January 20, 2025
Unravelling the LifeLock “hacked passwords” story – Bare Safety

Earlier this month, the NortonLifeLock on-line id safety service, owned by Arizona-based know-how firm Gen Digital, despatched a safety warning to lots of its prospects.

The warning letter will be seen on-line, for instance on the web site of the Office of the Vermont Attorney General, the place it seems beneath the title NortonLifeLock – Gen Digital Information Breach Discover to Customers.

The letter begins with a dread-sounding salutation that claims:

We’re writing to inform you of an incident involving your private info.

It continues as follows:

[Our intrusion detection systems] alerted us that an unauthorized get together doubtless has information of the e-mail and password you have got been utilizing together with your Norton account […] and your Norton Password Supervisor. We suggest you modify your passwords with us and elsewhere instantly.

As opening paragraphs go, this one is fairly simple, and comprises uncomplicated if probably time-consuming recommendation: somebody apart from you most likely is aware of your Norton account password; they might have been in a position to peek into your password supervisor as nicely; please change all passwords as quickly as you may.

What occurred right here?

However what truly occurred right here, and was this a breach within the standard sense?

In spite of everything, LastPass, one other well-known identify within the password administration recreation, not too long ago introduced not solely that it had suffered a community intrusion, but in addition that buyer information, together with encrypted passwords, had been stolen.

In LastPass’s case, thankfully, the stolen passwords weren’t of direct and instant use to the attackers, as a result of every person’s password vault was protected by a grasp password, which wasn’t saved by LastPass and due to this fact wasn’t stolen on the similar time.

The crooks nonetheless must crack these grasp passwords first, a process which may take weeks, years, many years and even longer, for each person, relying on how properly these passwords had been chosen.

Dangerous decisions akin to 123456 and iloveyou had been most likely be rumbled throughout the first few hours of cracking, however much less predictable mixtures akin to DaDafD$&RaDogS or tVqFHAAPTjTUmOax will nearly definitely maintain out for much longer than it might take to alter the passwords in your vault.

But when LifeLock simply suffered a breach, and the corporate is warning that another person already knew some customers’ account passwords, and maybe additionally the grasp password for all their different passwords…

…isn’t that a lot worse?

Have these passwords already been cracked in some way?

A unique kind of breach

The excellent news is that this case appears to be fairly a special kind of “breach”, most likely attributable to the dangerous apply of utilizing the identical password for a number of completely different on-line companies as a way to make logging in to your commonly-used websites a bit faster and simpler.

Instantly after LifeLock’s early recommendation to go and alter your passwords, the corporate means that:

[B]eginning round 2022-12-01, an unauthorized third get together had used an inventory of usernames and passwords obtained from one other supply, such because the darkish internet, to aim to log into Norton buyer accounts. Our personal methods weren’t compromised. Nonetheless, we strongly consider that an unauthorized third get together is aware of and has utilized your username and password to your account.

The issue with utilizing the identical password on a number of completely different accounts is apparent – if any one in every of your accounts will get compromised, then all of your accounts are pretty much as good as compromised as nicely, as a result of that one stolen password acts like a skeleton key to the opposite companies concerned.

Credential stuffing defined

Actually, the method of testing whether or not one stolen password works throughout a number of accounts is so well-liked with cybercrooks (and is so simply automated) that it even has a particular identify: credential stuffing.

If a web-based legal guesses, buys on the darkish internet, steals, or phishes a password for any account that you just use, even one thing as low-level as your native information website or your sports activities membership, they’ll nearly instantly strive the identical password on different doubtless accounts in your identify.

Merely put, the attackers take your username, mix it with the password they already know, and stuff these credentials into the login pages of as many well-liked companies as they will consider.

Many companies today like to make use of your e-mail deal with as a username, which makes this course of much more predictable for the Dangerous Guys.

By the best way, utilizing a single, hard-to-guess password “stem” and including modifications for various accounts doesn’t assist a lot, both.

That’s the place you attempt to create faux “complexity” by beginning with a typical part that is difficult, akin to Xo3LCZ6DD4+aY, after which appending uncomplicated modifiers akin to -fb for Fb, -tw for Twitter and -tt for Tik Tok.

Passwords that change by even a single character will find yourself with a completely completely different scrambled password hash, in order that stolen databases of password hashes gained’t let you know something about how related completely different password decisions are…

…however credential stuffing assaults are used when the attackers already know the plaintext of your password, so it’s important to keep away from turning every password right into a useful trace for all of the others.

Widespread ways in which unencrypted passwords fall into legal fingers embrace:

  • Phishing assaults, the place you inadvertently sort the best password into the fallacious website, so it will get despatched on to the criminals as a substitute of to the service the place you truly supposed to log in.
  • Keylogger spy ware, malicious software program that intentionally information the uncooked keystrokes you sort into your browser or into different apps in your laptop computer or telephone.
  • Poor server-side logging hygiene, the place criminals who break into a web-based service uncover that the corporate has unintentionally been logging plaintext passwords to disk as a substitute of preserving them solely quickly in reminiscence.
  • RAM scraping malware, which runs on compromised servers to be careful for doubtless information patterns that seem quickly in reminiscence, akin to bank card particulars, ID numbers, and passwords.

Aren’t you blaming the victims?

Despite the fact that it appears as if LifeLock itself didn’t get breached, within the standard sense of cybercriminals breaking into the corporate’s personal networks and snooping on information from the within, because it had been…

…we’ve seen some criticism of how this incident was dealt with.

To be truthful, cybersecurity distributors can’t at all times stop their prospects from “doing the fallacious factor” (in Sophos merchandise, for instance, we do our greatest to warn you on-screen, brightly and boldly, in the event you select configuration settings which can be riskier than we suggest, however we are able to’t power you to just accept our recommendation).

Notably, a web-based service can’t simply cease you setting precisely the identical password on different websites – not least as a result of it might must collude with these different websites so as to take action, or to conduct credential stuffing assessments of its personal, thus violating the sanctity of your password.

However, some critics have prompt that LifeLock may have noticed these bulk password-stuffing assaults extra rapidly than it did, maybe by detecting the bizarre sample of tried logins, presumably together with many who failed as a result of a minimum of some compromised customers weren’t re-using passwords, or as a result of the database of stolen passwords was imprecise or out-of-date.

These critics notice that 12 days elapsed between the bogus login makes an attempt beginning and the corporate recognizing the anomaly (2022-12-01 to 2022-12-12), and an additional 10 days between first noticing the issue and determining that the problem was nearly definitely all the way down to breached information acquired from another supply than the corporate’s personal networks.

Others have puzzled why the corporate waited till the 2023 New 12 months (2022-12-12 to 2023-01-09) to ship out its “breach” notification to affected customers, if it was conscious of bulk password stuffing makes an attempt earlier than Christmas 2022.

We’re not going to attempt to guess whether or not the corporate may have reacted extra rapidly, nevertheless it’s price remembering – in case this ever occurs to you – that figuring out all of the salient information after you obtain claims about “a breach” could be a mammoth enterprise.

Annoyingly, and maybe paradoxically, discovering out that you’ve got been instantly breached by so-called lively adversaries is usually depressingly simple.

Anybody who has seen a whole bunch of computer systems concurrently displaying a right-in-your-face ransomware blackmail notice demanding 1000’s or hundreds of thousands of {dollars} in cryptocoins will regrettably attest to that.

However determining what cybercrooks undoubtedly didn’t do to your community, which is actually proving a destructive, is usually a time-consuming train, a minimum of if you wish to do it scientifically, and with a enough degree of accuracy to persuade your self, your prospects and the regulators.

What to do?

As for victim-blaming, it’s however important to notice that, so far as we all know, there’s nothing that LifeLock, or every other companies the place passwords had been re-used, can do now, by itself, to repair the underyling reason behind this downside.

In different phrases, if crooks get into your accounts on decently-secure companies P, Q and R just because they found you used the identical password on not-so-secure website S, these more-secure websites can’t cease you taking the identical kind of threat in future.

So, our instant suggestions are:

  • In case you are within the behavior of re-using passwords, don’t do it any extra! This incident is only one of many in historical past that draw consideration to the risks concerned. Do not forget that this warning about utilizing a special password for each account applies to everybody, not simply to LifeLock prospects.
  • Don’t use associated passwords on completely different websites. A fancy password stem mixed with an easily-memorised suffix distinctive to every website will, actually talking, provide you with a special password on each website. However this behaviour however leaves an apparent sample that crooks are doubtless to determine, even from a single compromised password pattern. This “trick” simply offers you a false sense of safety.
  • In the event you acquired a notification from LifeLock, observe the recommendation within the letter. It’s doable that some customers could obtain notifications attributable to uncommon logins that had been however official (e.g. whereas they on trip), however learn it via fastidiously anyway.
  • Think about turning on 2FA for any accounts you may. LifeLock itself recommends 2FA (two-factor authentication) for Norton accounts, and for any accounts the place two-factor logins are supported. We concur, as a result of stolen passwords on their very own are a lot much less use to attackers in the event you even have 2FA of their approach. Do that whether or not you’re a LifeLock buyer or not.

We could but find yourself in a digital world with none passwords in any respect – many on-line companies are attempting to maneuver in that path already, taking a look at switching completely to different methods of checking your on-line id, akin to utilizing particular {hardware} tokens or taking biometric measurements as a substitute.

However passwords have been with us for greater than half a century already, so we suspect they are going to be with us for a few years but, for some or many, if now not all, of our on-line accounts.

Whereas we’re nonetheless caught with passwords, let’s make a decided effort to make use of them in a approach that offers as little assist to cybercriminals as doable.