Forgot your password?
typodupeerror
Security IT

Hacker Grabs 150k Adobe User Accounts Via SQL Injection 64

Posted by samzenpus
from the breaking-in dept.
CowboyRobot writes "Adobe today confirmed that one of its databases has been breached by a hacker and that it had temporarily taken offline the affected Connectusers.com website. The hacker, who also goes by Adam Hima, told Dark Reading that the server he attacked was the Connectusers.com Web server, and that he exploited a SQL injection flaw to execute the attack. 'It was an SQL Injection vulnerability, somehow I was able to dump the database in less requests than normal people do,' he says. Users passwords for the Adobe Connectusers site were stored and hashed with MD5, he says, which made them 'easy to crack' with freely available tools. And Adobe wasn't using WAFs on the servers, he notes. Tal Beery, a security researcher at Imperva, analyzed the data dump in the Connectusers Pastebin post and found that the list appears to be valid and that the hacked database was relatively old."
This discussion has been archived. No new comments can be posted.

Hacker Grabs 150k Adobe User Accounts Via SQL Injection

Comments Filter:
  • by travbrad (622986) on Wednesday November 14, 2012 @08:36PM (#41986859)

    A shocking revelation

  • by NetNinja (469346) on Wednesday November 14, 2012 @09:16PM (#41987197)

    Poor network security standards.

    A simple Web Application Firewall would have prevented that.

    If they can't do something as simple as secure thier own website, thier products are even worse.

  • by El_Oscuro (1022477) on Wednesday November 14, 2012 @09:30PM (#41987315) Homepage
    I'm not sure how a firewall would prevent SQL injection, as the attack pass through the normal HTTP/HTTPS traffic and their own crappy web application is the attack vector. Then again, setting up any firewall is far more complex than the few lines of code or bind variables need to stop SQL injection attacks.
  • Re:What's a WAF? (Score:2, Insightful)

    by Anonymous Coward on Wednesday November 14, 2012 @10:24PM (#41987735)

    To be fair, googling the term isn't very helpful here.

    Result #1 is a google code project for git.
    #2 is wikipedia's wife acceptance factor quoted by GP
    #3 is the wikipedia article covering #1
    #4 is acronyms.dictionary showing: WAF, Women in the Air Force (USAF; obsolete). WAF, Warendorf. WAF, WAF, We Are Family ...
    #5 is urban dictionary showing "Wack As Fuck"
    #6 is a website for World Architecture Festival
    #7 is WPF Application Framework, "The WPF Application Framework (WAF) is a lightweight Framework that helps you to create well structured WPF Applications"
    #8 is a sub-page of #1 containing documentation

    #9, the last result on the search, is finally "Web Application Firewall (WAF) - Real time protection from Web ..." from http://www.imperva.com/products/wsc_web-application-firewall.html [imperva.com]

    Your snarky "let me google that for you" provides eight incorrect answers to his question!
    If you don't even know the answer and can't be bothered to even pretend to, perhaps you should stop complaining about others who actually put in effort to remove part of their ignorance.

  • by El_Oscuro (1022477) on Wednesday November 14, 2012 @11:08PM (#41988079) Homepage

    That is cool. It is nice that you can configure firewalls to protect against layer 7 attacks. It is a great part of defence in depth. If I set up the firewalls I would do this. Of course I don't, and the bureaucracy makes the Vogons look nimble. They would feed their own grandmother to the Ravenous Bugblater Beast of Traal rather than change the rules. And of course, some other "developer" with some clout would get an exception so his craptastic application still works.

    I love the idea of a Firewall protecting my app, but would rather write the 2 lines of code to ensure my app doesn't get pwned if it doesn't for whatever reason.

Programmers do it bit by bit.

Working...