{"id":5451,"date":"2016-05-31T05:17:55","date_gmt":"2016-05-31T09:17:55","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=5451"},"modified":"2019-11-15T15:24:10","modified_gmt":"2019-11-15T11:24:10","slug":"myspace-tumbler-data-breach","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/myspace-tumbler-data-breach\/5451\/","title":{"rendered":"Huge Tumblr and MySpace (yes, MySpace!) data breaches"},"content":{"rendered":"<p>Chances are that if you used Myspace or Tumblr, you may be in for something of a headache. You see, it\u2019s been reported that both social networks have had troves of user login data stolen and available, for the right price.<\/p>\n<p>The data from Tumblr \u2014\u00a0<a href=\"https:\/\/www.theguardian.com\/technology\/2016\/may\/31\/tumblr-emails-for-sale-darknet-65-million-hack-passwords\" target=\"_blank\" rel=\"noopener nofollow\">about 65 million users\u2019 worth<\/a>\u00a0\u2014 is several years old,\u00a0<a href=\"https:\/\/staff.tumblr.com\/post\/144263069415\/we-recently-learned-that-a-third-party-had\" target=\"_blank\" rel=\"noopener nofollow\">Tumblr reported<\/a>. And for those whose immediate response to this story was \u201cMySpace still exists?\u201d guess what? Several hundred\u00a0<em>million<\/em>\u00a0MySpace passwords make this one of the largest heists to date. On the other hand, the\u00a0<a href=\"http:\/\/motherboard.vice.com\/read\/427-million-myspace-passwords-emails-data-breach\" target=\"_blank\" rel=\"noopener nofollow\">reported asking price of $2,800<\/a>\u00a0for the lot of them reminds us that it\u2019s been a while since we even thought about the once dominant site.<\/p>\n<h3>All data breaches matter<\/h3>\n<p>Social media data breaches may not cause the kind of panic we see with breaches of financial institutions, but perhaps they should. After all, it takes some effort to gain access to those records, and no one would bother if there were no value to the data.<\/p>\n<p>Although MySpace might not have your credit card information, for example, access to your account gives thieves access to a variety of information that could prove useful \u2014 from personal details useful in\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/social-networks-behaviour\/11203\/\" target=\"_blank\" rel=\"noopener nofollow\">social engineering<\/a>\u00a0to login details for more directly profitable accounts, a distinct possibility given many users\u2019 propensity to reuse passwords.<\/p>\n<p>\u201cThe potential risk is high for this breach to bleed over into other stories down the road, notes Brian Bartholomew, a member of Kaspersky Lab\u2019s Global Research and Analysis Team (GReAT). \u201cThese credentials could be used by criminals to access anything from bank accounts, to mail accounts, to other online systems. The possibilities are vast with respect to how this information might be used in the future.\u201d<\/p>\n<p>And whereas Tumblr reported that it \u201csalted\u201d its encrypted user login data, making the data much harder to crack, MySpace merely\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/the-wonders-of-hashing\/4441\/\" target=\"_blank\" rel=\"noopener nofollow\">hashed<\/a>\u00a0the information with the\u00a0<a href=\"http:\/\/motherboard.vice.com\/read\/427-million-myspace-passwords-emails-data-breach\" target=\"_blank\" rel=\"noopener nofollow\">SHA1 algorithm<\/a>.<\/p>\n<h3>Protecting your accounts<\/h3>\n<p>Some recommendations for \u00a0login and password management.<\/p>\n<ul>\n<li>Create\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/remember-strong-passwords\/6386\/\" target=\"_blank\" rel=\"noopener nofollow\">strong<\/a>\u00a0<a href=\"https:\/\/password.kaspersky.com\/?utm_medium=rdr&amp;utm_source=redirector&amp;utm_campaign=old_url\" target=\"_blank\" rel=\"noopener\">passwords<\/a>\u00a0\u2014 and make a unique password for each account you hold. Sure, it\u2019s tempting to use passwords that are easy to remember and type, and perhaps even more tempting to repeat the same password all over the place. The flip side of that coin, however, is having to mop up the mess if\u00a0<em>all<\/em>\u00a0of your accounts become compromised as the result of\u00a0<em>one\u00a0<\/em>data breach.<\/li>\n<li>Try a password manager, such as\u00a0<a href=\"http:\/\/free.kaspersky.com\/advert\/?redef=1&amp;THRU&amp;reseller=gl_socmedfree16_acq_ona_smm__onl_b2c_kasperskydaily_lnk____kss___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Password Manager<\/a>, to simplify and ease the pain of not being able to access every account with classics like\u00a0<em>qwerty1<\/em>,\u00a0<em>123456<\/em>, or the ever popular\u00a0<em>password<\/em>\u00a0(come\u00a0<em>on<\/em>, people!).<\/li>\n<li>https:\/\/twitter.com\/KasperskyME\/status\/559686986047315971<\/li>\n<li>\n<ul>\n<li>Enable\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/what_is_two_factor_authentication\/5036\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a>\u00a0in every account that supports it. Two-factor authentication, although not 100% hack-proof, is one of the most effective ways available to safeguard your accounts. If it seems like a minor hassle, weigh that brief inconvenience against the headaches of clearing up an identity theft. With two-factor authentication enabled, entering the right login credentials triggers the sending of a code, typically by SMS to your phone. Essentially, it\u2019s a check to ensure you are the right person, not merely a person in possession of your login info.<\/li>\n<\/ul>\n<p>Go ahead and reset your passwords right now. We\u2019ll wait.<\/p><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Chances are that if you used Myspace or Tumblr, you may be in for something of a headache. You see, it\u2019s been reported that both social networks have had troves<\/p>\n","protected":false},"author":2045,"featured_media":5452,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[872,1177,314,215,1178,895,97,211,1179],"class_list":{"0":"post-5451","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-breach","10":"tag-dark-web","11":"tag-data-breach","12":"tag-internet-security","13":"tag-myspace","14":"tag-password-breach","15":"tag-security-2","16":"tag-social-media","17":"tag-tumblr"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/myspace-tumbler-data-breach\/5451\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/myspace-tumbler-data-breach\/3823\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/myspace-tumbler-data-breach\/7211\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/myspace-tumbler-data-breach\/7258\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/myspace-tumbler-data-breach\/7180\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/myspace-tumbler-data-breach\/8413\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/myspace-tumbler-data-breach\/8292\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/myspace-tumbler-data-breach\/2150\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/myspace-tumbler-data-breach\/12252\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/myspace-tumbler-data-breach\/11619\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/myspace-tumbler-data-breach\/12252\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/myspace-tumbler-data-breach\/12252\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/breach\/","name":"breach"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2045"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5451"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5451\/revisions"}],"predecessor-version":[{"id":14871,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5451\/revisions\/14871"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5452"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}