Feeds

RockYou hack reveals easy-to-crack passwords

ABC, easy as 123

Mobile application security vulnerability report

Analysis of the 32 million passwords recently exposed in the breach of social media application developer RockYou last month provides further proof that consumers routinely use easy to guess login credentials.

Sensitive login credentials - stored in plain text - were left exposed because of a SQL injection bug in RockYou's website. RockYou admitted the breach, which applied to user password and email addresses for widgits it developed, and pledged to improve security in order to safeguard against future problems.

Database security firm Imperva analysed the frequency of password disclosed by the breach, prior to publishing a report on Thursday on Consumer Password Worst Practices, a problem illustrated by the top ten passwords thrown up by the RockYou security snafu (below).

  1. 123456
  2. 12345
  3. 123456789
  4. Password
  5. iloveyou
  6. princess
  7. rockyou
  8. 1234567
  9. 12345678
  10. abc123

The trivial nature of the top ten RockYou passwords is bad enough, but worse is that nearly 50 per cent of passwords records exposed by the RockYou breach used names, slang words, dictionary words or trivial passwords (consecutive digits, adjacent keyboard keys), Imperva discovered.

Password database breaches have happened before, of course, but the size of the RockYou breach allowed for the most in-depth analysis of real-world passwords to date. These days the average surfer maintains scores of login credentials for social networking and e-commerce sites.

If these login names and password are easy to guess then it's all the more likely that hackers will be able to break into accounts using brute force dictionary attacks and readily available password cracking tools. If users (as they often do) use the same login credentials for social networking sites and more sensitive accounts (email, online banking etc) then the problem gets even worse.

Consumers, or by extension business users, help themselves by using hard to guess (strong) passwords. Persuading users to use stronger passwords is an age-old problem that dates back to the dawn of the PC era.

Imperva’s CTO Amichai Shulman said that a 1990 Unix password study revealed a password selection pattern similar to that exposed by the RocKYou breach. "The problem has changed very little over the past 20 years," he added.

Tips from Microsoft (here), US CERT (here) and Sophos (here) outline strategies for choosing stronger passwords. ®

Boost IT visibility and business value

More from The Register

next story
Report: American tech firms charge Britons a thumping nationality tax
Without representation, too. Time for a Boston (Lincs) Macbook Party?
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Apple gets patent for WRIST-PUTER: iTime for a smartwatch
It does everything a smartwatch should do ... but Apple owns it
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.