MyFitnessPal Data Breach

Breach: MyFitnessPal
Date of breach: 1 Feb 2018
Number of accounts: 143,606,147
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Description: In February 2018, the diet and exercise service MyFitnessPal suffered a data breach. The incident exposed 144 million unique email addresses alongside usernames, IP addresses and passwords stored as SHA-1 and bcrypt hashes (the former for earlier accounts, the latter for newer accounts). In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to “BenjaminBlue@exploit.im“.

I’ve Been Hacked – What To Do After You’ve Been Hacked

By Carter Graydon at Hacked.com

There’s nothing quite like that feeling of dread that slowly envelops you when you realize you’ve been backed. Regardless if it’s just your social media account or something as serious as your bank account or credit card, you can’t escape those first few moments of confusion, anger, and the overwhelming sense of fear. You don’t know how they got your information, what other accounts they’ve had access to, how long they’ve had access, and it’s terrifying. So I’ve come up with a checklist to help you protect yourself from further damage and begin the repairing process.

Do Not Panic

First off, breath. It might sound silly, but you need a clear head to proceed. Panic and fear will only lead to confusion. You can easily forget crucial steps you need to take or repeat ones and waste time.

Change your Passwords

Change your passwords, especially if you use the same password for multiple accounts. You should change your passwords once every 3-6 months. Consider using a password management software like LastPass or KeePass. In the future, set up two-factor authentication when possible.

Identity Theft? Notify Credit Agencies

If your personal information (such as social security number) has been compromised, notify the credit agencies (Equifax, Experian and TransUnion) and request a 90-day credit alert. Activating this tells businesses to contact you before any new account can be opened in your name. This alert can be renewed every 90 days. It can also stay in effect for seven years – so long as your identity has been stolen, and you’ve filed a report with the police.

The Federal Trade Commission also offers some excellent advice and includes details on how to get your life back after your identity has been stolen.

Monitor your Credit Card Bills

Monitor your credit card bills and double check any charges you don’t recognize. Criminals are known to make small charges to begin with, hoping they’ll go unnoticed, before running your card for something really big. If you see a charge you didn’t make, call the credit card company and alert them right away.

Close Accounts

If someone has already stolen your identity and opened an account, immediately contact the credit issuer and have the account closed. Dispute any charges that were made. Request your credit report from one of the three credit agencies and ask for any unauthorized accounts or incorrect information be removed from your record. This will help preserve your credit score.

Record Calls

Submit your report through the FTC website and keep copies of all your reports and correspondences with these agencies. Record everything, use certified mail and get delivery receipts. Most of the places you’ll need to call will have a notice, “This call may be recorded for quality assurance purposes”, but don’t rely on them for recording the conversation. Record the call yourself, but be sure to inform the person on the other end of the line that you are recording the call. Check your state for telephone recordings laws.

Check the Sent Folder in your Email

hack

Check your sent folder of your email and look for any messages that may have gone out that you didn’t send. Hackers might request personal information from banks or send viruses to your friends. If you see anything suspicious, contact the recipients and let them know.

If the hacker has gained access to your account and locked you out by changing the password, you’ll need to contact the email provider and prove you’re the rightful account holder. And remember, if you’ve used your email address and the same password for other websites, those are all compromised as well. Change those as fast as you can to beat them to the draw. Even if you don’t use the same password for those accounts, the hacker can still use the “forget my password” feature and have a new one email to them.

If you’re concerned, your computer may have a virus, avoid making online purchases until you have run comprehensive anti-virus and malware software. Some virus installs keyloggers on your computer, letting the hacker see every keystroke. Typing in your credit card information is all they would need.

First it was Marriott, now Quora has been Hacked…

100 million Quora users may have had their data accessed by an unauthorized third party. Quora is actively investigating the incident, and has already taken steps to improve its security.

What happened

On Friday we discovered that some user data was compromised by a third party who gained unauthorized access to one of our systems. We’re still investigating the precise causes and in addition to the work being conducted by our internal security teams, we have retained a leading digital forensics and security firm to assist us. We have also notified law enforcement officials.

While the investigation is still ongoing, we have already taken steps to contain the incident, and our efforts to protect our users and prevent this type of incident from happening in the future are our top priority as a company.

Read more on their blog here.

 

Marriott Data Breach and What You Need to Know

Marriott just announced a data breach that’s exposed sensitive customer info

Here’s what you need to know about the Marriott breach

·       Marriott International said its Starwood guest reservation database was breached, exposing the personal info of about 500 million customers.

·       Compromised data includes: Name, address, phone number, email address, passport number, Starwood Preferred Guest (“SPG”) account info, date of birth and more.

·       Some customers’ info also includes payment card numbers and expiration dates, but the payment card numbers were encrypted.

How to protect your info after this breach

To support you during this time, we’ve put together some guidelines to help you protect yourself:

·       Stay alert for new info. If you have been part of a data breach, the breached company may send you a notice. Retain all documents and consider any suggestions they may have. Also, pay attention to and retain any mail you receive that is unfamiliar to you, such as notices from the IRS regarding your taxes or any bills from unknown lenders.

·       Change your passwords on any accounts that may have been breached and remember to use unique passwords across different accounts.

·       Keep an eye on your financial accounts online and set up any alert features they may have. This could help save time and keep you notified of any unusual events if they occur.

·       Monitor your credit and identity by checking your credit reports at each of the 3 credit bureaus for free once every 12 months. Look for unusual activity, such as new accounts, personal info or inquiries.

The SecurityOrb Show – An Interview with Dr. Elizabeth Milovidov, Esq. founder of DigitalParentingCoach.com. – 11/27/2018

I had the opportunity to speak with Dr. Elizabeth Milovidov, Esq. founder of DigitalParentingCoach.com about Internet Safety.

Listen to what Dr. Milovidov has to say here:

 

Elizabeth Milovidov is an American lawyer, a French law professor and a European eSafety consultant. She founded Digital Parenting Coach and provides support to governments and associations.

From 2014-2016, she consulted for European Schoolnet, a European consortium of 30 Education Ministries on several internet-related projects, including the ENABLE (the European Network Against Bullying in Learning and Leisure Environments) project and 2017-2018 she helped create the e-Salama national child online protection plan in Morocco. Currently, she is consulting for the Digital Society division of the Ministry of Transport and Communication, Qatar.

She provides support to EU Kids Online, Internet Matters, UK Safer Internet Centre, Family Online Safety institute, DigiLitEY and many other key actors in online child protection. She is a frequent guest on France 24 where she shares digital parenting tips and strategies.

She regularly intervenes as an independent expert on Children’s Rights and the Internet and Digital Parenting for the Council of Europe and is currently an Expert Working Group member on Digital Citizenship Education as well as a member of the Drafting Group of Specialists on Children and the Digital Environment.

She has several publications on parenting in the digital age available on Amazon and co-wrote the Internet Literacy Handbook for the Council of Europe. She is an international speaker on Internet safety issues, leads parental workshops, writes on digital parenting, and coaches parents on best practices in the digital age through her website www.digitalparentingcoach.com and Facebook Group, The Digital Parenting Community.

A graduate of UCLA and UC Davis, she practiced as a litigator in California for four years before moving to France to work as General Counsel in two Internet Technology companies. She earned a Ph.D. in International Relations and Diplomacy from the American Graduate School (AGS) in Paris (dissertation: international adoption via Internet and photo listings).

She is an Assistant Professor at AGS and a lecturer at several universities in France and Geneva and specializes in Law and Technology (ISCOM, Paris), Intellectual Property and Internet Law (INSEEC, Paris) and Children’s Rights and the Internet (University of Geneva, Geneva).

 

CVE-2018-15454 (Cisco SIP) Exploit Information

IB-18-20248-CVE-2018-15454 Exploit Attempts Against Government Facilities Sector

TLP: AMBER

Department of Homeland Security

NCCIC US-CERT

Reference Number: IB-18-20248

Report Date: 2018-11-15T22:19:01+00:00

 

Notification:

 

DISCLAIMER: This report is provided “as is” for informational purposes only. The

Department of Homeland Security (DHS) does not provide any warranties of any

kind regarding any information contained within. The DHS does not endorse any

commercial product or service, referenced in this bulletin or otherwise. This

document is distributed as TLP:AMBER: Limited disclosure, restricted to

participants’ organizations. Recipients may only use TLP:AMBER information with

members of their own organization, and with clients or customers who need to

know the information to protect themselves or prevent further harm. For more

information on the Traffic Light Protocol, see http://www.us-cert.gov/tlp.

 

Summary:

 

From October 2018, NCCIC analysts have observed network traffic indicating

attempts, by unknown actors against multiple government agencies, to exploit a

vulnerability [CVE-2018-15454] in the Session Initiation Protocol (SIP)

inspection engine of Cisco ASA Software and Cisco FTD Software. This

vulnerability could allow an unauthenticated, remote attacker to cause an

affected device to reload or trigger high CPU usage, resulting in a DoS

condition.

 

The vulnerability is due to improper handling of SIP traffic and affects Cisco

ASA Software Release 9.4 and later and Cisco FTD Software Release 6.0 and later

if SIP inspection is enabled (ENABLED BY DEFAULT). An attacker could exploit

this vulnerability by sending SIP requests designed to specifically trigger this

issue at a high rate on any of the following Cisco products:

 

– 3000 Series Industrial Security Appliance (ISA)

– ASA 5500-X Series Next-Generation Firewalls

– ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600

Series Routers

– Adaptive Security Virtual Appliance (ASAv)

– Firepower 2100 Series Security Appliance

– Firepower 4100 Series Security Appliance

– Firepower 9300 ASA Security Module

– FTD Virtual (FTDv)

 

This activity was observed in the Government Facilities Sector.

 

Analysis:

 

Host

IPv4: 46.249.59.196

Sighted: 2018-10-19 [only single sightings used]

Killchain Phase: Exploitation

Characterization: IP Watchlist

Notes: NCCIC analysts have observed network traffic from this IP address,

related to attempts by unknown actors against multiple government

agencies, to exploit a vulnerability [CVE-2018-15454] in the Session

Initiation Protocol (SIP) inspection engine of Cisco ASA Software and

Cisco FTD Software. This vulnerability could allow an unauthenticated,

remote attacker to cause an affected device to reload or trigger high

CPU usage, resulting in a DoS condition.

 

Attempted scanning/exploit activity will be over port 5060 and will

show a large number of incomplete SIP connections while the

vulnerability is actively being exploited.

 

Open source research indicates this IP is geolocated in the Netherlands

[ASN: AS50673]. Reporting by security vendors indicate this IP has been

involved in scanning, brute force attempts, and other malicious network

activity.

 

Host

IPv4: 5.62.63.223

Sighted: 2018-10-19 [only single sightings used]

Killchain Phase: Exploitation

Characterization: IP Watchlist

Notes: NCCIC analysts have observed network traffic from this IP address,

related to attempts by unknown actors against multiple government

agencies, to exploit a vulnerability [CVE-2018-15454] in the Session

Initiation Protocol (SIP) inspection engine of Cisco ASA Software and

Cisco FTD Software. This vulnerability could allow an unauthenticated,

remote attacker to cause an affected device to reload or trigger high

CPU usage, resulting in a DoS condition.

 

Attempted scanning/exploit activity will be over port 5060 and will

show a large number of incomplete SIP connections while the

vulnerability is actively being exploited.

 

Open source research indicates this IP has a point-of-presence (PoP) in

the United Kingdom [ASN: AS198605] and virtual PoP in the United

States. Reporting by security vendors indicate this IP has been

involved in scanning, brute force attempts, and other malicious network

activity.

 

Host

IPv4: 212.129.19.40

Sighted: 2018-10-19 [only single sightings used]

Killchain Phase: Exploitation

Characterization: IP Watchlist

Notes: NCCIC analysts have observed network traffic from this IP address,

related to attempts by unknown actors against multiple government

agencies, to exploit a vulnerability [CVE-2018-15454] in the Session

Initiation Protocol (SIP) inspection engine of Cisco ASA Software and

Cisco FTD Software. This vulnerability could allow an unauthenticated,

remote attacker to cause an affected device to reload or trigger high

CPU usage, resulting in a DoS condition.

 

Attempted scanning or exploit activity can be observed over port 5060

and shows a large number of incomplete SIP connections while the

vulnerability is actively being exploited.

 

Open source research indicates this IP is geolocated in France [ASN:

AS12876]. Reporting by security vendors indicate this IP has been

involved in scanning, brute force attempts, and other malicious network

activity.