Internet Archive Suffers 'Catastrophic' Breach Impacting 31 Million Users (bleepingcomputer.com) 20
BleepingComputer's Lawrence Abrams: Internet Archive's "The Wayback Machine" has suffered a data breach after a threat actor compromised the website and stole a user authentication database containing 31 million unique records. News of the breach began circulating Wednesday afternoon after visitors to archive.org began seeing a JavaScript alert created by the hacker, stating that the Internet Archive was breached.
"Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just happened. See 31 million of you on HIBP!," reads a JavaScript alert shown on the compromised archive.org site. The text "HIBP" refers to is the Have I Been Pwned data breach notification service created by Troy Hunt, with whom threat actors commonly share stolen data to be added to the service.
Hunt told BleepingComputer that the threat actor shared the Internet Archive's authentication database nine days ago and it is a 6.4GB SQL file named "ia_users.sql." The database contains authentication information for registered members, including their email addresses, screen names, password change timestamps, Bcrypt-hashed passwords, and other internal data. Hunt says there are 31 million unique email addresses in the database, with many subscribed to the HIBP data breach notification service. The data will soon be added to HIBP, allowing users to enter their email and confirm if their data was exposed in this breach.
"Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just happened. See 31 million of you on HIBP!," reads a JavaScript alert shown on the compromised archive.org site. The text "HIBP" refers to is the Have I Been Pwned data breach notification service created by Troy Hunt, with whom threat actors commonly share stolen data to be added to the service.
Hunt told BleepingComputer that the threat actor shared the Internet Archive's authentication database nine days ago and it is a 6.4GB SQL file named "ia_users.sql." The database contains authentication information for registered members, including their email addresses, screen names, password change timestamps, Bcrypt-hashed passwords, and other internal data. Hunt says there are 31 million unique email addresses in the database, with many subscribed to the HIBP data breach notification service. The data will soon be added to HIBP, allowing users to enter their email and confirm if their data was exposed in this breach.
From Troy Hunt via LinkedIn (Score:2)
"Yep, I’m aware, more soon"
Re: (Score:2)
https://www.linkedin.com/feed/... [linkedin.com]
Re: (Score:1)
"Threat actor?" (Score:3)
Re: (Score:3)
Re: (Score:1)
got some teem forming political dick in your mouths?
Re:"Threat actor?" (Score:4, Insightful)
Re: (Score:3)
Re: (Score:2)
Re: (Score:1)
Re: "Threat actor?" (Score:1)
Russians? I was told they need washing machine microcontrollers to support their antiquated army populated by drunks?
Or do you regularly see Russians behind every banal event that has a dozen other much more likely answers?
Re: (Score:1)
Yeah it gets tiresome, but clueless morons gotta do their thing, too. In this case, follow the rest of their tribe over the edge of some ridiculous conspiracy cliff and remain completely ignorant of recent history (2014 coup) or distant history (WW2 Nazi sympathizing, USSR membership, etc...). The Party wants it; so they are exp
Oh no! (Score:2)
Well, anyway...
Hashed passwords and email addresses. If you don't reuse passwords, no problem.
So what was the point of this? (Score:2)
They managed to hack it, nabbed the data, then handed it to the owner of HIBP. Is this to make some kind of a point about security? Or maybe to goad people into donating more so they can update/fix infrastructure or something?