VeteranXV
|
Seriously though, someone broke into Blizzard's ****, best go change your passwords guys, no seriously, this ACTUALLY happened:
http://us.blizzard.com/en-us/securityupdate.html
Quote:
Players and Friends,
Even when you are in the business of fun, not every week ends up being fun. This week, our security team found an unauthorized and illegal access into our internal network here at Blizzard. We quickly took steps to close off this access and began working with law enforcement and security experts to investigate what happened.
At this time, we***8217;ve found no evidence that financial information such as credit cards, billing addresses, or real names were compromised. Our investigation is ongoing, but so far nothing suggests that these pieces of information have been accessed.
Some data was illegally accessed, including a list of email addresses for global Battle.net users, outside of China. For players on North American servers (which generally includes players from North America, Latin America, Australia, New Zealand, and Southeast Asia) the answer to the personal security question, and information relating to Mobile and Dial-In Authenticators were also accessed. Based on what we currently know, this information alone is NOT enough for anyone to gain access to Battle.net accounts.
We also know that cryptographically scrambled versions of Battle.net passwords (not actual passwords) for players on North American servers were taken. We use Secure Remote Password protocol (SRP) to protect these passwords, which is designed to make it extremely difficult to extract the actual password, and also means that each password would have to be deciphered individually. As a precaution, however, we recommend that players on North American servers change their password. Please click this link to change your password. Moreover, if you have used the same or similar passwords for other purposes, you may want to consider changing those passwords as well.
In the coming days, we'll be prompting players on North American servers to change their secret questions and answers through an automated process. Additionally, we'll prompt mobile authenticator users to update their authenticator software. As a reminder, phishing emails will ask you for password or login information. Blizzard Entertainment emails will never ask for your password. We deeply regret the inconvenience to all of you and understand you may have questions. Please find additional information here.
We take the security of your personal information very seriously, and we are truly sorry that this has happened.
Sincerely,
Mike Morhaime
|
|
|
|
Musashi's Suck-pig Rayn's Apprentice Contributor
|
bloops
|
|
|
VeteranXV
|
Sorry, he was busy figuring out the hash and forgot to post this.
|
|
|
VeteranXV
|
im confused, it sounds like a database was access
if that's the case why do we care what protocol was used to exchange passwords between the client and the server, what hash function was used to store the passwords on the server side?
|
|
|
VeteranXV
|
Because 'lol appease the masses with jargon'
|
|
|
VeteranXX Contributor
|
Quote:
Originally Posted by Cael
im confused, it sounds like a database was access
if that's the case why do we care what protocol was used to exchange passwords between the client and the server, what hash function was used to store the passwords on the server side?
|
Educate yourself: Secure Remote Password protocol - Wikipedia, the free encyclopedia
|
|
|
VeteranXV
|
thank u i did know they store protocols in a database but now that u pointed it out it make total sense
|
|
|
VeteranXX Contributor
|
Protocol simply means procedure. Maybe you should brush up on your vocabulary.
However, I will elaborate since you didn't bother reading the wiki: if the intruders were able to download password data, it would be useless to them.
|
|
|
VeteranXV
|
ok that does not make any sense i dont know how u got that from the wiki
there is world of difference between trash like unsalted/universally salted md5, or sha256, and proper KDF's like PBKDF2 or bcrypt or scrypt or something encrypted with a hardware token/HSM
|
|
|
VeteranXV
|
bet u guys used those script irc clients
|
|
|
Contributor
|
you should have used Search 
|
|
|
VeteranXV
|
it real sad how many dumb company do not use hsm 2 encrypt they password esp since u can get 1 4 $1k$500 gg
YubiHSM - Yubico
|
|
Last edited by cael; 08-10-2012 at 20:35..
|
VeteranXV
|
My password is encrypted. I'm fine.
I use a capital E to throw people off even more!
|
|
|
VeteranXX
|
the fact that thousands of people lost their accounts the first week d3 came out wasnt enough of a sign? blizzard is a joke.
|
|
|
VeteranXX
|
They mustve upgraded their password policy , im pretty sure it used alpha numerics upper\lower with no symbols or spaces , pathetic.
|
|
|
VeteranXX
|
all my passwords begin with Q and end with Y
|
|
|
VeteranXV Contributor
|
Quote:
Originally Posted by drake
They mustve upgraded their password policy , im pretty sure it used alpha numerics upper\lower with no symbols or spaces , pathetic.
|
B-net passwords were never case specific. You could log in with Password, password, PaSsWoRd, etc., and they would all work.
|
|
|
VeteranXV
|
symbols and spaces r probably overrated
there was some math comic about it
|
|
|
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
|
|
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is Off
|
|
|
AGENT: CCBot/2.0 (https://commoncrawl.org/faq/) / Y
All times are GMT -4. The time now is 13:21.
|