Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy Security

GitHub Presses Big Red Password Reset Button After Third-Party Breach (theregister.co.uk) 32

John Leyden, writing for The Register: GitHub has reset the passwords of users targeted in an attack this week that relied on using stolen credentials from a breach at a third-party site. The software repository itself has not suffered a breach. Hackers behind the assault were trying to break into the accounts of users who had inadvisedly used the same login credentials on an unnamed site that had suffered a breach, as a statement by GitHub explains. GitHub said it had reset the passwords on all affected accounts before beginning the process of notifying those affected. "We encourage all users to practise good password hygiene and enable two-factor authentication to protect your account," GitHub sensibly advised.
This discussion has been archived. No new comments can be posted.

GitHub Presses Big Red Password Reset Button After Third-Party Breach

Comments Filter:
  • Do anyone know which other third-party site was breached ? Or is it just an accumulated database of all historical breaches ..?
    • There is http://www.adeptus-mechanicus.... [adeptus-mechanicus.com]

      If companies were smart they would reset and ban all passwords in those lists and the most common password topologies, as listed here [korelogic.com] and here [github.com]

      • by Lumpy ( 12016 )

        If companies were smart they would not store any passwords at all but hashes so that breaches would not give hackers a pile of usernames and passwords.

    • by sexconker ( 1179573 ) on Thursday June 16, 2016 @06:34PM (#52332231)

      There was at least one major dump recently. I don't know when the breaches behind that dump occurred or how many of them were. Initial reports were that it was all Linked In's fault. But as far as I know Linked In still denies this. Several sites are resetting passwords for users, issuing alerts, etc. based on the presence of user names in the dumps.

      So it's now gotten to a point where 1 site failing will result in other sites forcing you to change your password as well, because they force you to use an email address as a username and they assume you are reusing passwords. Terrible. Don't make me use an email address as a username, and don't make me reset my unique password because you assume all your users are idiots. ESPECIALLY when you're doing this as a reaction to a suspected third-party breach, where the user's accounts across other sites tied to their email address have been potentially compromised. (Hint: your "I forgot my password" tool sends link or temporary password to the registered email account, which is just as potentially compromised as the account your are trying to protect by forcing a reset.)

      • I think they are probably being a little bit more intelligent than you describe.

        I was not forced to change my password upon login to GitHub (I just tried). I use unique passwords for all sites.

        So, probably what is happening is GitHub got a copy of the account list and started checking passwords against its own db.

        Since GitHub knows the encryption methods of its own accounts db, it can run the compromised account list through its encryption process and match the output to user's hashes. They can then flag an

  • Good show, GitHub! I am very happy to see that they put security first and foremost.

    I do say, it would have been a terrible disaster if somebody had breached the accounts of GitHub users, and done something dastardly like update some of the long-abandoned Rust libraries to actually compile with this week's Rust compiler, or made some badly needed bug fixes to the many JavaScript libraries that the original authors have lost interest in maintaining.

  • Just logged in and didn't have to reset my password.

    I guess they don't say which percentage of accounts were affected.

    • by Anonymous Coward

      Just logged in and didn't have to reset my password.

      Ya. I just logged into your account too and everything seems fine.

  • by cliffjumper222 ( 229876 ) on Thursday June 16, 2016 @07:05PM (#52332395)

    If you aren't using it yet, you should. Indeed, I'd like all sites to enable 2-factor by default. It's not like most folks don't have phones or email accounts.

    • by markus ( 2264 )

      Ideally, everybody should enable U2F token support. It is cheap, probably more secure than most other mainstream 2FA options, and you only need a single token no matter how many sites or accounts you want to secure. It's also much easier to use

    • by tepples ( 727027 )

      Just because you have a phone doesn't mean it's specifically a cell phone with a plan that includes unlimited incoming SMS. Many authentication services (such as Twitter's) refuse to send messages to landlines' SMS-to-voice gateways, and pay-as-you-go cellular plans in the U.S. market (as opposed to monthly plans) tend to deduct on the order of 10 to 40 cents per sent or received message from the subscriber's balance. The U.S. differs from Europe in that in the U.S., both parties pay their half of airtime c

    • by allo ( 1728082 )

      2-FA prevents reasonable privacy.
      Either you need to use your authenticator all the time or you cannot delete your cookies, as the site will see your visit as new visit requiring a new code.
      So use a strong password instead.

    • If you aren't using it yet, you should. Indeed, I'd like all sites to enable 2-factor by default. It's not like most folks don't have phones or email accounts.

      I can count the number of websites that I care about TFA on two hands. And how many websites out there make you create a username and password to do anything? I have a special email address for those useless sites. And a very weak password. They're not worth the effort.

      • I am with you. The only things I use 2FA for are banking, password manager, Facebook & Google (because I use their authentication system sometimes) and e-mail accounts (and WoW because you get a pet).

        Even with those, 2FA is enough of a hassle that I consider removing it sometimes. I certainly do not need every web site I log in to know my phone number.

  • I work for a high-use API site, and I've been seeing these kinds of attacks regularly now for 6 months or more.

    Basically, it's a barrage of user/pass attempts coming from hundreds, sometimes thousands of different IP addresses. I wrote custom filters to specifically identify these requests and black-hole them in the nginx proxy. Luckily, we require that 2FA is enabled on all accounts, so nothing seriously at risk,

    I urge everyone to use 2FA on all sensitive sites where available. These kinds of attacks ar

  • I received an email that there was suspicious activity on my account, urging me to change my password. Since I don't know my password (I use a password manager), I looked it up. I'm 100% sure I have not used this particular password with any other account (it was 'randomly' generated by the password manager), so I guess they have emailed everyone.
    • That is strange. I am in the exact same boat. I looked up my password for GitHub and it was a 24 character random password with symbols.

      I logged in and changed it to another similarly long password anyway.

      Still, I received no notice and I was not prompted to change my password upon login.

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...