Feeds

Hotmail phish exposes most common passwords

Live ID hacking made as easy as 123...

The Power of One eBook: Top reasons to choose HP BladeSystem

Data from the Hotmail phishing attack proves that consumer password security remains pants.

The most common single password in the sample of 10,000 purloined Live ID login credentials posted as a text file to developer site PasteBin.com was "123456", something only marginally more secure than the traditional favourite "password".

Neil O'Neil, a digital forensics investigator at secure payments firm The Logic Group, found that "123456" cropped up on the list 64 times. There were 18 uses of the second most popular password, "123456789", in the list.

Although PasteBin's owners had taken down the list the information was still easily retrievable by security researchers, such as O'Neil, and (undoubtedly) hackers who cared to hunt it down.

O'Neil subsequently analysed the list, with the aim of turning the analysis into a presentation on password security for corporate clients.

The list of Live ID login credentials and associated data was posted as a text file to PasteBin. A large number of spelling mistakes in the secondary data (such as email addresses) available alongside the password data points to the source as a phishing attack.

The information bears all the hallmarks of a raw data dump from Hotmail account holders induced to fill out forms on hacker-controlled websites under the guise of a security check or similar.

O'Neil's analysis of the passwords reveals common themes in their makeup. For example, the security researcher noticed that a significant percentage were dates of birth, an inherently weak password. Other passwords spotted in the sample include "ibelongtogod" (Is Real Madrid's Kaka on Hotmail?) and, perhaps by way of cosmic balance, "666666".

Nearly half (42 per cent) of the passwords used only lowercase letters, 19 per cent were purely numeric and only six per cent mixed up alpha-numeric and other characters, according to a separate analysis of the data by web application security firm Acunetix. Many of the top 20 most frequent passwords in the featured given names common in Spanish speaking countries, such as Alejandra and Alberto. This provides circumstantial evidence that the data was harvested at least in part from a Spanish language phishing message.

iloveyou and (the Spanish equivalent) tequiero both appeared in the top 20 list compiled by Acunetix. O'Neil speculates the list might have been posted as part of an online spat between hackers.

Time to change up

Since an estimated two in five users make use of the same password across multiple accounts, the Hotmail password phishing attack gives hackers a head start in attacking more financially sensitive accounts. "People tend to have the same password across many accounts - so there is a good chance that individuals have also compromised the integrity of their eBay or PayPal accounts too," O'Neil commented.

The security researcher reckons it's time to re-evaluate traditional advice on how to choose passwords. "It used to be that the best security advice was to never write down your password," he said. "Today's advice however is to choose complex passwords, write them down and then put them in your wallet.

"You know when your wallet is lost or stolen and therefore that you need to change your passwords. Three initials from your name and postcode will do the trick and will take a hacker weeks to crack. Using an old postcode adds another layer of protection."

News of a second dump of at least 30,000 webmail login credentials also dumped onto PasteBin broke on Tuesday. This list contained apparent password and username details for accounts with a wider range of webmail providers, including Gmail and Yahoo!.

Security researchers are yet to analyse the list, which early indications suggest may involve a greater percentage of abandoned or fake accounts. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.