What LulzSec Logins Reveal About Bookworms, and Passwords 136
Barence writes "Today the hacking group LulzSec posted 62,000 hacked email usernames and passwords online. PC Pro's Darien Graham-Smith has analysed the passwords stolen — which are believed to have come from a website for writers — and found some interesting patterns. Aside from 'password' and obvious numerical patterns (i.e. '12345') the most common passwords share a literary theme: 'romance,' 'mystery,' 'shadow' and 'bookworm' are all commonly used passwords. 'Clearly, this is a back-of-an-envelope breakdown of a mixed mass of unverified data,' said Graham-Smith. 'But it gives an interesting insight into the way people choose their passwords: in this case, apparently, on a theme that reflects the nature of the site they're visiting.'"
Are you sure? (Score:5, Insightful)
Re: (Score:1)
You re-use the same password for multiple sites? Good to know. How would you like to register for a free account on my site?
Re: (Score:2)
You must be on a netbook. You seem to have missed the last six words of his post.
Gay Girl Blogger from Syria? (Score:3)
Do we need to change "her" password? Right now it's "Lezcyclopedia".
Re: (Score:2)
Re: (Score:2)
Whats wrong with the same throw away password for multiple sites? Personally I usually make new usernames for different sites as well, but does it really matter if you didnt? The best someone could do is get your email address, which assumingly, you havent used a "throw away password".for. Or spam some forum account that by definition of it being "throw away worthy" you do not care about?
Otherwise you would have hundreds of unique password and usernames combinations that you would obviously need to write do
Re: (Score:2)
Re: (Score:2)
Well, see pictures from the riots in Vancouver last night.
Now imagine someone impersonating you. And posting your info. So that the cops can arrest you. As is happening right now in Vancouver.
You may not be guilty, but that doesn't mean your life won't be hell for a while.
Re: (Score:2)
I'm honestly not worried one iota about that type of scenario. Framing someone doesn't just happen on the internet. There are a million reasons why it rarely works, and the internet provides better tracking to prove your whereabouts than analog life.
Re: (Score:2)
Because people that reuse their passwords do so for paypal, ebay, their bank etc.
And if you get arrested in America on any of these charges expect to sit in Jail for a few years before the committee gets to you. If y ou get that lucky.
- Dan.
Re: (Score:2)
Re: (Score:2)
http://news.slashdot.org/story/11/06/16/2059204/British-Student-Faces-Extradition-To-US-Over-Copyright [slashdot.org]
Re: (Score:2)
You should be worried. The wheels of justice move slowly. Who knows when the cops will get those pictures of you at the game/work/else where?
Now imagine that the pictures are of your son - aged 15. You're not always sure where he is. It's not documented. But someone posted a pic of him saying he was in Vancouver, participating in the riot.
Again, he may not be guilty, but that doesn't mean his and your lives won't be miserable for a while.
Re: (Score:2)
Re: (Score:1)
And just because you don't use a custom password based on the type of site doesn't mean that others don't. I've heard of people who have a base key that they use for their passwords - say "Camaro" for simplicity's sake. Then, for slashdot their password may be "Camslasharo" and for facebook "Camfacebookaro" "Camgmailaro" etc.
Re: (Score:2)
I doubt those 30 people using the password "writerspace" for writerspace.com [writerspace.com] use the same password for facebook or their email.
No you're right, they probably use "facebook" for facebook, and "hotmail" for hotmail. The whole point is that once you identify a user name that uses this type of weak password, you go from astronomical odds of being able to crack to a few dozen possibilities.
And just because you don't use a custom password based on the type of site doesn't mean that others don't. I've heard of people who have a base key that they use for their passwords - say "Camaro" for simplicity's sake. Then, for slashdot their password may be "Camslasharo" and for facebook "Camfacebookaro" "Camgmailaro" etc.
Doesn't matter. A "key generation algorithm" simple enough for a person to remember or work out logically is simple enough to guess at - at least far simpler than the number of combinations possible with a truly random password. The point is that if y
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re:Are you sure? (Score:5, Funny)
My generic password is "iwillnevertellyou".
They'll never figure that one out, not even if they try to beat it out of me.
Re: (Score:2)
I once changed a friend's BIOS password to 'idunno'. I tried telling him, but he just got increasingly aggravated.
Re: (Score:2)
Who's on first?
Re: (Score:1)
Re: (Score:2)
I thought about doing a mix. Like, I have a series of numbers, symbols and letters that I've memorized. It's a very secure password, and I like using it because I can remember it.
But of course, using the same password on every site isn't good practice, so I've made various little changes to the series. Only problem is, it gets hard to remember what series fits what site. So I thought of using the same series for every site, and then simply attaching the first and last alphanumeric character of the websi
Re: (Score:2)
Why not just use LastPass or one of the bookmarklets that make a hash from a master password and the site url?
Re: (Score:2)
Because it's easier just to have the password in my head. Yup, I'm that lazy
Re: (Score:1)
Re: (Score:2)
Because the passwords stored in the cloud are encrypted, they aren't in the clear. A service like LastPass cannot send you your plaintext password. All they have is the encrypted version. If they are hacked, all the hacker will get is a bunch of random looking data.
The downside is that if you lose your master password, you are screwed.
The upside is that the passwords that LastPass generates are very strong. Much stronger than what people typically use (like "pa55word"). And because you don't have to remembe
Re: (Score:2)
So I thought of using the same series for every site, and then simply attaching the first and last alphanumeric character of the website address to the password. That way I'll have a secure password on every site that is easy to remember wherever I use it.
That's what I do, except to be more secure I use the first and last 3 alphanumerics from each site. Conveniently, several of my passwords are identical: "wwwpasswordcom".
Re: (Score:1)
I like my system. I have a somewhat unique word that is about 8 characters long. I mix that with the domain name of the site I am visiting in the format of an email address (which we all seem to be able to remember).
The only problem with this is that it is still mostly useless if someone gets one of your passwords.
For example if newyorktimes.com gets hacked and the login info is published, then it's not a massive intellectual effort to figure out the scheme that you are using and applying it to any other sites that you may be on.
In passwords size matters :)
Only if you're just brute forcing.
Re: (Score:2)
check your passwords (Score:4, Informative)
Just search the page for your password. Chrome does a great job of this because it starts highlighting matching passwords as you type it. I just checked my passwords, none of them are on this list.
Re: (Score:2)
Cool mine aren't on there, a long time ago I was webmaster of poiuyt.com, I was always amazed at the number of people who used a @poiuyt.com as an email address with qwerty as the password on various sites around the web.
Re: (Score:2)
hunter2 isn't on the list, but hunter22 is. Clearly our friend [bash.org] realized he was hacked and upgraded his password strength.
Re: (Score:2)
I thought so too until... (Score:2)
That was my 1st guess too. However, here's a list of the top 45 most common passwords for that site. I've bolded the obvious literature related passwords. Others may be as well, such as person names that might be references to characters. You may be right, of course, but literature related passwords do seem overrepresented.
0.9231% "123456"
0.3157% "123456789"
0.2142% "password"
0.1417% "romance"
0.1095% "102030"
0.1079% "mystery"
0.0998% "123"
0.0998% "ajcuivd289"
0.0998% "shadow"
0.0998% "tigger"
0.08
Hmmm ... (Score:2)
Re: (Score:2)
I'm guessing one participant was a librarian?
If that was the case, then the password would be "Ook.". Sorry if you're not a Terry Pratchett fan, you just won't get this.
Plaintext (Score:2)
Re: (Score:2)
Re: (Score:2)
Be careful what you wish for--if that does happen, you should probably expect a whole lot of ROT13 implementations...
Re: (Score:2)
Because that only solves half the problem?
Re: (Score:2)
oh noez! (Score:5, Interesting)
Easy-to-remember passwords for a site that doesn't matter at all? Color me shocked. When forced to sign up for forums to ask a question about coding or tech troubleshooting, I generally use a pretty basic password and then lie about all of my personal info. That way if someone does acquire this info (and it has happened multiple times) I don't get burned. For important things like banking and gmail, I have 2-step authentication enabled and use a strong password on top of that. Different on every site of course.
But for stuff like writers forums, tech support sites, slashdot (haha!) and the like? I don't use and don't care to use a strong password because, well, what's the point? You don't hear about individuals on these sites being hacked because of the insecure passwords they use. No, you hear about the administrators of these sites having their sites hacked and their userlists and passwords stolen. What good does a strong password serve on a site like this when there are gaping security holes in the OS hosting the forums?
And why, for Xenu's sake, are people still storing passwords in plaintext??
Re: (Score:2, Funny)
And why, for Xenu's sake, are people still storing passwords in plaintext??
because their lazy.
Re: (Score:3)
damn.
they're...
I'll hand in my spelling/grammer pedant card now.
Re: (Score:2)
"spelling/grammer"
I'll assume that was in jest :-P
Re: (Score:3)
because their lazy asses can't be bothered to learn how to do things the right way.
http://en.wikipedia.org/wiki/Principle_of_charity/ [wikipedia.org]
Re: (Score:1)
Re: (Score:2)
When forced to sign up for forums to ask a question about coding or tech troubleshooting, I generally use a pretty basic password and then lie about all of my personal info.
Bonus points for unimportant sites that don't accept mailinator.com e-mail addresses or won't let you set a weak, easy to remember password.
Because, you know, if my "I can haz cheezeburger" account gets compromised, western civilization might end.
No reason not to use password manager (Score:2)
Password reuse is a major problem, regardless of site. There is very little excuse not to use tools like 1Password, LastPass or KeePassX.
I've gotten my technophobic parents and wife on the treadmill (all use 1password via a family license).
I've gotten them comfortable ditching their "known good password" on their other sites, learning the strong master password by heart, and got them comortable enough to generate a good-length (default 18 characters) passwords for any site that needs it.
The best part about
Re: (Score:2)
How about "if it's not your bank account who gives a flying fuck about security and strong passwords" as an excuse?
Re: (Score:2)
Actually, the article is a little sensationalist. I just looked at the password file. About 2/3rds of the passwords are decent. Long, not 100% obvious, mix of numbers & characters, etc. I was expecting more of an 80/20 ratio of crap vs decent and I was really surprised. Also kudos to the guy who uses "707294en14.SmMeG"
That said, I see a pattern of lots of numerical 6 and 7 digit passwords. They don't look like phone or postal codes. I'm guessing that their password reset tool picked 6 or 7 random numbe
Re: (Score:2)
When forced to sign up for forums to ask a question about coding or tech troubleshooting, I generally use a pretty basic password and then lie about all of my personal info. That way if someone does acquire this info (and it has happened multiple times) I don't get burned.
And use guerrillamail.com to get a temporary email if you need to hit a verification link.
Re: (Score:2)
And why, for Xenu's sake, are people still storing passwords in plaintext??
Because, as you've already established, for this website they don't matter.
Re: (Score:2)
I'll just let that sink in, for laughs.
AOL.
Re: (Score:2)
Caution (Score:1)
I'd always be wary about all these grand "revealings" about passwords from LulzSec.
How many usernames/passwords on an innocent blogging site like that are completely throwaway?
I know that on randomblog.com if I want to make an account on the spot, I'm certianly far more likely to use "asdf123" for a username and "randomblog" as a password than I am a 16 digit alphanumeric/symbol/mixed case password that I will forget in 5 minutes.
Who cares if your blogspot account gets hijacked? What are they going to do, w
Not wanting to write it down (Score:2)
Many of these passwords are a consequence of a person not wanting to write down their passwords for fear of the written down password being found. Thus, instead of creating an effective, hard to guess (and hard to remember) password, many people simply come up with a password that is easy to remember, but that they hope is so random, or so obvious, that nobody would guess.
I teach my children, even the little ones, the old trick of coming up with an easy to remember sentence, picking the first letter of each
Noticed similar pattern (Score:2)
And for the record, yes, I told them stop emailing around spreadsheets that included everyone's pa
Passwords? (Score:1)
Why are we still using passwords? They will go away, sooner or later.
the algorithmic approach to passwords (Score:2)
i've championed this before, and i don't why it doesn't get more press
instead of the same username pword for every site, make your uname/ pword a derivative of the website name or theme, and your own personal salt
the rules could be as quirky and arcane as you want
for example:
username is the first 3 letters of the website, plus your birthyear, plus the cousin whose name sounds most like the website you're visiting
password is the street you grew up on, minus the last 3 characters and plus the last 3 character
Re: (Score:2)
echo -n "Shivelights and shadowtackle in long lashes lace lance and pair + slasHdoT"
Re: (Score:2)
now that's hot
your average user isn't going to do sha256 hashes though
but, skipping that step, it's still a workable framework
Re: (Score:3)
i really don't know why this idea of remembering just one personal quirky algorithm isn't more widespread
The problem with algorithms is stupid artificial restrictions on credentials by some sites. For example, I can only choose numbers for my "PIN" on my 401k. Or my password must be all lowercase for my public utilities site or contain no special characters at my bank some other hair-brained restriction.
Same with user names. Often your username must be your email address. Sometimes they don't allow the @ sign. Other times, it's not modifiable and random characters assigned to you (I have at least one broke
Re: (Score:2)
this is a good criticism. you are correct. different policies and standards complicates the algorithm and is discouraging
Re: (Score:2)
it's really not complicated. it is no more complicated than using the same username/ pword on every site: an algorithm is just a few small simple steps to remember
It doesn't follow. (Score:2)
Not sure I buy the premise. I went to a nerd college with few woman. Back then, before they shadowed PW files, I came across a lot of passwords. The two most common variants I found contained the words 'soccer' or 'jennifer.' Once again, I went to a nerd college with few women.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
But of course. (Score:5, Funny)
But it gives an interesting insight into the way people choose their passwords: in this case, apparently, on a theme that reflects the nature of the site they're visiting.
The three most popular Slashdot passwords are 'troll', 'slacker', and 'clown'.
Some of the emails are fakes (Score:3)
they'll never get mine. (Score:2)
Mine is all '*'s ...
Re: (Score:1)
Mmm, salt. (Score:2)
Seriously. Hashing. Does nobody practice this for user account databases?
Re: (Score:2)
Anyone writing code that stores passwords using plaintext or reversible hashes should probably take up a career in quilting.
As should anyone writing code that can't handle every printable ASCII character in a password. Better yet straight, passwords should allow any string of bytes. Any programmer who limits passwords to alphanumeric is probably writing SQL injection vectors.
Ahem (Score:2)
Re: (Score:2)
Why would you believe the WHOIS data?
Re: (Score:2)
Re: (Score:1)
Adrian Lamo was the guy who turned in Bradley Manning. If you were a wikileaks supporting entity, looking for a random name to blame ...
Re: (Score:2)
Yawn! (Score:1)
I am really starting to doubt these stories. Generating usernames and passwords is something that can be down with even a quick script - it is not hard to generate real words using a known dictionary source.
Selection bias, anyone? (Score:2)
We can't know for sure since they aren't divulging their source, but some of the services listed are too sophisticated (esp. Gmail, even if you don't believe in competency of those who run Hotmail) even to store passwords in cleartext anywhere.
If I had to guess at how they obtained these passwords, they did it by actual hacking of the accounts (or somehow got a hold of the password hashes to run faster attacks on), and in that case, the accounts with weak passwords are the low-hanging fruits; of course the
Re: (Score:2)
Did anybody here finish the article? (Score:2)
The passwords are likely vision based (Score:3)
Want to break into their stuff? Simply take a look around the desk and see what is important to them. Simple as that.
Re: (Score:1)
This happens all the time in film, but I've never seen it happen in real life. I know a few people who use passwords that have some sort of personally important bit of information nested in it, but having known the passwords of various friends and family members throughout my life the creation methods have never been related to what's around their desks.
Re: (Score:2)
most of the emails are from Brazil (Score:1)
Comment removed (Score:3)
Guessable passwords. (Score:3)
People use guessable passwords because they want to use passwords that they can remember. And people that use passwords they can remember do reuse passwords. Any password I can remember probably isn't very secure. Any password used at more than one site definitely isn't secure.
It's past time that all browsers included a standard password generator with user definable salt set at first invocation, and master password prompting. Web standards should at a minimum specify support for all printable ASCII characters in passwords. If a bank isn't competent enough to hire a programmer that can write code to handle a quote in a password, you probably shouldn't be banking there.
Until then there's still PasswordMaker for which you have to salt each account separately if you not want the default unsalted hash. And there's still the annoyance of "alphanumeric only with at least one uppercase and one number" web sites.
I don't think the Data is that relevent (Score:1)
It reveals (Score:2)
that LulzSec are worms.