Related Links

Related Stories

  • Adobe Breached Users Now Estimated at 38 Million
    When news of the Adobe breach emerged at the beginning of October, the company admitted that bank card and other personal information on 2.9 million users had been stolen together with usernames and passwords for an undisclosed number of customers. That number is now put at 38 million.
  • Adobe Issues Two Fresh Patches
    Adobe, which has been statement-less since revealing last week that it has been the victim of a massive data heist, has quietly issued two security advisories addressing fresh vulnerabilities that are unrelated to the incident.
  • Adobe Hacked – Customers' Card Details and Adobe Source Code Stolen
    Adobe has been hacked. Source code for numerous Adobe products including Acrobat and ColdFusion has been stolen. Customer IDs and passwords have been accessed; and card details for 2.9 million customers stolen.
  • Adobe Patches Flash, Shockwave, and Adobe Reader & Acrobat
    In three separate bulletins, Adobe has released security updates for Flash (fixing four vulnerabilities), Shockwave (two vulnerabilities) and Adobe Reader and Acrobat (eight vulnerabilities).
  • Adobe Fixes Flash, ColdFusion and Shockwave
    The Flash update fixes three critical vulnerabilities while the ColdFusion and Shockwave updates fix one each. Internet Explorer 10 and Chrome users will have the Flash updates installed automatically by the browser.

Top 5 Stories


Adobe Breach is Far, Far Worse than Originally Thought

08 November 2013

After Brian Krebs gave Adobe a strong hint that it had been breached, the company announced that just short of three million accounts may have been compromised. It later upped this to 38 million – but it now appears that the true figure is around 150 million.

The scale of the breach is not the only issue. Adobe announced that the user details had been encrypted – which immediately caused concerns. Best practice, if not essential practice – would be to hash and salt passwords using a slow algorithm; but Adobe's CSO said 'encrypted.'

"I really hope they don't mean encrypted passwords," an unnamed source told Infosecurity at the time. But he added, "Brad Arkin [the CSO] isn’t new to the security world, and I couldn't see him mixing up encrypted and hashed…" It now appears that he didn't.

Security researchers have located a 4GB compressed file of the stolen data dumped on the internet, and "listing," said Naked Security, "not just 38,000,000 breached records, but 150,000,000 of them." Sophos took every tenth record from this dump until it had retrieved a representative sample of 1,000,000 records – and analyzed them. What it found in the data stolen from Adobe is that the passwords are encrypted rather than hashed, users' emails are included in plaintext, and – just as worrying – the user's password hint is also stored in plaintext.

This is potentially a colossal blunder. First, since encryption rather than hashing has been used, every single password is retrievable in its jumbled text. And if that encryption is a weak one (Sophos suspects that it is either DES, which is weak, or 3DES, which is somewhat less so), then every single password is vulnerable. In some cases the addition of the hint even makes it directly guessable.

From a quick analysis, Sophos concluded, "we have already recovered an awful lot of information about the breached passwords, including: identifying the top five passwords precisely, plus the 2.75% of users who chose them; and determining the exact password length of nearly one third of the database.

"Bear in mind that salted hashes – the recommended programmatic approach here – wouldn't have yielded up any such information – and you appreciate the magnitude of Adobe's blunder."

For its part, Adobe is still playing down the incident. According to  Reuters, Adobe spokeswoman Heather Edell said that it is not accurate to say that 150 million customer accounts had been compromised because, among other reasons, "'a large percentage' of the accounts were fictitious, having been set up for one-time use so that their creators could get free software or other perks."

But that large percentage is still vulnerable if people used the same password for this fictitious account as they have used elsewhere on the internet. An additional problem here is that such users may have completely forgotten they ever had an Adobe account, and now be oblivious to the possibility that they have other accounts vulnerable because of the Adobe hack.

LastPass, who also has access to the stolen data, has developed a test page for users to check whether their own email is one of the 150,000,000 stolen from Adobe. If it is – and especially if the user cannot remember what password was used – he or she should change this, potentially change all other passwords, and make sure that the same password is never again re-used across multiple accounts.

This article is featured in:
Data Loss  •  Encryption  •  Internet and Network Security  •  IT Forensics


Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×