A 'Ridiculously Weak' Password Causes Disaster for Spain's No. 2 Mobile Carrier (arstechnica.com) 26
Orange Espana, Spain's second-biggest mobile operator, suffered a major outage on Wednesday after an unknown party obtained a "ridiculously weak" password and used it to access an account for managing the global routing table that controls which networks deliver the company's Internet traffic, researchers said. From a report: The hijacking began around 9:28 Coordinated Universal Time (about 2:28 Pacific time) when the party logged into Orange's RIPE NCC account using the password "ripeadmin" (minus the quotation marks). The RIPE Network Coordination Center is one of five Regional Internet Registries, which are responsible for managing and allocating IP addresses to Internet service providers, telecommunication organizations, and companies that manage their own network infrastructure. RIPE serves 75 countries in Europe, the Middle East, and Central Asia.
The password came to light after the party, using the moniker Snow, posted an image to social media that showed the orange.es email address associated with the RIPE account. RIPE said it's working on ways to beef up account security. Security firm Hudson Rock plugged the email address into a database it maintains to track credentials for sale in online bazaars. In a post, the security firm said the username and "ridiculously weak" password were harvested by information-stealing malware that had been installed on an Orange computer since September. The password was then made available for sale on an infostealer marketplace.
The password came to light after the party, using the moniker Snow, posted an image to social media that showed the orange.es email address associated with the RIPE account. RIPE said it's working on ways to beef up account security. Security firm Hudson Rock plugged the email address into a database it maintains to track credentials for sale in online bazaars. In a post, the security firm said the username and "ridiculously weak" password were harvested by information-stealing malware that had been installed on an Orange computer since September. The password was then made available for sale on an infostealer marketplace.
they needed malware to find that password? (Score:2)
they needed malware to find that password?
Re: (Score:3)
Re: (Score:2)
no, they got the password thanks to malware, it was later revealed by a third party that the password was leaked and actually weak.
don't get confused by clickbaity headlines: the weakness of the password did not cause this breach.
Re: (Score:2)
don't get confused by clickbaity headlines: the weakness of the password did not cause this breach.
So the headline is not clickbaity, it is just plain wrong.
Re: (Score:2)
it's both, and that's not a rare occurrence at all. actually, being wrong is a normal consequence of producing click-bait, because the priority becomes getting attention, not conveying useful information in a very compact form.
Beef up security (Score:2)
RIPE said it's working on ways to beef up account security
Hmmm, yeah, that's a tough one. They are going to have to pay some brainiacs big consulting dollars to figure this one out.
Re: (Score:2)
Re: (Score:2)
Ridiculously weak? (Score:3)
Clearly these folks don't know a thing about secure passwords. The lock to my luggage is more secure. It's the unbreakable 1-2-3-4-5. No one could ever guess it.
Re: Ridiculously weak? (Score:2)
Amazing! I have the exact same combination on MY luggage!
Re: (Score:3)
Re: (Score:2)
I set mine to 9-9-9-9-9. I found my luggage thief by getting a list of people who purchased Advil the day after it got stolen.
Re: (Score:2)
https://www.youtube.com/watch?... [youtube.com]
Spaceballs FTW!
RIPE (Score:4, Insightful)
Only getting worse (Score:3)
Reminds me of some startups (Score:2)
Hudson Rock (Score:2)
Security firm Hudson Rock plugged the email address into a database it maintains
I sure hope Hudson Rock aids ripe so this rather queer access violation never again penetrates so deep in the closet where ripe keeps their servers.
Bad Headline (Score:2)
The "ridiculously weak" password didn't cause disaster, the malware did:
In a post, the security firm said the username and "ridiculously weak" password were harvested by information-stealing malware that had been installed on an Orange computer since September.
You should still have good passwords, but they won't save you if your password is stolen. That is the whole point of 2 factor authentication.
What could possibly go wrong by publishing that? (Score:2)
using the password "ripeadmin" (minus the quotation marks)
Anybody stupid enough to use such a weak password is also stupid enough to not change it. Anyone want to test my theory?
Password has been changed (Score:2)
Re: Password has been changed (Score:1)
Malware Just Harvesting Ripe Admins (Score:1)