6 Million Virgin Mobile Users Vulnerable To Brute-Force Attacks 80
An anonymous reader writes "'If you are one of the six million Virgin subscribers, you are at the whim of anyone who doesn't like you.' The Hacker News describes how the username and password system used by Virgin Mobile to let users access their account information is inherently weak and open to abuse." Computerworld also describes the problem: essentially, hard-coded, brute-force guessable passwords, coupled with an inadequate mechanism for reacting to failed attempts to log on.
Doesn't surprise me. (Score:3, Informative)
Re: (Score:2, Insightful)
Re:Doesn't surprise me. (Score:4, Interesting)
Re: (Score:3)
Re: (Score:2)
They probably got some CS undergrad to develop it for them for free.
Re: (Score:1)
A Computer Science department made this. Isn't that encouraging?
Those who can, do. Whose who can't, teach. Those who can't teach, manage.
Re: (Score:2)
The way passwords are handled in general is appalling - a major supermarket here in the UK emails you your password in plaintext if you say you forgot it. The fact they have it in plaintext is disgusting.
Out with it then. Name and shame.
Re: (Score:2)
Re: (Score:2)
Why do you have a password with your grocery store? For coupon offers? Online shopping? newsletters?
Re: (Score:2)
Re: (Score:2)
emails you your password in plaintext if you say you forgot it.
Ok, call me stupid, but what are the alternatives to sending the password as text in an email?
Also, what would be the best method?
The company I work for isn't very tech literate and could probably use some pointers.
Re: (Score:2)
what are the alternatives to sending the password as text in an email?
I am no expert in the field, but I would have thought that the password should be stored in salted and hashed, form. Anyone compromising that database gets a list of encrypted passwords — it does not help them determine the characters which need to be entered into the system to gain access, unless the algorithm and salt is compromised too.
Instead of sending the user a password, the user should be emailed a link to an online portal for creating a new password, which gets salted and hashed, and this
Re: (Score:3)
If you forget, you answer secret questions and a one-time password is emailed to your registered email address.
Re: (Score:3)
Ok, call me stupid, but what are the alternatives to sending the password as text in an email?
First, the password should not be stored on their servers as plain text in the first place. Salted hashed should.
Also, what would be the best method?
The company I work for isn't very tech literate and could probably use some pointers.
Back when I was developing something like this, the "best by consensus" thing was to send some kind of one time password. We generated these passwords like encrypt_with_company_current_private_key(USER_ID + TIMESTAMP + GIBBERISH). USER_ID allows you to identify the user, timestamp allows you to limit how long this thing can be used and GIBBERISH is just to add some noise (not sure it is helpful t
Re: (Score:2)
The basic idea is knowing your user's password is bad. The reality is users use the same passwords in multiple places, and if your site is comprimised in any way, you don't want to leak those passwords. Fortunately, we don't actually need to know the user's password - all we need to do is know if it's the same each time. This is where hashes come in - we store a hash (a one way function that gives us the same result each time for the same input, but doesn't tell you what the input was) of the password, and
Re: (Score:2)
The complaint isn't that they sent a password in email, the problem is that they send you your original password and to do that they must have it stored in plain text in the database.
The correct way to do it is store passwords as a hash and if you forget it, they set a temporary password and email that to you (or a password reset link).
Re: (Score:2)
Same in Uruguay. They changed their system a few years back, and when they changed it, the password for the new system was the same as the old one, truncated to 8 characters. Both systems allowed only certain characters, but at least the old one allowed me to have longer passwords.
Let me repeat in case the horror was not clear enough: they migrated the accounts to the new system, they reduced the maximum password length, and automatically set the passwords in the new system to the first 8 characters of the
Re: (Score:2)
I wish I had that, my CC company has a max of 6 characters.
I assume someone sent the design doc to the developer and mixed up MINIMUM and MAXIMUM.
Re: (Score:2)
I assume you meant pin?
This is for their online payment site.
Re: (Score:2)
You think that's sad? Go to their mobile phone account site [virginmobile.ca]. You know how you log in? Enter your phone number (public information), followed by a FOUR DIGIT PIN . Yes, I used bold, italic, and underlined for that. The ONLY thing standing between you and someone with your phone number being an asshole is, at most, 10,000 possible numbers. S
The Title (Score:2, Funny)
Its a shame we cant mod the title funny innit?
Virgins? (Score:5, Funny)
Re: (Score:2)
http://www.viruscomix.com/page462.html [viruscomix.com]
Re: (Score:2)
Re: (Score:2)
You know, those 72 virgins weren't female, right?
Re: (Score:2)
Doh!
Re: (Score:3)
Re: (Score:1)
They can keep their virginity after sex? How? Oral?
Re: (Score:1)
Re: (Score:2)
ill re-write that for ya
Agreed, if you rewrote it it would indeed be ill. Can't you fucking kids follow conventions for the sake of clear communications, or are you doing like Microsoft does and making up your own "standards"? Not capitalizing the "I" wasnt the only thing about the way you wrote your comment that made you look like a retarded ten year old.
Get your GED, kid, so you don't come across as such a moron.
Re: (Score:2)
You will not get any data that way.
Yes, you may DOS the phone, but what good does that do you?
Penetration Testing? (Score:5, Funny)
I would have thought that Virgin would be less vulnerable to penetration.
Re:Penetration Testing? (Score:4, Funny)
Re:Penetration Testing? (Score:5, Funny)
Like a Virgin,
Hacked for the very first time,
Like a Viiiiirgin
Feel your host ping
next tooooo miiiiine....
Re: (Score:2)
I expect that anything that is mobile is more difficult to penetrate... virgin or otherwise
Re: (Score:1)
I expect that anything that is mobile is more difficult to penetrate... virgin or otherwise
Although rolling donuts have often been targeted.
They used cookies (Score:3)
for failed login attempt checks. This can be bypassed simply by using a different cookie each time, and brute-forcing can take place.
They should've used an IP-based check maybe?
Re: (Score:2)
Their support line can tell if you are calling from one of their phones. They could just put an "unlock my account" button in their account maintainance menu on the phone.
Re: (Score:2)
yeah those are pretty common. But personally they annoy me because anyone can DOS your account.
This is what happened to me: somebody tried to log into my online game account (called MapleSEA) and failed multiple times, so my account got locked down automatically. I had to call them on the phone (they're located in Singapore) and try to convince them that I'm the real owner and that they should open my account again. Which was not easy because they wanted my national ID number, which I don't have because I'm
Re: (Score:1)
There is no need to permanently lock it. An hour would be enough.
Re: (Score:3)
Having been in the recesses of their website as a customer, this does not surprise me at all. The deeper past the front page you go, the more the whole thing has the feel of something somebody's cousin "who's good with computers" threw together.
This is fixed now (Score:4, Informative)
Re:This is fixed now (Score:4, Informative)
Re: (Score:2)
Virgin Penetration is Easy (Score:1)
Last time it was tried.
Re: (Score:2)
Re: (Score:2)
Yea, hooking up with someone who knows what they're doing is a good thing.
And it's a good thing that she knew what she was doing, cause I sure as hell didn't.
Re: (Score:3)
Last time it was tried.
Great in rehersal.
Security is a big problem in this industry (Score:1)
Re: (Score:2)
VM Not the Worst By Any Shot (Score:2)
Re: (Score:2)
Re: (Score:1)
A hundred times harder to brute force says it'll take 100 seconds rather than one. That's 100 times better right.
Re: (Score:2)
virgins? Brute force? (Score:1)
Where am i, is this not slashdot?
Re: (Score:2)
this is the NEW /. - Dice is digging (ha!) up new revenue sources
No way. They used strong password. (Score:1)
We're guessing, no one's got their phone numbers. (Score:2)
When asked about their vulnerability to brute force attacks, the six million people said, "This must be what the Slashdot people felt like in high school."
I figured that. (Score:1)
I guessed this when I first started using their service late last year. Your account "login" information is simply your real 10-digit phone number, and your "password" is just a 6-digit PIN. Everything you need to enter it is right there, on the numpad (with the exception of Tab). SMS spammers guess people's phone numbers and carriers to successfully send unwanted messages through e-mail; surely if they wanted to bad enough it wouldn't be too difficult to guess or do a brute-force attack on the six-digit
Confused (Score:1)
Isn't the entire modern world vulnerable to brute force attacks? Isn't that the definition of what to do when you can't reasonably narrow down the choices?
All Sprint users are vulnerable (Score:2)
To Sprint's horrendously bad network.