flyertalk site redirected?
#31
Join Date: Dec 2006
Location: Duluth, GA
Programs: AAdvantage PLT, AA 2MM, Marriott Gold
Posts: 2,268
We believe that the attackers found a vulnerably in a piece of software on the site. We became aware of the exploit last week and patched the software accordingly. Our security scan of the site did not uncover any additional problems, however someone had left a back door onto the server. We have located and removed the malicious scripts.
We are very sorry for the inconvenience today.
We are very sorry for the inconvenience today.
#32
FlyerTalk Evangelist




Join Date: Mar 2004
Location: SGF
Programs: AS, AA, UA, AGR S+, Choice Platinum
Posts: 23,317
People vowing not to subscribe may be protesting against the wrong party...
#33
Join Date: Oct 2009
Posts: 302
It's a business and they need to respond to customers.
#35
Join Date: Feb 2009
Posts: 959
MD5 is a one way hash. This means that you can't take a hash and figure out what the original string was. While there are md5 lookup databases that try to catalog all possible hashes, the fact that we salt the password first makes them completely unusable.
This is why if you forget your password here that you can only get instructions to reset it. We can't ever send you your password because we don't know what it is. If a website will email you your password when you forget it, that means that they store your password directly. That's a bad thing.
We didn't warn anyone that they should change their passwords because there is absolutely no way that someone stole your passwords.
Thanks!
#36


Join Date: Jan 2004
Location: Louisville, KY, USA
Posts: 2,596
Let me join with others in saying thanks to our hard working IT gurus.
Bigger sites have been hacked including sensitive government sites. The test of IT is how fast they can get things back together. Where we addicts look for instant gratification, you did well guys.
Bigger sites have been hacked including sensitive government sites. The test of IT is how fast they can get things back together. Where we addicts look for instant gratification, you did well guys.
#38


Join Date: Jul 2002
Location: Victoria, BC
Programs: UA 1k, AA Exec Plt 2MM, HH Diamond, *wood Gold, disgruntled Amex Ex-Centurion
Posts: 594
The compromise was with the application and they had no access at any time to the database. However, for a second let's say that they did. Your password is saved as an md5 hash with a salt added to it. We don't actually ever save your password. When you type in your password, your specific salt is added to it and it's hashed. The resulting hash is compared to the hash stored in the database. If they match, then it lets you in.
MD5 is a one way hash. This means that you can't take a hash and figure out what the original string was. While there are md5 lookup databases that try to catalog all possible hashes, the fact that we salt the password first makes them completely unusable.
MD5 is a one way hash. This means that you can't take a hash and figure out what the original string was. While there are md5 lookup databases that try to catalog all possible hashes, the fact that we salt the password first makes them completely unusable.
1.) MD5 is outdated and deprecated, as successful attacks on MD5 have been demonstrated more than 4 years ago. Look this up in any recent book on computer security - or just go to wikipedia. I quote: "On 18 March 2006, [Vlastimil] Klima published an algorithm that can find a collision within one minute on a single notebook computer, using a method he calls tunneling."
How anybody can still use MD5 in critical applications is beyond me. You should switch to SHA. For SHA-1, only theoretical attacks exist, for SHA-2 no known attacks exist.
2.) Salting offers only minimal protection against weak passwords. Everybody with a short password (less than eight characters) should be aware that a brute force attack will uncover it in a few hours (total time for yours and any other similar weak password in the system). Since it is a brute force attack, even a password like "gHj87Q" offers no protection. Also, dictionary attacks can be quite successful - how many of you have a common English word or name as a password? Those take minutes.
3.) A system that has been compromised as far as having backdoors installed, should never be considered safe until reinstalled or restored from a known good backup. Evidence that "they never accessed the database" may be false, since the backdoor application could as well have scrubbed the log files to hide its tracks - very common, btw.
And yes, I do system security for a living.
#39
In Memoriam, FlyerTalk Evangelist

Join Date: Nov 2002
Location: Southern California
Programs: DL: 3.8 MM, Marriott: Lifetime Titanium
Posts: 24,575
Everybody with a short password (less than eight characters) should be aware that a brute force attack will uncover it in a few hours (total time for yours and any other similar weak password in the system). Since it is a brute force attack, even a password like "gHj87Q" offers no protection. Also, dictionary attacks can be quite successful - how many of you have a common English word or name as a password? Those take minutes.
I thought my passwords were fairly complex but you convinced me to rethink that.
I just added very complex passwords for the log-ins at my financial institutions, hotel and airline mileage/point programs and other websites where someone who cracked the password could drain my account.
I'm sure my passwords could still be hacked but they're going to have to work one hell of a lot longer to do so.
#40
FlyerTalk Evangelist
Join Date: Mar 2008
Location: ACT/GRK/DAL/ABI/MIA/FLL
Programs: OMNIArchist, OMNIArchy!, OMNIIDGAS
Posts: 23,478
MD5 with SALT is useless, it is NOT a one way hash and can easily be defeated, as it has on other vB powered sites of major size, if you want details, ASK. I am a member of another site that had similar things happen(not an Internet Brands owned site), they tried to cover it up as well. In the end they ate some humble pie, told the real facts, and secured their systems and firewalls again from the start with more security in mind. In addition they use a proxyshield at times when DDOS attacks and brute force attempts happen that aid in loading the site for the legit users.
The hackers responded by posting DB dumps of email addresses, passwords, and other sensitive info on rapidshare and other sites, not once but THREE times over two weeks. (updated to latest passwords and info each time)
They too had MD5 with salt, but it is outdated and not a secure means anymore. You are giving a false sense of security in this reply.
The hackers responded by posting DB dumps of email addresses, passwords, and other sensitive info on rapidshare and other sites, not once but THREE times over two weeks. (updated to latest passwords and info each time)
They too had MD5 with salt, but it is outdated and not a secure means anymore. You are giving a false sense of security in this reply.
#41
FlyerTalk Evangelist




Join Date: Oct 2006
Location: Marriott or Hilton hot tub with a big drink <glub> Beverage: To-Go Bag DYKWIA:SSSS /rolleyes ☈ Date Night:Costco
Programs: Sea Shell Lounge Platinum, TSA Pre✓ Refusnik Diamond, PWP Gold, FT subset of the subset
Posts: 12,523
Everybody with a short password (less than eight characters) should be aware that a brute force attack will uncover it in a few hours (total time for yours and any other similar weak password in the system). Since it is a brute force attack, even a password like "gHj87Q" offers no protection. Also, dictionary attacks can be quite successful - how many of you have a common English word or name as a password? Those take minutes.
#42
FlyerTalk Evangelist
Join Date: Mar 2008
Location: ACT/GRK/DAL/ABI/MIA/FLL
Programs: OMNIArchist, OMNIArchy!, OMNIIDGAS
Posts: 23,478
Ive never used words or phrases, just a series of random letters and numbers for website passwords. This may sound like a pain to manage, but there are a number of utilities that can organize passwords securely. Ive been using PasswordsPlus for several years now, but there are some free ones out there as well, such as a plugin for Firefox I believe.
#43


Join Date: Jul 2002
Location: Victoria, BC
Programs: UA 1k, AA Exec Plt 2MM, HH Diamond, *wood Gold, disgruntled Amex Ex-Centurion
Posts: 594
I’ve never used words or phrases, just a series of random letters and numbers for website passwords. This may sound like a pain to manage, but there are a number of utilities that can organize passwords securely. I’ve been using PasswordsPlus for several years now, but there are some free ones out there as well, such as a plugin for Firefox I believe.
#44


Join Date: Jul 2002
Location: Victoria, BC
Programs: UA 1k, AA Exec Plt 2MM, HH Diamond, *wood Gold, disgruntled Amex Ex-Centurion
Posts: 594
But, as I pointed out earlier, that is not necessary for a successful attack. Once the password-file (which has salted hash values, not cleartext) is obtained, using brute force will turn up every password of 6 characters or less in a few hours. Dictionary attacks will reveal most passwords that are common names or everyday words.
MD5 specific attacks will compromise many secure passwords by finding a different message that, when salted, will generate the same hash as the unknown password - thus potentially compromising all/most passwords.
as it has on other vB powered sites of major size, if you want details, ASK. I am a member of another site that had similar things happen(not an Internet Brands owned site), they tried to cover it up as well. In the end they ate some humble pie, told the real facts, and secured their systems and firewalls again from the start with more security in mind. In addition they use a proxyshield at times when DDOS attacks and brute force attempts happen that aid in loading the site for the legit users.
The hackers responded by posting DB dumps of email addresses, passwords, and other sensitive info on rapidshare and other sites, not once but THREE times over two weeks. (updated to latest passwords and info each time)
The hackers responded by posting DB dumps of email addresses, passwords, and other sensitive info on rapidshare and other sites, not once but THREE times over two weeks. (updated to latest passwords and info each time)
Also, vulnerabilities might exist in the vB software that promote security breaches - but that is just idle speculation, as I don't know the software.
They too had MD5 with salt, but it is outdated and not a secure means anymore. You are giving a false sense of security in this reply.


