing more easy. The post also included what it claimed were user names and hashed passwords for MySQL accounts used to administer the site.

The post comes less than 24 hours after the discovery of a separate password dump that affected more than 453,000 accounts for Yahoo's Contributor Network (previously Associated Content) (http://arstechnica.com/security/2012/07/yahoo-service-hacked/). In both cases, Web administrators appear to have stored the passwords in plaintext, a practice that is severely frowned upon in the security profession because it makes life much easier for hackers who gain a foothold into a vulnerable system. With only a little extra work, admins could have used Bcrypt (http://bcrypt.sourceforge.net/) or another modern cryptographic algorithm to scramble the passwords into one-way hashes that can't easily be reversed. The hashes may still be cracked, but if the process is done correctly, the protection buys hacked websites enough time to warn users before their plaintext passwords are circulated.

Read 3 remaining paragraphs (http://arstechnica.com/security/2012/07/user-passwords-dumped-in-alleged-billabong-com-hack/) | Comments (http://arstechnica.com/security/2012/07/user-passwords-dumped-in-alleged-billabong-com-hack/?comments=1#comments-bar)

http://feeds.feedburner.com/~ff/arstechnica/index?i=ie0ubyGqgPA:73t_OC_3QQ8:V_sGLiPBpWU (http://feeds.arstechnica.com/~ff/arstechnica/index?a=ie0ubyGqgPA:73t_OC_3QQ8:V_sGLiPBpWU) http://feeds.feedburner.com/~ff/arstechnica/index?i=ie0ubyGqgPA:73t_OC_3QQ8:F7zBnMyn0Lo (http://feeds.arstechnica.com/~ff/arstechnica/index?a=ie0ubyGqgPA:73t_OC_3QQ8:F7zBnMyn0Lo) http://feeds.feedburner.com/~ff/arstechnica/index?d=qj6IDK7rITs (http://feeds.arstechnica.com/~ff/arstechnica/index?a=ie0ubyGqgPA:73t_OC_3QQ8:qj6IDK7rITs) http://feeds.feedburner.com/~ff/arstechnica/index?d=yIl2AUoC8zA (http://feeds.arstechnica.com/~ff/arstechnica/index?a=ie0ubyGqgPA:73t_OC_3QQ8:yIl2AUoC8zA)

More... (http://feeds.arstechnica.com/~r/arstechnica/index/~3/ie0ubyGqgPA/)