{"id":11040,"date":"2012-01-10T19:00:09","date_gmt":"2012-01-11T00:00:09","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=11040"},"modified":"2021-07-03T13:04:16","modified_gmt":"2021-07-03T17:04:16","slug":"are-you-on-the-pwnedlist","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/are-you-on-the-pwnedlist\/","title":{"rendered":"Are You on the Pwnedlist?"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-11266 size-full\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Are You on the Pwnedlist?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/malware-e1601130289666.jpg?resize=116%2C101&#038;ssl=1\" alt=\"Are You on the Pwnedlist?\" width=\"116\" height=\"101\" \/> <strong><a title=\"pwnedlist.com\" href=\"https:\/\/krebsonsecurity.com\/2016\/05\/how-the-pwnedlist-got-pwned\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pwnedlist.com<\/a><\/strong> will tell you if your <strong>email has compromised. <\/strong>The site checks emails against a collection of nearly 5 million possibly compromised accounts. <a title=\"krebsonsecurity.com\" href=\"https:\/\/krebsonsecurity.com\/about\/\" target=\"_blank\" rel=\"noopener noreferrer\">Brian Krebs<\/a> at <a title=\"krebsonsecurity.com\" href=\"https:\/\/krebsonsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Krebs on Security<\/em><\/a> <a title=\"krebsonsecurity.com\" href=\"https:\/\/krebsonsecurity.com\/2011\/11\/are-you-on-the-pwnedlist\/\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that a user <strong>can enter a username or <a title=\"Email address\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Email_address\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">email address<\/a><\/strong> into Pwnedlist.com\u2019s search box, and it will <strong>check to see if the information was found in any suspicious public data dumps<\/strong>.<\/p>\n<p><a title=\"pwnedlist.com\" href=\"https:\/\/krebsonsecurity.com\/2016\/05\/how-the-pwnedlist-got-pwned\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11267 size-medium\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"pwnedlist\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/pwnedlist.jpg?resize=150%2C53&#038;ssl=1\" alt=\"Pwnedlist\" width=\"150\" height=\"53\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/pwnedlist.jpg?resize=300%2C105&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/pwnedlist.jpg?resize=150%2C52&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/pwnedlist.jpg?w=378&amp;ssl=1 378w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Alen Puzic and Jasiel Spelman, two security researchers from DVLabs, a division of <a title=\"HP\/TippingPoint\" href=\"https:\/\/web.archive.org\/web\/20130702154101\/http:\/\/h17007.www1.hp.com:80\/uk\/en\/products\/network-security\/index.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">HP\/TippingPoint<\/a> created Pwnedlist.com. Mr. Puzic said. \u201c<em>&#8230; I could create a site that would help the everyday user find if they were compromised.<\/em>\u201d<\/p>\n<p>Pwnedlist.com currently allows users to search through nearly five million emails and <a title=\"User (computing)\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/User_%28computing%29\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">usernames<\/a> found online at sites like <a title=\"Pastebin\" href=\"http:\/\/pastebin.com\/\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Pastebin<\/a>. The site also often receives large caches of account data that people directly submit to its database. Mr. Puzic told <em>Krebs on Security<\/em> it is growing at a rate of about 40,000 new compromised accounts each week.<\/p>\n<p><a title=\"Encryption\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Enigma-rotor-stack.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11268 size-thumbnail\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Encryption\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/encryption.jpg?resize=75%2C57&#038;ssl=1\" alt=\"Encryption\" width=\"75\" height=\"57\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/encryption.jpg?resize=150%2C114&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/encryption.jpg?w=220&amp;ssl=1 220w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>The researcher said information contained in these data donations often makes it simple to learn which organization lost the information. \u201c<em>Usually, somewhere in the dump files there\u2019s a readme.txt file or there\u2019s some type of header made by a hacker who caused the breach, and there\u2019s an advertisement about who did the hack and which company was compromised,<\/em>\u201d Mr. Puzic in the article. \u201c<em>Other times it\u2019s really obvious because all the emails come from the same domain.<\/em>\u201d<\/p>\n<p>DVLabs&#8217; Puzic said in the article that Pwnedlist.com doesn\u2019t store the username, email address, and password data itself; instead, it records a cryptographic hash of the information and then discards the plaintext data. According to the blog, a \u201chit\u201d on any searched email or username only produces a binary \u201cyes\u201d or \u201cno\u201d answer about whether any hashes matching that data were found. It won\u2019t return the associated password, nor does it offer any clues about where the data was leaked from.<\/p>\n<h3>Advice from the Pwnedlist developers<\/h3>\n<p>If Pwnedlist says your email or <a title=\"User identifier\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/User_identifier\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">user ID<\/a> is in their database, they offer the following advice:<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11271\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"shocked_woman\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/shocked_woman.jpg?resize=110%2C94&#038;ssl=1\" alt=\"Shocked woman\" width=\"110\" height=\"94\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/shocked_woman.jpg?resize=300%2C255&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/shocked_woman.jpg?resize=150%2C127&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/11\/shocked_woman.jpg?w=320&amp;ssl=1 320w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/p>\n<ol>\n<li>\u201cDon\u2019t panic! Just because your email was found in an account dump does not mean it has been compromised.<\/li>\n<li>Immediately change any <a title=\"Password\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Password\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">passwords<\/a> that might be associated with listed email accounts.<\/li>\n<li>Go through all your accounts and create new passwords for each of them, just in case. &#8220;Better safe than sorry.\u201d<\/li>\n<\/ol>\n<p>The two researchers plan to publish regular updates to their <a title=\"Twitter\" href=\"http:\/\/twitter.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Twitter<\/a> account (@pwnedlist) when new data dumps are discovered. Longer-term, Mr. Puzic told Krebs that he plans a longitudinal study on password security.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>I have several emails, professional and personal which thankfully Pwnedlist does not have in their databases. Follow password best practices and use an 8 character or longer password with at least one letter, number, and special character. Also, change your passwords regularly.<\/em><\/p>\n<h3><em>End-user password best practices:<\/em><\/h3>\n<ol>\n<li><em>Passwords should be something you can remember but difficult for others to guess. That means avoid information anyone can pick up from <a title=\"Facebook\" href=\"https:\/\/facebook.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Facebook<\/a>. <\/em><\/li>\n<li><em>Use at least 8 characters. Some authentication systems will ask for more, but 8 well-chosen characters is usually enough.<\/em><\/li>\n<li><em>Mix letters, numbers, uppercase, lowercase, and even symbols when possible. 1GrdDC@82 is stronger than letter22<\/em><\/li>\n<li><em>Avoid dictionary words. Many <a title=\"Brute-force attack\" href=\"http:\/\/en.wikipedia.org\/wiki\/Brute-force_attack\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">brute force attacks<\/a> are designed to guess them. \u201dPassword\u201d is not a good password.<\/em><\/li>\n<li><em>Use a unique password for each account. Your password at work should be different from your Facebook password. <\/em><\/li>\n<li><em>Do not share your password.<\/em><\/li>\n<\/ol>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.circleid.com\/posts\/new_website_helps_discovering_compromised_user_accounts\/\" target=\"_blank\" rel=\"noopener noreferrer\">New Website Helps Discovering Compromised User Accounts<\/a> (circleid.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Pwnedlist.com users can see if an email has been compromised by checking it against a collection of nearly 5 million hacked accounts<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,761,888,104,1096,209,889,4,60],"class_list":["post-11040","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-brian-krebs","tag-email-address","tag-facebook","tag-fb","tag-password","tag-pwnedlist-com","tag-security","tag-twitter"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=11040"}],"version-history":[{"count":14,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11040\/revisions"}],"predecessor-version":[{"id":132789,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11040\/revisions\/132789"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=11040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=11040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=11040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}