{"id":16978,"date":"2019-11-23T10:45:02","date_gmt":"2019-11-23T18:45:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/11\/23\/news-10715\/"},"modified":"2019-11-23T10:45:02","modified_gmt":"2019-11-23T18:45:02","slug":"news-10715","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/11\/23\/news-10715\/","title":{"rendered":"The Likely Reason Disney+ Accounts Are Getting &#8216;Hacked&#8217;"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5dd58bba30ef2c0008e9e2b8\/master\/pass\/Security_Disneyplus-200406551-001.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Wed, 20 Nov 2019 20:02:13 +0000<\/strong><\/p>\n<p class=\"content-header__row content-header__dek\">Credential stuffing, where names and passwords leaked in previous breaches are reused, strikes again.<\/p>\n<p>The reports came just a few days after <a href=\"https:\/\/www.wired.com\/story\/disney-plus-power-launch\/\">Disney+ launched<\/a>: Thousands of the streaming service accounts were already up for sale on various hacking forums, at bargain prices. As of Wednesday, new victims were still taking to Twitter and other venues to <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/riosluis_\/status\/1197186901129748482&quot;}\" href=\"https:\/\/twitter.com\/riosluis_\/status\/1197186901129748482\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">express<\/a> their frustration that their accounts had been taken over. What\u2019s happening almost certainly isn\u2019t a hack in the way you\u2019d normally think of it. Instead, it appears to be a classic\u2014and regrettable\u2014case of what\u2019s known as <a href=\"https:\/\/www.wired.com\/story\/what-is-credential-stuffing\/\">credential stuffing<\/a>.<\/p>\n<p>As ZDNet <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.zdnet.com\/article\/thousands-of-hacked-disney-accounts-are-already-for-sale-on-hacking-forums\/&quot;}\" href=\"https:\/\/www.zdnet.com\/article\/thousands-of-hacked-disney-accounts-are-already-for-sale-on-hacking-forums\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">first reported<\/a>, compromised Disney+ accounts could be found on the dark web for as much as $11 a pop, or as little as, well, free. (Disney+ itself costs $7 per month, or less for a full-year plan.)<\/p>\n<p>Disney rejects any suggestion that its systems have been hacked. \u201cWe have found no evidence of a security breach,\u201d the company said in a statement. \u201cWe continuously audit our security systems and when we find an attempted suspicious login we proactively lock the associated user account and direct the user to select a new password.\u201d<\/p>\n<p>Taking megacorporations at their word, especially regarding cybersecurity issues, is <a href=\"https:\/\/www.wired.com\/story\/uber-paid-off-hackers-to-hide-a-57-million-user-data-breach\/\">rarely advisable<\/a>, but in this case you don\u2019t have to, because the simpler explanation is almost certainly the correct one.<\/p>\n<p>\u201cIt certainly sounds like credential stuffing,\u201d says Troy Hunt, founder the website Have I Been Pwned, a repository of the billions of accounts that have been leaked across various breaches over the years. \u201cThis incident has all the hallmarks of what we\u2019ve been seeing over and over again.\u201d<\/p>\n<p>For a technique that causes so many headaches\u2014Dunkin&#x27; Donuts, Nest, and OkCupid are all recent victims\u2014credential stuffing is relatively straightforward. You just take a set of user names and passwords that have leaked in previous breaches, throw them at a given service, and see which ones stick. Credential stuffing tools are readily available online that not only automate the process, but also make the login requests look legitimate\u2014sending them as trickles from multiple IP addresses rather than one suspicious, centrally located tsunami. And because people reuse passwords so frequently, it\u2019s not hard to get a significant number of matches. (Imagine you used the same key for your house, car, office, and gym locker. Once a robber makes a copy, they can break in anywhere.)<\/p>\n<p>Hackers certainly have no shortage of material to pull from. Look no further than the recent discovery of what\u2019s <a href=\"https:\/\/www.wired.com\/story\/collection-leak-usernames-passwords-billions\/\">known as Collections #1-5<\/a>, which made 2.2 billion user names and associated passwords freely available on hacker forums. The first batch alone <a href=\"https:\/\/www.wired.com\/story\/collection-one-breach-email-accounts-passwords\/\">had 773 million records<\/a>. It was effectively a breach of breaches, a compendium of data from large-scale hacks like those of LinkedIn, <a href=\"https:\/\/www.wired.com\/2016\/05\/hack-brief-old-myspace-account-just-came-back-haunt\/\">Myspace<\/a>, and <a href=\"https:\/\/www.wired.com\/2016\/12\/yahoo-hack-billion-users\/\">Yahoo<\/a>.<\/p>\n<p>The point isn\u2019t that hackers used that data specifically. It\u2019s that many of your user names and passwords have been compromised by now, and if you reuse them, you\u2019re setting yourself up for a headache. And even though some Disney+ users claim that they used a unique password, chances are they may have simply forgotten. \u201cIn my experience, many times when people have proclaimed the strength of their passwords, a bit of probing shows that\u2019s rarely the case,\u201d says Hunt. \u201cSo I\u2019d take those claims with a grain of salt.\u201d<\/p>\n<p>This doesn\u2019t exculpate Disney entirely. The company links the accounts for its multiple services together, so if you lose Disney+ you also lose access to Disney World Resorts, Disney Vacation Club, ESPN, and so on. That needlessly widens your potential exposure. And the company could take the extra step of <a href=\"https:\/\/www.wired.com\/story\/two-factor-authentication-apps-authy-google-authenticator\">providing two-factor authentication<\/a>, although other streaming services like Netflix don\u2019t currently offer that either. Similarly, Disney could throw up more impediments to the credential stuffing process in the first place.<\/p>\n<p>\u201cMost bad actors use scripts to perform credential stuffing attacks,\u201d says Ronnie Tokazowski, senior threat researcher with email security firm Agari. \u201cAdding something simple like captcha will help slow down or mitigate the login attempts by malicious actors.\u201d<\/p>\n<p>Like so many things, it comes down to security versus convenience. If you don&#x27;t want to wait for companies to act\u2014and let&#x27;s face it, you don&#x27;t\u2014take account security into your own hands and <a href=\"https:\/\/www.wired.com\/story\/best-password-managers\/\">use a password manager<\/a>. The initial setup can be a pain, but at least when you\u2019re done you have confidence that all of your passwords are both unique and tough to crack. Losing access to your accounts is an unnecessary annoyance, and while Disney says that <a href=\"https:\/\/www.wired.com\/story\/netflix-hulu-spotify-shared-account-freeloaders\/\">customer support<\/a> will help you reclaim it, you\u2019ve got better ways to spend your time.<\/p>\n<p>That\u2019s not to blame the victims. That\u2019s just the world we\u2019re stuck with for now. You might as well do what you can to make life as difficult as possible for the bad guys.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/disney-plus-hacks-credential-stuffing\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5dd58bba30ef2c0008e9e2b8\/master\/pass\/Security_Disneyplus-200406551-001.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Wed, 20 Nov 2019 20:02:13 +0000<\/strong><\/p>\n<p>Credential stuffing, where names and passwords leaked in previous breaches are reused, strikes again.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-16978","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16978"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16978\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}