Tag Archive for Passwords

Passwords: Don’t Make These Mistakes to Stay Safe

Passwords: Don’t Make These Mistakes to Stay SafeIn 2023, over 1.7 billion passwords were compromised. This number is over five times the population of the United States or an average of over 46,000 passwords per minute. Compromised records refer to personal data, such as passwords, that have been stolen or leaked, often through data breaches or hacking attacks. Chances are good that some of your credentials are out there. These compromised records often end up on the dark web. The dark web, a hidden part of the internet accessible only through specialized software, is known for its anonymity and is often used for illegal activities. Hackers use the dark web to buy, sell, trade, or steal data, as seen in the recent Rockyou2024 data leak. This makes it a popular marketplace for hackers to acquire compromised passwords and other sensitive information. Once hackers have the data, they engage in a process of guessing, information gathering, and tricking to commit identity theft. Each phase is designed to exploit the data that the attackers already possess.

The hackers try to guess your password

Don't Be Hacked! Avoid These Password MistakesHackers can launch a brute-force attack with just an email address. A brute force attack is an automated, trial-and-error method known as “password spraying.” In password spraying, a cyber attacker tries common passwords across many accounts, avoiding account lockouts and remaining undetected. For hackers, a list of passwords is merely a starting point. Bad actors employ a variety of tactics to decipher your credentials.

They try sequential number combinations – Hackers often try sequential number combinations. As the table below shows, most passwords share a common feature: sequential numbers, such as 12345. Avoid using these in your passwords as they make them predictable and easy to guess

NordPass top 5 worst passwords 2019 - 2023

20192020202120222023
0112345123456123456password123456
02123456123456789123456789123456admin
03123456789picture11234512345678912345678
04test1passwordqwertyguest123456789
05password12345678passwordqwerty1234
NordPass

Using sequential numbers is also a bad idea for the four-digit PIN of your debit card.

They guess common phrases – Hackers often guess common phrases. Therefore, avoid using common words or phrases. Common words or phrases in passwords are predictable and can be easily cracked. While they may be easy for you to remember, they are also among the first passwords that hackers will guess.

In lists of the most common passwords, the word “password” has consistently been in the top 10 for the past five years. Phrases such as “Admin,” “iloveyou,” “qwerty,” and “guest” frequently appear in the top 25.

substitutions in passwordsThey look for substitutions – Hackers often look for substitutions. Using common words with case and numerical substitutions in a password is risky. Attackers frequently use dictionary attacks. Dictionary attacks occur when the bad guys attempt common words, phrases, and predictable substitutions. Attackers often use common words with case and numerical substitutions, such as ‘4’ for ‘A,’ ‘3’ for ‘E,’ ‘1’ for ‘I,’ and ‘0’ for ‘O’.” Therefore, even with these substitutions, your password could still be relatively easy to crack. For example, they will try “password,” “Password,” “Pa$$word,” and “Passw0rd” too.

Next they gather information

They try pet and family names – Hackers often try pet and family names. In your passwords, do not use easily guessable information such as your pet’s, child’s, or spouse’s name. Bing warns that this kind of personal information can often be found on social media or through other means. This makes it easier for someone to guess your password. An attacker who has obtained some of your personal information may also check your family’s accounts to try to access your records.

They use significant dates – Hackers often use significant dates. Just like family names, it’s not good to use significant dates such as a birthday, anniversary, or a loved one’s birthday as passwords. These dates are easy to guess because they are memorable. Hackers can easily guess or discover special dates through social media. Hackers can also figure them out quite easily if they have access to your personal information.

Hackers try to trick you into giving them your passwords

trick you into giving them your passwordThey go phishing – Hackers often go phishing. Phishing is one of the easiest ways for attackers to obtain your credentials. They send out bogus emails disguised as legitimate ones. Malicious actors send phishing emails to trick you into revealing personal information (such as passwords and credit card numbers) through fake emails or websites.

Clicking on a phishing email will redirect you to a fake website. Once there, they will capture your user ID and password. Therefore, don’t open emails from unknown sources.

Job phishingJob phishing is a scam that takes advantage of the unemployed or those looking to change jobs. Job scammers may send emails or create fake job listings that require applicants to provide personal information or pay fees upfront. Be wary of job offers that seem too good or ask for sensitive information before an interview.

Hackers often use password reset questions – Have you ever registered your username and password with a company for tech support or some swag? And then later, did you receive an email asking if you requested a password change, even though you didn’t? It was probably a hacker.

Cybercriminals can use your password reset questions to change your password and lock you out of your account. For instance, if you suddenly find yourself unable to access your Facebook account, you may have been hacked.

One way to prevent this is by providing nonsensical answers to security questions. Instead of providing accurate information, provide quirky responses that only you would know. The next time your account asks where you were born, You could say Butterfly.

SPAM BotsThey create bots –If they have exhausted their resources, hackers have one final tool to break your code. They can create a bot. A phishing bot is a program that automatically sends fake emails or messages to trick people into revealing personal information. The bot can try every possible combination of user ID and password. Modern computers can be very fast at guessing passwords. Here’s a breakdown:

  • Faster guesses for simpler passwords: Hackers can very quickly try millions of simple passwords (like “password123”).
  • Slower guesses for stronger passwords: More complex passwords with a mix of uppercase and lowercase letters, numbers, and symbols take much longer to crack.

rb-

The key is to make it as difficult as possible for hackers by using strong passwords. Even with powerful computers, a strong password can take years to crack.

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.

Massive Data Leak Exposes 10 Billion Unencrypted Passwords

Massive Data Leak Exposes 10 Billion Unencrypted PasswordsOn July 4, 2024, a record-setting data leak occurred. “Cybernews” reports that nearly 10 billion unique passwords were posted to the dark-web. The staggering 9,948,575,739 unique passwords are a mix of old and new data breaches. Listed in a hacker forum as rockyou2024.txt, these passwords were in plaintext. ‘Plaintext’ means that these passwords are not encrypted – they are actual passwords, released in a text file.

updated the older file with 1.5 billion passwordsAccording to the hacker, the new release is based on RockYou2021’s 8.4 billion records from 2021. Specifically, the hacker updated the older file with 1.5 billion passwords obtained between 2021 and 2024. “Cybernews” explains that the RockYou2021 compilation was an expansion of a data leak from a 2009 leak which included tens of millions of user passwords for social media accounts.

The hacker posted  “I updated rockyou21 with collected new data from recent leaked databases in various forums over this and last years.” Estimates suggest that the RockYou2024 file contains entries from 4,000 large databases of stolen credentials, spanning at least 20 years.

Data leak can target any system

data leak can target any systemImportantly, this data leak can target any system. The author believes that attackers can utilize the ten-billion-strong RockYou2024 compilation to target any system that isn’t protected against brute-force attacks. This includes everything from online and offline services to internet-facing cameras and industrial hardware.

“Cybernews” describes the RockYou2024 data leak file as “a mix of old and new data breaches,” indicating it may not be a new breach of 10 billion passwords. Nonetheless, compiling all these passwords into one massive, searchable database, they warn, “substantially heightens the risk of credential stuffing attacks.

Data breach enables attacks

How Attackers Access Your Accounts Using Credential StuffingCredential stuffing occurs when hackers use automated scripts to try various combinations of stolen usernames and passwords from different data breaches to hijack people’s accounts. For instance, someone might use a password obtained from the AT&T breach to see if you use the same password for your bank account.

To check if your passwords are compromised, visit these websites:

RB-

The RockYou2024 data leak list is new, so at the time of this writing, it’s unclear if any private data has been compromised as a direct result of this compilation. Anyone using online services should assume their passwords could be on this list.

In the meantime, don’t freakout about RockYou2024. Experts recommend:

  1. Continue your activities while adhering to password best practices, such as regularly changing passwords.
  2. Set up a password manager.
  3. Enable MFA wherever possible.

Related article

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005. You can follow me on Facebook. Email the Bach Seat here.

Why Are We Still Using Bad Passwords

Why Are We Still Using Bad Passwords in 2023Why Are We Still Using Bad Passwords? 123456 is the worst password of 2023. Users have chosen 123456 on more than 23 million breached accounts, even though it takes less than a second to crack. NordPass, the sponsor of the paper, claims that the popularity of 123456 has made it the #1 cracked password for 3 of the last 5 years. In 2019, 12345 from “Spaceballs” overtook it, and “password” did the same in 2022.

Stop watchOnly 2 of 2023’s top 25 passwords will resist an attacker for more than 10 seconds. The 17th most common password, “admin123”, can withstand cracking attempts for a whole 11 seconds. The most secure password in the top 25, “Pass@123”, can fend off an attack for 5 minutes.

NordPass 25 worst passwords 2019 - 2023

20192020202120222023
0112345123456123456password123456
02123456123456789123456789123456admin
03123456789picture11234512345678912345678
04test1passwordqwertyguest123456789
05password12345678passwordqwerty1234
0612345678111111123456781234567812345
07zinch123123111111111111password
08g_czechout1234512312312345123
09adst12345678901234567890col123456Aa12345
10qwertysenha12345671231231234567890
1112345678901234567qwerty12312345671234567
121234567qwerty0000001234123123
13Aa123456.abc1231q2w3e1234567890111111
14iloveyouMillion2aa12345678000000Password
151234000000abc12355555512345678910
16abc1231234password1666666000000
17111111iloveyou1234123321admin123
18123123aaron431qwertyuiop6543211111
19dubsmashpassword11233217777777'P@ssw0rd
20test1qqww1122password123123root
21princess1231q2w3e4r5tD1lakiss654321
22qwertyuiopompopiloveyou777777qwerty
23sunshine123321654321110jp110jp'Pass@123
24BvtTest1236543216666661111112233
2511111qwertyuiop987654321987654321102030
Nordpass

How can I keep my passwords safe?

Your password should have at least 12 characters

Your password should have at least 12 charactersA longer password with more characters is better. It gives a hacker more combinations to try. Some sites may require a certain number of characters in your password, but generally, a password with at least 12 characters is a safe bet.

Use numbers, symbols, uppercase and lowercase letters

The more variety you have, the better. Be sure to include numbers, symbols, capital, and lowercase letters. Make everything as random as possible to keep the hackers out. For example, a password like ‘S#w%i&n(g967’ would be much more difficult to crack than ‘swing967.’

Avoid dictionary words

Avoid dictionary wordsAvoid using any single word as a password. It’s too easy for a hacker to take one lucky guess from a common dictionary, like ‘dog’ or ‘banana.’ Even a password like ‘freeride’, which combines two dictionary words, is too simple.

Don’t use substitutions

Avoid replacing letters with common symbols, it can weaken your password. For example, if you want to use the word ‘lucky’ but instead write it as ‘1ucky.’ It’s too obvious because the 1 and the letter L look too similar.

Choose a passkey over a password

Whenever possible, opt for passkeys instead of passwords. Passkeys, which are unique codes tied to your device, offer more security and are less prone to breaches. Companies such as Amazon, Apple, Google, and Microsoft are increasingly supporting passkeys as a safer alternative.

rb-

We should approach NordPass’ findings with caution due to their unclear methodology. They are not very transparent about their methodology. The presser said the passwords were “compiled in partnership with independent researchers specializing in researching cybersecurity incidents. They evaluated a 4.3TB database extracted from various publicly available sources…”

There are some suspicious trends in the Nordpass’s data. English words make up all of the top 25 recognizable passwords. Quite a feat for over 24 billion credentials breached since 2016. Many other are numerical strings or the result of typing nearby keys on a QWERTY keyboard. Despite these issues, the report makes for interesting geek reading.

Related article

Ralph Bach has been in IT for a while and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow me on Facebook. Email the Bach Seat here.

Creating Strong Passwords is Good For You

Creating Strong Passwords is Good For YouYou can buy a small padlock for less than a dollar—but you shouldn’t count on it to protect anything of value. A thief could pick a cheap lock without much effort, or break it. Yet, many people use weak passwords. They use them to “lock up” their most valuable assets, such as money and secrets. Fortunately, everyone can learn how to make and manage stronger passwords. It’s an easy way to strengthen security both at work and at home.

What makes passwords ‘Strong’?

What makes passwords ‘Strong’?We all hate the dreaded “you must change your password” email from IT. It must be at least 12 characters long. It must include numbers, symbols, and upper- and lowercase letters. You think of a word you can remember, capitalize the first letter, add a digit, and end with an exclamation point. The result: Strawberry1!

Unfortunately, hackers have advanced tools. They can easily defeat passwords based on dictionary words. These are words like “strawberry” and common patterns. An example is capitalizing the first letter.

Increasing the complexity, randomness, and length of a password makes it stronger. These changes make it more resistant to hackers’ tools. You can see in the table below from MyITRisk.com. An attacker could guess an eight-character password in 8 seconds. But, a 12-character password would take four years to guess.

Password space charactersLength required charactersDefeted in.
26 (a-z)8.0077 Seconds
52 (a-z, A-Z)82 Seconds
62 (a-z, A-Z, 0-9)88 Seconds
26 (a-z)1259 Minutes
52 (a-z, A-Z)12168 Days
62 (a-z, A-Z, 0-9)124 Years
26 (a-z)1651 Years
52 (a-z, A-Z)1691 Years
62 (a-z, A-Z, 0-9)1655,988.220 Years
MyITRisk.com

 

It is also important to pay attention to password complexity. Also you should also pay attention to password unpredictability. You want to avoid common substitutions (e.g., ‘a’ to ‘@’, ‘s’ to ‘$’).

Why Uniqueness Matters

Why Uniqueness MattersPeople reuse passwords for many accounts. This risky behavior opens the door for attackers. Even a single password, even a strong one, can lead to access to valuable accounts. Password reuse can lead to a domino effect of account breaches.

Reusing passwords, even strong ones, can leave accounts exposed to attacks.

Here’s a real-life example

Ten years ago, Daisy joined an online gardening forum. She also created an online payment account and used the same password. She soon forgot about the gardening forum. But, someone accessed her payments account years later and stole a lot of money.

Daisy didn’t know someone had hacked the gardening forum. The hackers leaked users’ logins online. An attacker likely tried reusing Daisy’s leaked password on popular sites. Eventually, the attacker got lucky.

Guarding your passwords

  1. Don’t write them down. Many write passwords on post-it notes and leave them in plain sight. Even if you hide your password, someone could still find it. Similarly, don’t store your login information in a file on your computer, even if you encrypt that file.
  2. Don’t share passwords – You can’t be sure someone else will keep your credentials safe. While at work, you may have to take responsibility for anything that occurs when someone is logged in as you.
  3. Don’t save login details in your browser. Some browsers store this info in unsafe ways. Another person could access your accounts if they get your device.

Tips for keeping passwords secure

Consider sharing these password tips with family and friends.

  1. Never reuse passwords – Create a unique, strong password for each account or device. This way, a single hacked account doesn’t endanger other accounts.
  2. Create long, complex passwords. Don’t use passwords based on dictionary words, pets’ names, or personal information. Attackers can guess them.
  3. Use a password manager. These tools can store and manage your passwords. They can also generate strong new passwords. Some can also notify you when a password might be compromised.

rb-

A strong password is the main barrier keeping most of your online accounts from being hacked. Without up to date practices, you might be using passwords that cyber-frauds can easily guess within minutes.

The average user creates passwords to fight data theft. The user could switch up the characters in your passwords and “Tr1Ck” your way into security. However. in today’s environment you need to create passwords that can fight modern password theft methods. Today, cyber-criminals use sophisticated technology to get your passwords. Users must consider the hackers software that is designed to account for user behavior as it guesses your passwords.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

ChatGPT Hacking: What You Need to Know and Do

ChatGPT Hacking: What You Need to Know and DoChatGPT is an artificial intelligence chatbot. It can interact with users in a conversational way. It is powered by a large language model called GPT-4. GPT-4 can understand and generate natural language responses based on user prompts. People can use ChatGPT for various purposes, such as getting information, entertainment, education, or productivity. ChatGPT is reportedly the fastest-growing consumer application in history. 

Hackers are going after ChatGPTThe artificial intelligent chatbot from OpenAI has been the cool kid on the tech block since November 2022. Followers of the Bach Seat are smart enough to know what that means. Hackers are going after ChatGPT. Recent reports from cybersecurity researcher Group-IB have found over 100,000 ChatGPT logins for sale on the dark-web.

Attractive to attackers

The AI is using you to learn more things. Every time you interact with it, ChatGPT gathers more info about you. Unlike Google, which collects data on what you are doing, you are feeding your info into ChatGPT. The information ChatGPT gathers from you also makes its attractive to attackers.

you are feeding your info into ChatGPTDid you ask it for a strong password for your checking account? ChatGPT remembers.

Did you ask it about a medical condition? ChatGPT remembers it and added it to its “intelligence.”

Did you ask it to proofread your report for the boss? ChatGPT now knows all the confidential corporate info in your report.

Information-stealing malware

Attackers want that info too. They can scoop up the data from a hacked ChatGPT account. Hackers can use the stolen data to impersonate users, access their online accounts, steal their money or assets, blackmail them, or sell their information to other criminals or advertisers.

According to the Singapore based firm, attackers are using the Raccoon information-stealing malware to scoop up ChatGPT credentials. The Raccoon malware is a subscription based crimeware that attackers can license for as little as $200.00 a month and embed in a malware laden email. 

How to protect yourself from ChatGPT hackers

The first step is to be careful about what you share with ChatGPT. Don’t give it any personal or sensitive information that you wouldn’t want anyone else to know. Remember that ChatGPT is not a human friend, but a machine that can store and process your data.

The second step is to use a strong and unique password for your ChatGPT account. Use a combination of uppercase and lowercase letters, numbers, and special characters. Avoid using easily guessable passwords or reusing passwords from other accounts. Use a password manager to generate and store complex passwords that are hard to guess or crack.

Periodically change your ChatGPT password. This will minimize the risk of unauthorized access. Avoid using the same password for an extended period and ensure new passwords are strong and unique.

The third step is to configure ChatGPT for more privacy.

Clear Your ChatGPT Conversations: To keep the information you’ve shared with ChatGPT away from attackers, regularly clear your saved ChatGPT conversations. To clear your ChatGPT conversations:

  1. ChatGPT GeneralLog in to ChatGPT.
  2. Click on your account name in the bottom left corner of the ChatGPT interface.
  3. Click Clear all chats.
  4. Click again to Confirm.

All of your saved conversations should be deleted. This can limit the amount of data stored on ChatGPT, which can help reduce the impact in case of a data breach.

Turn off chat history and model training: You can prevent ChatGPT from using your personal info to grow the AI. To disable chat history and model training,

  1. Log in to ChatGPT.
  2. Click on your account name in the bottom left corner of the ChatGPT interface. 
  3. Click Settings.
  4. Click Data Controls.
  5. Toggle Chat history & training to off.

ChatGPT says that while history is disabled, new conversations won’t be used to train and improve our models and won’t appear in the history sidebar. They do retain all conversations for 30 days to monitor for abuse.

They also point out that this will not prevent unauthorized browser add-ons or malware on your computer from storing your history.
The other limitation is that this setting does not sync across browsers or devices. You will have to enable it in each device.

Another step is to monitor your ChatGPT activity and report any suspicious or unauthorized actions. You can check your chat history and settings on the ChatGPT website or app. If you notice anything unusual, such as messages you didn’t send or changes you didn’t make, contact ChatGPT support immediately and change your password.

Finally, educate yourself and others about the risks and benefits of using ChatGPT. Read the terms of service and privacy policy of ChatGPT before using it. Learn how ChatGPT works and what it can and can’t do. Share this blog post with your friends and family who use ChatGPT and help them stay safe online.

Where is MFA?

Multi-factor authentication is the gold standard for securing your online accounts. You should enable 2FA whenever possible. 2FA adds an extra layer of security by requiring an additional verification step, such as a unique code sent to a mobile device, to access the account. But ChatGPT does not offer this basic security tool.

rb-

We have seen this list after years and years of preaching account security. ChatGPT should receive the same level of attention you give to other sensitive accounts like your email, take the necessary steps to protect your ChatGPT account and yourself.

ChatGPT is an amazing technology that can enrich our lives and experiences. But like any other technology, it comes with some challenges and dangers that we need to be aware of and prepared for. By following these steps, you can enjoy chatting with ChatGPT without compromising your security or privacy.


How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.