Subscribers to MacRumors user forums have been advised to change their passwords because of a suspected data breach after the site was hacked.
Editorial director Arnold Kim said in a posting on the site that the attack was still under investigation, but it was best to assume that usernames, email addresses and hashed passwords had been accessed.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
He said the site had been hacked in a similar manner to the Ubuntu forums in July, with the MacRumors intrusion involving a moderator account being logged into by the hacker.
The hacker is then believed to have been able to escalate the account privileges with the goal of stealing the login credentials of the site’s 860,000 users.
Read more about privileged accounts
- Stopping privilege creep: Limiting user privileges with access reviews
- Privileged user management a must for DBAs
- Privileged account policy: Securely managing privileged accounts
- Privileged accounts are hacker sweet spot
- Privilege access management: User account provisioning best practices
- Security Think Tank: Least privilege is key to blocking IP theft
- Intel CPU hardware vulnerable to a privilege escalation attack
- Windows security case study: Controlling Windows 7 user privileges
- Exchange Server administration policy: Managing privileged user access
Security industry experts have been warning for quite some while that privileged user accounts are a top target for hackers and this form of intrusion is becoming increasingly common in targeted attacks.
Other security experts have commented that third-party software typically increases the risk of cyber attack.
“When you use third party components you expose your network to the threats faced by all those applications, significantly increasing your attack surface,” said Amichai Shulman, chief technology officer of security firm Imperva.
“Sometimes you can successfully participate in the who-patches-first race for each and every third-party component you use; but usually you can't and you must rely on virtual patching through a technology like Web Application Firewall,” he said.
Shulman believes that deploying such technology is half the way to success. “The other half depends on how good your supplier is in automatically delivering timely virtual patches,” he said.
Many password experts also consider the MD5, with or without salt, to be an inadequate means of protecting stored passwords.
MacRumors is not yet sure how the original moderator's password was obtained, Kim told Ars Technica.
"We are looking into it further to see if there was another exploit, but there hasn't been any evidence of it yet," he said.
According to Kim, log files examined so far indicate the intruder tried to access the password database, but there are no indications that the passwords are circulating online in any form.
Some MacRumors account holders have reported compromises affecting accounts they have on other sites, but a firm link to the MacRumors security breach has yet to be found.