Page 4 of 9 FirstFirst 1234567 ... LastLast
Results 49 to 64 of 137

Thread: Security breach at scan! Consider at least changing passwords

  1. #49
    HEXUS.social member Agent's Avatar
    Join Date
    Jul 2003
    Location
    Internet
    Posts
    19,185
    Thanks
    739
    Thanked
    1,614 times in 1,050 posts

    Re: Security breach at scan! Consider at least changing passwords

    Quote Originally Posted by watercooled View Post
    Plaintext passwords, email addresses and possibly other sensitive information were stolen without the customers' knowledge and you're wondering what the fuss is about?
    It's not hard to see why hundreds of millions of pounds of credit card fraud is committed. The general public just don't care / understand the importance of data protection.
    Quote Originally Posted by Saracen View Post
    And by trying to force me to like small pants, they've alienated me.

  2. Received thanks from:

    Apex (17-11-2012)

  3. #50
    Registered+
    Join Date
    Nov 2012
    Posts
    19
    Thanks
    1
    Thanked
    1 time in 1 post

    Re: Security breach at scan! Consider at least changing passwords

    Not received e-mails like this, but I think I'll change my PW just in case..

  4. #51
    Senior Member chrestomanci's Avatar
    Join Date
    Sep 2004
    Location
    Reading
    Posts
    1,614
    Thanks
    94
    Thanked
    96 times in 80 posts
    • chrestomanci's system
      • Motherboard:
      • Asus AMD AM4 Ryzen PRIME B350M
      • CPU:
      • AMD Ryzen 1600 @ stock clocks
      • Memory:
      • 16Gb DDR4 2666MHz
      • Storage:
      • 250Gb Samsung 960 Evo M.2 + 3Tb Western Digital Red
      • Graphics card(s):
      • Basic AMD GPU (OSS linux drivers)
      • PSU:
      • Novatech 500W
      • Case:
      • Silverstone Sugo SG02
      • Operating System:
      • Linux - Latest Xubuntu
      • Monitor(s):
      • BenQ 24" LCD (Thanks: DDY)
      • Internet:
      • Zen FTTC

    Re: Security breach at scan! Consider at least changing passwords

    Quote Originally Posted by Disturbedguy View Post
    Has anyone else received these e-mails?
    I have checked my mail and haven't received anything
    Not in the past month. Older than that, and I can't be sure, because any spam older than that gets automatically purged from my junk folder.

    I have had a Scan account since at least 2002. I don't thin I have changed my password in that time.

  5. #52
    Senior[ish] Member Singh400's Avatar
    Join Date
    Jun 2008
    Posts
    2,935
    Thanks
    136
    Thanked
    310 times in 247 posts

    Re: Security breach at scan! Consider at least changing passwords

    How the **** did I miss this topic?

    Did Scan at least send out an email to all customers advising them of this breach? Jesus...

  6. #53
    HEXUS.social member Agent's Avatar
    Join Date
    Jul 2003
    Location
    Internet
    Posts
    19,185
    Thanks
    739
    Thanked
    1,614 times in 1,050 posts

    Re: Security breach at scan! Consider at least changing passwords

    Quote Originally Posted by Singh400 View Post
    Did Scan at least send out an email to all customers advising them of this breach? Jesus...
    Nope, there was no announcement by Scan.
    Quote Originally Posted by Saracen View Post
    And by trying to force me to like small pants, they've alienated me.

  7. #54
    blueball
    Guest

    Re: Security breach at scan! Consider at least changing passwords

    As I KEEP SAYING:

    Scan and good communication do not happen, they are crap at it!

  8. #55
    Senior Member
    Join Date
    Feb 2011
    Location
    Lancashire
    Posts
    770
    Thanks
    11
    Thanked
    22 times in 21 posts
    • PowerPie5000's system
      • Motherboard:
      • MSI MPG B550 Gaming Carbon WiFi
      • CPU:
      • AMD Ryzen 5 3600 + Noctua NH-U12A Cooler
      • Memory:
      • 32GB (4X8GB) Crucial Ballistix DDR4 3600 CL16
      • Storage:
      • 512GB Sabrent Rocket M.2 NVME SSD + 3TB Toshiba P300 SATA HDD
      • Graphics card(s):
      • 8GB AMD Radeon RX 5700 - PowerColor Red Dragon
      • PSU:
      • 750W Riotoro Enigma G2 Modular PSU (Seasonic Focus Plus Gold)
      • Case:
      • Phanteks Eclipse P400A
      • Operating System:
      • Windows 10 64-bit
      • Monitor(s):
      • 27" LG UltraGear 27GL850-B - 144Hz 1440P Nano IPS
      • Internet:
      • TalkTalk Fibre 76Mb

    Re: Security breach at scan! Consider at least changing passwords

    Good thing i've only been with Scan a couple of years... Do you think they'll let us know if it happens again?

  9. #56
    Registered+
    Join Date
    Jan 2010
    Posts
    61
    Thanks
    0
    Thanked
    1 time in 1 post
    • F1nn's system
      • Motherboard:
      • P6T SE
      • CPU:
      • i7-965 XE
      • Memory:
      • 6Gb Triple Channel Corsair
      • Storage:
      • Crucial C300 64Gig x 2 / 2TB assorted drives
      • Graphics card(s):
      • Zotac GTX 470
      • PSU:
      • Corsair HX620
      • Case:
      • Open air
      • Operating System:
      • 7 x64
      • Monitor(s):
      • LG 2353 1920 x 1080
      • Internet:
      • 20Mbps C&W LLU (Xilo/Uno)

    Re: Security breach at scan! Consider at least changing passwords

    I just changed my password now, after seeing this thread, although it was futile given the breach was in 2007 /facepalm

    Can we safely assume our passwords are no longer stored in plain text?

  10. #57
    Registered+
    Join Date
    Aug 2012
    Posts
    45
    Thanks
    0
    Thanked
    2 times in 2 posts
    • Megabiv's system
      • Motherboard:
      • Asus Sabertooth X58
      • CPU:
      • Core I7 - 950 4Ghz
      • Memory:
      • 24GB Triple Channel DDR3 GEIL 1600Mhz 6x4GB
      • Storage:
      • 1TB (2x500GB WD Blacks in Raid0 + 64GB OCZ Synapse Cache) 1x500Gb,1x160Gb and 1.5Tb External
      • Graphics card(s):
      • Nvidia GTX 570
      • PSU:
      • Tagan 580W Modular
      • Case:
      • Fractal Design Define XL
      • Operating System:
      • Windows 7
      • Monitor(s):
      • 2x19" 1x22"
      • Internet:
      • 78Mb BT Infinity 2

    Re: Security breach at scan! Consider at least changing passwords

    Well my password has now been changed but It does scare me somewhat to think how long ago this happend yet its only being brought to attention 5 years after our details have been flowing freely around the internet.

  11. #58
    Comfortably Numb directhex's Avatar
    Join Date
    Jul 2003
    Location
    /dev/urandom
    Posts
    17,074
    Thanks
    228
    Thanked
    1,027 times in 678 posts
    • directhex's system
      • Motherboard:
      • Asus ROG Strix B550-I Gaming
      • CPU:
      • Ryzen 5900x
      • Memory:
      • 64GB G.Skill Trident Z RGB
      • Storage:
      • 2TB Seagate Firecuda 520
      • Graphics card(s):
      • EVGA GeForce RTX 3080 XC3 Ultra
      • PSU:
      • EVGA SuperNOVA 850W G3
      • Case:
      • NZXT H210i
      • Operating System:
      • Ubuntu 20.04, Windows 10
      • Monitor(s):
      • LG 34GN850
      • Internet:
      • FIOS

    Re: Security breach at scan! Consider at least changing passwords

    Quote Originally Posted by Butuz View Post
    Do you leave your house unlocked too - as there shouldnt be any need to lock it??
    How often do your routinely change your locks?

  12. #59
    Senior Member AGTDenton's Avatar
    Join Date
    Jun 2009
    Location
    Bracknell
    Posts
    2,708
    Thanks
    992
    Thanked
    833 times in 546 posts
    • AGTDenton's system
      • Motherboard:
      • MSI MEG X570S ACE MAX
      • CPU:
      • AMD 5950x
      • Memory:
      • 32GB Corsair something or the other
      • Storage:
      • 1x 512GB nvme, 1x 2TB nvme, 2x 8TB HDD
      • Graphics card(s):
      • ASUS 3080 Ti TuF
      • PSU:
      • Corsair RM850x
      • Case:
      • Fractal Design Torrent White
      • Operating System:
      • 11 Pro x64
      • Internet:
      • Fibre

    Re: Security breach at scan! Consider at least changing passwords

    My account is from '02 so I'm changing both password and security answer. Probably a good idea anyway its been the same for 10 years, oops.

  13. #60
    Senior Member chrestomanci's Avatar
    Join Date
    Sep 2004
    Location
    Reading
    Posts
    1,614
    Thanks
    94
    Thanked
    96 times in 80 posts
    • chrestomanci's system
      • Motherboard:
      • Asus AMD AM4 Ryzen PRIME B350M
      • CPU:
      • AMD Ryzen 1600 @ stock clocks
      • Memory:
      • 16Gb DDR4 2666MHz
      • Storage:
      • 250Gb Samsung 960 Evo M.2 + 3Tb Western Digital Red
      • Graphics card(s):
      • Basic AMD GPU (OSS linux drivers)
      • PSU:
      • Novatech 500W
      • Case:
      • Silverstone Sugo SG02
      • Operating System:
      • Linux - Latest Xubuntu
      • Monitor(s):
      • BenQ 24" LCD (Thanks: DDY)
      • Internet:
      • Zen FTTC

    Re: Security breach at scan! Consider at least changing passwords

    Quote Originally Posted by F1nn View Post
    Can we safely assume our passwords are no longer stored in plain text?
    Probably, weather they are hashed with salt is another matter.

    Time and time again we hear about password databases getting leaked from companies large and small. Though it is fairly rare to hear about password databases entirely in plain text, it is quite common to hear that the password was encrypted with a reversible cipher, with the key hard coded into the source of the web application, or hashed without salt.

    If the password is reversibly encrypted then it may as well be in the clear, because if crackers get in and dump the database, they can just as easily get the source code an use it to decrypt the password DB.

    Hashes without salt are only marginally better, when you realise that there are services such as md5decrypter.co.uk that will quite quickly tell you that 286755fad04869ca523320acce0dc6a4 is the md5 hash of "password". (There are other sites for for SHA-1 and SHA-256, and it is fairly easy to obtain large databases of hashes for common passwords, or to build your own).

    Even if the user has a hard to guess password that is unlikely to be in any lookup tables, then the hash can still be used to brute force the password. And if the same hash appears in several places then the hackers know it is for the same password. The David Petraeus Scandal has been in the news recently. Apparently his mistress had her google email cracked because she also had a Yahoo account, and the password DB for that was leaked. The SHA1 hash of her password was not in any lookup table, but because she was a important someone took the time (probably about 30 hours on modern GPU accelerated hardware) to brute force the password, and it turned out to be the same as her google one.

    Better is to hash each password with a different salt. The salt can be anything, so long as it is unique to each user on the system. By using salt you make sure that identical passwords don't create identical hashes, so big lookup tables become useless. It is still possible to brute force the password of a high value target though.

    To prevent brute forcing passwords, a final technique should be used: Repeated hashing.

    Hashes like SHA1 are designed to be fast. The designers claim that it cost only 12 or so CPU cycles per byte hashed, so on a modern CPU you can calculate the hash of an 8 char password in nanoseconds. This is good if you want to test the checksum of an ISO you just downloaded but bad if you want to prevent someone from trying out every possible password for someone they are trying to crack.

    To prevent this, hashing algorithms like Bcrypt hash the output of the first hash run over, and over again. The idea is that if your web application hashes over and over, perhaps 10,000 times, then it will only take 1/100th of a second, and make no difference to the user experience of the web site or how much CPU load it puts on the server, but it make brute forcing even one password impractical for crackers.

    Are you reading Scan web team?

  14. Received thanks from:


  15. #61
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,478
    Thanks
    1,541
    Thanked
    1,029 times in 872 posts

    Re: Security breach at scan! Consider at least changing passwords

    Salts don't really make a difference against targeted exhaustive searches, but like you say they do defeat lookup/rainbow tables and mass bruteforce searches. Ideally, people should use very long passphrases (although some sites have ridiculously short length masks); as xkcd made a point about a while back, a short password like 4h&3d) is very complex to remember but easy to break, while a short sentence is far easier to remember, and far harder to break. Realistically, most people aren't going to do that, so some responsibility is left to websites to harden against attacks.

    Bcrypt is just one function; it's not necessarily run multiple times, but it is far slower than traditional hash functions like SHA. However, it's still quite acceptable and common, to run through hash functions a few thousand times; they're still designed to be incredibly strong and resistant to attack, but also to be very fast.

    There's really no excuse for storing passwords poorly, whether it's in the clear or using an inadequate function. The cost (computational and monetary) is negligible.

  16. #62
    Senior Member Hicks12's Avatar
    Join Date
    Jan 2008
    Location
    Plymouth-SouthWest
    Posts
    6,586
    Thanks
    1,070
    Thanked
    340 times in 293 posts
    • Hicks12's system
      • Motherboard:
      • Asus P8Z68-V
      • CPU:
      • Intel i5 2500k@4ghz, cooled by EK Supreme HF
      • Memory:
      • 8GB Kingston hyperX ddr3 PC3-12800 1600mhz
      • Storage:
      • 64GB M4/128GB M4 / WD 640GB AAKS / 1TB Samsung F3
      • Graphics card(s):
      • Palit GTX460 @ 900Mhz Core
      • PSU:
      • 675W ThermalTake ThoughPower XT
      • Case:
      • Lian Li PC-A70 with modded top for 360mm rad
      • Operating System:
      • Windows 7 Professional 64bit
      • Monitor(s):
      • Dell U2311H IPS
      • Internet:
      • 10mb/s cable from virgin media

    Re: Security breach at scan! Consider at least changing passwords

    Still not official word from scan?

    What an amazing customer service , hasnt even apologised and told everyone to change the passwords!.
    Quote Originally Posted by snootyjim View Post
    Trust me, go into any local club and shout "I've got dual Nehalem Xeons" and all of the girls will practically collapse on the spot at the thought of your e-penis

  17. #63
    Member
    Join Date
    Aug 2004
    Posts
    192
    Thanks
    7
    Thanked
    27 times in 13 posts

    Re: Security breach at scan! Consider at least changing passwords

    Quote Originally Posted by Hicks12 View Post
    Still not official word from scan?
    Nope - and a week has passed, so I'll fill in as much of the additional details as I can remember from the phone call I had. My apologies if I get any of this wrong, I was expecting that Scan would have made a statement of some form by now...

    Right now I won't release the name of the person who phoned me, but I'm pretty sure you can get in contact if you phone/email Scan's customer services about the the issue.

    * Apparently way back when, Scan used to keep all passwords as plain text. This is not new news and is probably no different to how most retailers did things back in the day.
    * In something like 2006/2007 they spotted the error in their ways and started encrypting passwords, but only for new customers (that didn't make sense to me either, but whatever). Scan do know exactly when they implemented this policy and which customer would fall under the former category. Apparently all passwords are now encrypted.
    * Later in 2007 (I forget the date, but Scan do know exactly when), there was a breach. I also forget the details of this, but it was something like snooping of a between-site or between-database transaction, or a remotely triggered transaction. Scan noticed the activity and terminated it in some fashion.
    * The data involved consists of the personal account data (address, telephone numbers, passwords), but not credit card details or order history as these are stored in different databases. I was not clear on whether Scan knew the extent of the stolen data at the time.
    * Because of the nature of the termination, the breach apparently does not affect all pre-2007 customers and Scan do know all of the affected customers.
    * Apparently they did inform the police of the breach, who were largely disinterested due to the nature of the stolen data (being of little value).

    I hope I haven't got anything wrong in this description, but figure people have a right to know some of this information. I would also appreciate if there's anything Hexus mods can do to make the Scan-using community aware of the issue. I acknowledge that this is a difficult ask, seeing how Scan are a major sponsor of this site.

  18. Received thanks from:

    Hicks12 (21-11-2012),mikerr (22-11-2012),pauleden (21-11-2012),rabbid (19-01-2013)

  19. #64
    blueball
    Guest

    Re: Security breach at scan! Consider at least changing passwords

    Secure?
    Considerate?
    Apologetic?
    No!

Page 4 of 9 FirstFirst 1234567 ... LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •