{"id":4719,"date":"2014-08-14T10:56:54","date_gmt":"2014-08-14T14:56:54","guid":{"rendered":"http:\/\/www.digitalbrandinsider.com\/?p=4719"},"modified":"2019-12-12T12:06:09","modified_gmt":"2019-12-12T17:06:09","slug":"cybervor-attack-how-bad-is-it","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/","title":{"rendered":"CyberVor attack:  How bad is it?"},"content":{"rendered":"<p>The New York Times recently reported on a data breach originally identified by US security firm Hold Security which revealed:<\/p>\n<ul>\n<li>How 4.5 billion records have been compromised<\/li>\n<li>1.2 billion appear to be unique users<\/li>\n<li>The list includes more than 500 million email addresses<\/li>\n<li>The haul appears to have come from over 420,000 compromised websites<\/li>\n<\/ul>\n<p><!--more--><\/p>\n<p>They\u2019ve called this CyberVor (\u2018vor\u2019 being the Russian word for thief). The situation is still evolving, but here\u2019s what we know.<\/p>\n<p><strong>How might this have happened?<\/strong><br \/>\n<strong><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/08\/Cybercrime_200w.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-4721\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/08\/Cybercrime_200w.jpg\" alt=\"Cybercrime_200w\" width=\"200\" height=\"124\"\/><\/a><\/strong>The first batch of compromised accounts seems to be from normal trade on the black market of compromised credentials. Spam emails then directed victims to sites containing malware, with infected machines using vulnerabilities in the SQL databases of websites subsequently visited to gain dumps of databases. Repeating this cycle allowed the group to gain a very large collection of stolen user data.<\/p>\n<p><strong>What exactly does the CyberVor gang have?<\/strong><br \/>\nHold Security hasn\u2019t revealed what exactly the criminal gang has put together, but we expect that the CyberVor range now has a large collection of user names, email addresses, and hashed passwords. A password hash looks like the following:<\/p>\n<p>6367c48dd193d56ea7b0baad25b19455e529f5ee<\/p>\n<p>Most organizations use hash algorithms that are hard to reverse engineer. When the genuine user tries to gain entry, if the password matches the hash stored in the database, access is granted. If the entered password does not produce a matching hash, entry is denied. Such hashed algorithms are a defense against attacks like the CyberVor. Even if the criminal gang has a large list of user names, they generally only have hashed passwords, which are of little value unless they can be reverse engineered. However, account usernames and email addresses do have a value themselves as they can be used for future attacks.<\/p>\n<p><strong>Should you be concerned?<\/strong><br \/>\nIf a cybercriminal knows the hash algorithm, it will be easy for them to use a dictionary and compare hash outputs to the ones gathered from stolen databases to reverse engineer your password. Thankfully, most companies use a technique called \u201csalting\u201d (a random string inserted within the hash) to further complicate the hashed password. This means that the salt makes the hashing algorithm stronger still. Even if multiple users have the same password, such as \u201cabc123\u201d, the hash values will be unique. Cybercriminals won\u2019t be able to reverse the hash into the actual password using a standard dictionary attack, unless they know specifically where the salt is within the string.<\/p>\n<p>We should also consider what types of sites were compromised in this attack. If most passwords came from rather benign websites, such as online news sites or sites that contain no financial details, there is not much to worry about. However, if the comprised sites include major financial institutions, government sites, major social media sites, or domain name registrars, the situation is much more serious.<\/p>\n<p><strong>CSC recommends<\/strong><br \/>\nTo be safe, change your passwords if you use the same password for multiple sites (a practice not recommended by CSC), or even better, start using the two-factor authentication that many sites allow. &nbsp;In addition to your user name and password, this means you\u2019ll need some additional means of authentication to get access. It could be something as simple as IP address validation which CSC also offers (checking to see what IP address the login is coming from and maintaining a list of permitted IP addresses). Other possible forms of two-factor authentication include physical tokens (usually a key fob or small device that generates a unique numerical string on some briefly recurring frequency), or virtual tokens such as those offered by Google, Facebook, RSA and Symantec.<\/p>\n<p>We continue to monitor the situation and liaise with our security partners.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The New York Times recently reported on a data breach originally identified by US security firm Hold Security which revealed: How 4.5 billion records have been compromised 1.2 billion appear to be unique users The list includes more than 500 million email addresses The haul appears to have come from over 420,000 compromised websites<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[171,167],"tags":[],"class_list":["post-4719","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-internet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CyberVor attack: How bad is it? | CSC<\/title>\n<meta name=\"description\" content=\"The New York Times recently reported on a data breach originally identified by US security firm Hold Security which revealed: How 4.5 billion records have\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberVor attack: How bad is it? | CSC\" \/>\n<meta property=\"og:description\" content=\"The New York Times recently reported on a data breach originally identified by US security firm Hold Security which revealed: How 4.5 billion records have\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-14T14:56:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-12T17:06:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/08\/Cybercrime_200w.jpg\" \/>\n<meta name=\"author\" content=\"CSC Digital Brand Services\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CSC Digital Brand Services\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/\"},\"author\":{\"name\":\"CSC Digital Brand Services\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/287f596645b34f3ea2b2d7e11d990868\"},\"headline\":\"CyberVor attack: How bad is it?\",\"datePublished\":\"2014-08-14T14:56:54+00:00\",\"dateModified\":\"2019-12-12T17:06:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/\"},\"wordCount\":629,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/Cybercrime_200w.jpg\",\"articleSection\":[\"Cyber security\",\"Internet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/\",\"name\":\"CyberVor attack: How bad is it? | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/Cybercrime_200w.jpg\",\"datePublished\":\"2014-08-14T14:56:54+00:00\",\"dateModified\":\"2019-12-12T17:06:09+00:00\",\"description\":\"The New York Times recently reported on a data breach originally identified by US security firm Hold Security which revealed: How 4.5 billion records have\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/Cybercrime_200w.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/08\\\/Cybercrime_200w.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cybervor-attack-how-bad-is-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberVor attack: How bad is it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/287f596645b34f3ea2b2d7e11d990868\",\"name\":\"CSC Digital Brand Services\",\"sameAs\":[\"https:\\\/\\\/cscdigitalbrand.services\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CyberVor attack: How bad is it? | CSC","description":"The New York Times recently reported on a data breach originally identified by US security firm Hold Security which revealed: How 4.5 billion records have","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/","og_locale":"en_US","og_type":"article","og_title":"CyberVor attack: How bad is it? | CSC","og_description":"The New York Times recently reported on a data breach originally identified by US security firm Hold Security which revealed: How 4.5 billion records have","og_url":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2014-08-14T14:56:54+00:00","article_modified_time":"2019-12-12T17:06:09+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/08\/Cybercrime_200w.jpg","type":"","width":"","height":""}],"author":"CSC Digital Brand Services","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"CSC Digital Brand Services","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/"},"author":{"name":"CSC Digital Brand Services","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/287f596645b34f3ea2b2d7e11d990868"},"headline":"CyberVor attack: How bad is it?","datePublished":"2014-08-14T14:56:54+00:00","dateModified":"2019-12-12T17:06:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/"},"wordCount":629,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/08\/Cybercrime_200w.jpg","articleSection":["Cyber security","Internet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/","url":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/","name":"CyberVor attack: How bad is it? | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/08\/Cybercrime_200w.jpg","datePublished":"2014-08-14T14:56:54+00:00","dateModified":"2019-12-12T17:06:09+00:00","description":"The New York Times recently reported on a data breach originally identified by US security firm Hold Security which revealed: How 4.5 billion records have","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/08\/Cybercrime_200w.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/08\/Cybercrime_200w.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/cybervor-attack-how-bad-is-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CyberVor attack: How bad is it?"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/287f596645b34f3ea2b2d7e11d990868","name":"CSC Digital Brand Services","sameAs":["https:\/\/cscdigitalbrand.services\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/4719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=4719"}],"version-history":[{"count":5,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/4719\/revisions"}],"predecessor-version":[{"id":8506,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/4719\/revisions\/8506"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=4719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=4719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=4719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}