Feeds

Three million Adobe accounts hacked? Sorry, make that 38 MILLION

Could be as much as 150 million, Photoshop giant warned

Choosing a cloud hosting partner with confidence

Remember that Adobe security breach earlier this month that leaked the account records of some 3 million customers? Scratch that: the actual number hacked was at least 38 million, it has emerged.

In early October, Adobe warned of "sophisticated attacks" on its network in which hackers gained access to data for what was then believed to be about 2.9 million customers: that data included names, encrypted credit or debit card numbers, expiration dates, and other information relating to customer orders.

In addition, the company said, the cyber-crooks had managed to abscond with source code for "numerous Adobe products."

But in a blog post on Tuesday, investigative journalist Brian Krebs said those early estimates were far too low, and that the actual list of accounts that had been compromised numbered in the tens of millions.

How does Krebs know? Because he's seen the list. Over the weekend, he says, AnonNews.org posted a 3.8GB file called "users.tar.gz" that contained more than 150 million user and password pairs that had apparently been lifted from Adobe.

Adobe spokeswoman Heather Edell has since confirmed the breach to Krebs, adding that the company has contacted the owners of the affected accounts and has reset the passwords for all of the Adobe IDs that it believes were involved in the hacking incident.

"So far, our investigation has confirmed that the attackers obtained access to Adobe IDs and (what were at the time valid) encrypted passwords for approximately 38 million active users," Edell said. "We are still in the process of investigating the number of inactive, invalid and test accounts involved in the incident."

Edell also said that the attackers were able to gain access to at least some of the source code for Adobe Photoshop. Krebs was able to confirm that, too – a second, 2.56GB file posted to AnonNews.org contained what appeared to be Photoshop code.

Source code for Adobe Acrobat, Reader, and the ColdFusion web application server software is also believed to have leaked during the incident, but at least some of this data appears to have been password protected and may not be readily accessible.

Adobe seems to be taking its customer data breach seriously. The company has offered one year's worth of free credit monitoring by Experian to any customer whose account was compromised in the attack. But as Krebs points out, this kind of service isn't guaranteed to spot all of the forms of identity theft that might arise from such incidents, so Adobe customers are advised to place fraud alerts on their accounts and monitor their credit reports closely. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.