Feeds

Open sourcey bulletin board offline after hack attack

phpBB coughs up names, addresses, passwords

Beginner's guide to SSL certificates

The website for one of the net's more popular bulletin board software packages has been taken offline following a security breach that gave an attacker full access to a database containing names, email, address, and hashed passwords for its entire user base.

In a message posted Sunday, administrators of phpBB.com said the attacker gained access through an unpatched security bug in PHPlist, a third-party email application. The miscreant had access for more than two weeks before the breach was discovered, and phpBB remained down at time of writing, more than three days later. Administrators didn't respond to emails seeking comment.

A blogger who claimed to have carried out the attack said that details for more than 400,000 accounts were intercepted. The writer claims to have created a script that was able to crack more than 28,000 passwords hashed using an unsalted MD5 algorithm, before posting them to the internet. The passwords were not accessible at time of writing.

A notice posted to a temporary support forum said that the latest version of phpBB uses "a complex hashing algorithm in order to prevent someone from determining the plaintext value of a password." An earlier version used less secure protection based on MD5. To be protected by the more robust algorithm, users had to have registered or logged into their accounts since the upgrade was made.

The number of users fretting over the breach in this phpBB discussion thread is a testament to the sad fact that many people still use the same password for numerous online accounts. Administrators at phpBB reminded users that isn't a safe practice. They also admitted to making mistakes of their own.

"We apologise for not securing our servers in time to prevent this from happening," they wrote. "This demonstrates how critically important it is to always make sure that you keep up to date with any software that is running on your machine."

phpBB is an open-source software package webmasters use to run discussion forums on their sites. It is based on the PHP language and stands for PHP bulletin board. The breach had nothing to do with phpBB, and there are no known vulnerabilities in the most recent version of the program.

Rather, the attacker gained entry through a recently patched vulnerability in PHPlist, an open-source package for managing newsletters. On January 29, the program was updated to fix a security bug that allowed unauthorized access.

Interestingly, according to the time line provided by both the purported attacker and phpBB, the attack was carried out some two weeks before the PHPlist patch was issued, courtesy of this published exploit.

Sadly, the attack could have been prevented by adding a single line to an administrator's index file. There are some useful lessons that can come out of an autopsy of this breach, especially for fanbois who claim open-source is so much more resistnt to these SNAFUs. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
SHELLSHOCKED: Fortune 1000 outfits Bash out batches of patches
CloudPassage points to 'pervasive' threat of Bash bug
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.