Feeds

Open sourcey bulletin board offline after hack attack

phpBB coughs up names, addresses, passwords

Protecting against web application threats using SSL

The website for one of the net's more popular bulletin board software packages has been taken offline following a security breach that gave an attacker full access to a database containing names, email, address, and hashed passwords for its entire user base.

In a message posted Sunday, administrators of phpBB.com said the attacker gained access through an unpatched security bug in PHPlist, a third-party email application. The miscreant had access for more than two weeks before the breach was discovered, and phpBB remained down at time of writing, more than three days later. Administrators didn't respond to emails seeking comment.

A blogger who claimed to have carried out the attack said that details for more than 400,000 accounts were intercepted. The writer claims to have created a script that was able to crack more than 28,000 passwords hashed using an unsalted MD5 algorithm, before posting them to the internet. The passwords were not accessible at time of writing.

A notice posted to a temporary support forum said that the latest version of phpBB uses "a complex hashing algorithm in order to prevent someone from determining the plaintext value of a password." An earlier version used less secure protection based on MD5. To be protected by the more robust algorithm, users had to have registered or logged into their accounts since the upgrade was made.

The number of users fretting over the breach in this phpBB discussion thread is a testament to the sad fact that many people still use the same password for numerous online accounts. Administrators at phpBB reminded users that isn't a safe practice. They also admitted to making mistakes of their own.

"We apologise for not securing our servers in time to prevent this from happening," they wrote. "This demonstrates how critically important it is to always make sure that you keep up to date with any software that is running on your machine."

phpBB is an open-source software package webmasters use to run discussion forums on their sites. It is based on the PHP language and stands for PHP bulletin board. The breach had nothing to do with phpBB, and there are no known vulnerabilities in the most recent version of the program.

Rather, the attacker gained entry through a recently patched vulnerability in PHPlist, an open-source package for managing newsletters. On January 29, the program was updated to fix a security bug that allowed unauthorized access.

Interestingly, according to the time line provided by both the purported attacker and phpBB, the attack was carried out some two weeks before the PHPlist patch was issued, courtesy of this published exploit.

Sadly, the attack could have been prevented by adding a single line to an administrator's index file. There are some useful lessons that can come out of an autopsy of this breach, especially for fanbois who claim open-source is so much more resistnt to these SNAFUs. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.