Adobe admits that attackers accessed their network and all passwords have been reset. They believe 3 million accounts are included. Account total bumped to 38 million November: Account total again bumped to 150 million, and with additional data (names, password hints, etc.), the total file size is 10GB. Adobe listed the data as “encrypted”. Experts stated that this was probably in error and what they really meant is that it was hashed... and the experts were wrong.
The dataset includes rich plaintext emails, usernames,password hints and encrypted password hashes. Additionally, credit card data was also accessed and is said to use similar encryption.
Because the frequency of matching password hashes, we know that the data is unsalted and likely uses 3DES. No one has publicly announced that they have accessed the private key, however it’s only a matter of time before it’s found.
At 150 million accounts, many people will have reused passwords for other sites, and because Adobe uses emails for login, those will most likely match too. (Hello banking/Facebook/etc)?
Adobe has the credit card data on file for every Creative Cloud customer and people who have purchased other products. Once cracked this provides an even better (larger) dataset for commonly used passwords than lists from Gawker and others.
What did Adobe do wrong? Encrypting and not hashing passwords. Not salting passwords. Storing plain text password hints with the other data. Allowing poor passwords. Allowing poor password hints. Slow response.
File Type: PDF
File Size: 1.68 MB
Total Pages: 32
Direct Link Mega:
Direct Link AnonFiles:
Direct Link Mediafire:
Direct Link Solidfiles:
Direct Link Sabercathost:
Direct Link Tusfiles: