{"id":1771,"date":"2013-04-30T13:15:37","date_gmt":"2013-04-30T17:15:37","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1771"},"modified":"2020-02-26T18:56:49","modified_gmt":"2020-02-26T14:56:49","slug":"living-social-hacked","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/living-social-hacked\/1771\/","title":{"rendered":"LivingSocial Hacked; Better Change Those Passwords"},"content":{"rendered":"<p>LivingSocial informed its millions of customers over the weekend that malicious hackers had compromised the popular coupon site\u2019s computer systems, exposing the names, email addresses, dates of birth, and encrypted passwords of an unknown number of LivingSocial members.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113758\/lsocial_title.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1772 aligncenter\" alt=\"living social \" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113758\/lsocial_title.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>The good news is that, according to LivingSocial, user <a href=\"https:\/\/me-en.kaspersky.com\/blog\/securing-your-passwords-with-pure-3-0\/\" target=\"_blank\" rel=\"noopener\">passwords<\/a> were hashed and salted. In other words, the passwords were stored in an encrypted format that would make it very difficult \u2013 although not impossible \u2013 for the attackers to make sense of the password data they accessed. The company also claims that attackers did not breach a separate database on which they store customer credit card and other payment information.<\/p>\n<p>Again, hashed passwords* are hard, but not impossible, to break. If you have an account on LivingSocial, then you should follow <a href=\"https:\/\/www.livingsocial.com\/createpassword\" target=\"_blank\" rel=\"noopener nofollow\">this link<\/a> immediately and change your password over there. More importantly, if you used the same password for another site or sites, then you are going to want to go and change <a href=\"https:\/\/me-en.kaspersky.com\/blog\/infographic-password-protection\/\" target=\"_blank\" rel=\"noopener\">those passwords<\/a> as well.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1774 aligncenter\" alt=\"living social notificatoin\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113754\/livingsocialdbnotification.png\" width=\"902\" height=\"551\"><\/p>\n<p style=\"text-align: left;\">It\u2019s almost getting to the point where attackers have to compromise payment information or find plain-text (unencrypted) passwords or something else humiliating on a hacked server for anyone to care. Consumers, the organizations that should be better protecting customer-data, and even some security professionals are all increasingly desensitized to these sorts of <a href=\"https:\/\/me-en.kaspersky.com\/blog\/data-breach-letters-affected-by-identity-theft\/\" target=\"_blank\" rel=\"noopener\">breaches<\/a>. It didn\u2019t used to be like this. At first, no one talked about data-breaches at all, then it got harder to sweep breaches under the rug, and companies had to come clean about them. Now we realize just how commonplace data breaches are and it\u2019s very difficult to sustain the rage in the face of near-daily breaches.<\/p>\n<div class=\"pullquote\">If you have an account on LivingSocial, then you should immediately change your password. If you used the same password for another site or sites, then you are going to want to go and change those passwords as well.<\/div>\n<p>Realize this though, because we all read about spear-phishing. In fact, we may read about spear phishing and phishing and water-holing and other social engineering attacks as often as we read about data breaches. <a href=\"https:\/\/me-en.kaspersky.com\/blog\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"noopener\">Social engineering attacks in general<\/a> rely on the attacker coming to possess a certain level knowledge about their targets. <a href=\"https:\/\/me-en.kaspersky.com\/blog\/how-attackers-actually-steal-data\/\" target=\"_blank\" rel=\"noopener\">Where exactly do you think social engineers find email addresses for phishing attacks<\/a>? How do they figure out the interests of their potential targets so they can launch successful watering-hole attacks? Why are these hackers so good at guessing passwords and password reset questions?<\/p>\n<p>A lot of this information is gleaned from information ascertained by data breaches. To be fair, a lot of it is gathered from user\u2019s <a href=\"https:\/\/me-en.kaspersky.com\/blog\/risks-checking-in\/\" target=\"_blank\" rel=\"noopener\">openly over-posting information about themselves on social networks<\/a> too, but that\u2019s a topic for another day. People often hand over their corporate email addresses for various online services, and when the databases for those services are compromised, attackers now have email contacts that they can attempt to phish at a number of high-value organizations. Birth-dates can be valuable as well, because users often use their birthdates in their passwords or as part of their password reset questions. Obviously, if cracked, exposed password hashes can cause serious problems for users that insist on sharing passwords.<\/p>\n<p>If you\u2019re interested, and I am guessing you are on account of that fact that you are reading a blog designed to educate users about security, LivingSocial provided a surprisingly excellent explanation of what is commonly referred to as \u201csalting and hashing\u201d in the FAQ section of the data breach notification:<\/p>\n<p><i>*\u201dLivingSocial passwords were hashed with SHA1 using a random 40 byte salt. What this means is that our system took the passwords entered by customers and used an algorithm to change them into a unique data string (essentially creating a unique data fingerprint) \u2013 that\u2019s the \u2018hash.\u2019 To add an additional layer of protection, the \u2018salt\u2019 elongates the password and adds complexity. We have switched our hashing algorithm from SHA1 to bcrypt.\u201d<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>LivingSocial informed its millions of customers over the weekend that malicious hackers had compromised the popular coupon site\u2019s computer systems, exposing the names, email addresses, dates of birth, and encrypted<\/p>\n","protected":false},"author":42,"featured_media":1773,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[314,82],"class_list":{"0":"post-1771","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-data-breach","9":"tag-hacking"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/living-social-hacked\/1771\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/living-social-hacked\/1771\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/living-social-hacked\/1771\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/living-social-hacked\/1771\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/living-social-hacked\/1771\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/living-social-hacked\/777\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/living-social-hacked\/1771\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/living-social-hacked\/1771\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/data-breach\/","name":"data breach"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1771"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1771\/revisions"}],"predecessor-version":[{"id":15526,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1771\/revisions\/15526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1773"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}