plaintext passwords
They should lose their business license for this. Back when I was a wet-behind-the-ears web developer building apps on the production server I knew not to do something like this.
Submitted 9 months ago by Zen@biglemmowski.win to technology@lemmy.world
https://www.hackread.com/us-credit-union-service-plain-text-passwords-data-leak/
plaintext passwords
They should lose their business license for this. Back when I was a wet-behind-the-ears web developer building apps on the production server I knew not to do something like this.
Sigh, here we go again
RememberTheApollo@lemmy.world 9 months ago
Let’s clarify this title a little. White hat hacker found a way to see the poorly secured database containing said info. It hasn’t been stolen or found on the web, so it wasn’t “leaked” publicly in the sense that it was deliberately made available.
InformalTrifle@lemmy.world 9 months ago
Still, 2024 and they’re storing plaintext passwords?
ImplyingImplications@lemmy.ca 9 months ago
I once had a professional licence that required me to register a whole bunch of personal info to a government website. I used a password generator to create a 32 character password when creating my account.
I tried to login after creating my account but my password wouldn’t work. I hit “forgot my password” and got my password emailed to me in plain text. That alone was worrisome but then I realized my password wasnt working because they truncated it to 8 characters, which I’m assuming is the maximum password length.
I emailed their tech support about my concerns and they emailed back asking if I needed help to login. I said no, I had concerns over security and I never got a reply back. Every few months I’d hit “forgot my password” to see if anything changed. I always got my password emailed to me in plaintext.
RememberTheApollo@lemmy.world 9 months ago
As many times as it’s come out that some service stored passwords as plaintext you’d think people would learn. People should be fired for this, unfortunately it would probably be the wrong ones.
Spotlight7573@lemmy.world 9 months ago
They’re downplaying their responsibility and the problem while taking a negative tone about the white hat (bold added):
cuinsight.com/…/cu-solutions-group-issues-stateme…
And of course, the obligatory ‘we have an excellent security team, everyone faces threats, you can’t blame us’:
Potatos_are_not_friends@lemmy.world 9 months ago
As a non-participating visitor of security forums (which bleed into malicious hackers), I am looking forward to the popcorn.
Right now, my job post bug bounties and hackers pen test. And there’s a LOT of money flowing around in that space. A company’s reputation to honoring the agreement is also sacred. Because if we fail to pay or refuse to accept the bug too much, and the next time there’s a vulnerability, it won’t be reported, but abused.
CUSG just signalled that they are pieces of shit to the hacker community. And I’m gonna bet they are going to get some serious shit now.
🍿
Moosemouse@lemmy.sdf.org 9 months ago
They aren’t sure yet if someone else found it first. If a smart person found it first they could sell it piecemeal to make it harder to know where it came from. Each identity isn’t worth much but that’s a lot. Combine that with the password stuffing capability from a plain text password list and there’s…
If you ever, ever store passwords in plain text instead of hashed and salted your business should be shut down. Thats below even Security 101 level, and shows a critical carelessness for user data.
When we’re find things like this, unless we have exact audit logs proving there was no misuse, we assume it was misused because that’s the only sane way to do it.
If it turns out they have excellent logging (hah) maybe they can prove it, let’s hope so for the affected people’s sake.
swayevenly@lemm.ee 9 months ago
Can’t find the words to describe how bad that title is…