Open Side Menu Go to the Top
Register
Forum Database Compromise Forum Database Compromise

01-10-2017 , 01:19 AM
Quote:
Originally Posted by Bobo Fett
Do you have more than one account here? If you like, feel free to PM me the email address and I'll check what account it's associated with (it's not a tarp, having two accounts is fine). There is no field for a secondary email address to be stored, so that's not an issue.




I'm not speaking for 2+2, but I'll give my opinions:

1) From my understanding, it wasn't the exact same thing.
2) Better for others to answer this; not sure if there was anything in common between the two attacks that was missed the first time.
3) Seems like you're jumping to conclusions here; I have no idea how you can be sure simple security measures weren't taken but I'm sure TPTB would be happy to hear your suggestions for what they might have missed. Just keep in mind that not everything you think is simple necessarily is. The size of the forum has prevented us from upgrading the forum software in the past, and what may seem easy and inexpensive in theory may not actually be so in reality. Changes were made the last time something like this happened, so this is more than just an unwillingness to do anything.
Chuck should have something more to say on all this at some point. I do know extensive measures were put into place last time. That's why the site was down for weeks.
Forum Database Compromise Quote
01-10-2017 , 02:36 AM
Quote:
Originally Posted by IPlayDonkaments
I got an e-mail from Google saying that a sign in from somewhere in China was prevented this morning. Probably related considering I used the same password there as here.
If your google password is the same as a poker forum, it's a good chance that your password security needs a major overhaul.

Take this opportunity to use a password manager like Lastpass and use random passwords for every site. There is even an app for Android that can enter passwords in sites and Lastpass app on mobile so you don't have to worry about complex passwords on your cell. if you're on iPhone, you can still use the lastpass app to copy/paste password into apps, or use their browser to visit sites easily.

I used their security manager today to check my password that I used for 2+2 and saw that I had it on a few other sites as well. I went through every one where I had used this password and changed them immediately.
Forum Database Compromise Quote
01-10-2017 , 03:47 AM
Got my last pass security score over 95%

Sadly, I can't go much higher because some saved passwords either aren't mine, or are for internal logins, like to remote into a router or raspberry pi or rails app.
Forum Database Compromise Quote
01-10-2017 , 06:57 AM
Seriously?! Are the passwords stored in encoded form?!

#waiting for the next breach..
Forum Database Compromise Quote
01-10-2017 , 07:01 AM
Quote:
Originally Posted by Alobar
yeah this. I thought it was some new stupid password policy, so I just changed my password and then immediately changed it back to my normal one. I only saw it was because of a hack because I stumbled into CTH by mistake and someone had cross posted about it.
If the passwords are out there, this process is just fake security. Clicking the expired password link allows the person that knows the password to change the password and email addres. Thus hijacking the account.

The only way to do this is to force a password reset (not change), requiring the user to prove to have access to the registered email address.
Forum Database Compromise Quote
01-10-2017 , 11:40 AM


seriously though you people are ****ing idiots and that's fine I guess

by you people I don't mean people of a race or color obviously

Last edited by Emily G; 01-10-2017 at 11:45 AM. Reason: I mean the literally retarded people that get paid to work at http://forumserver.twoplustwo.com/
Forum Database Compromise Quote
01-10-2017 , 12:31 PM
You sound like a real dainty lass, Emily.
Forum Database Compromise Quote
01-10-2017 , 03:06 PM
I didn't realize 2+2 poker book publishing company was also a cyber security research firm on the side. I guess that would make sense to be so upset about a security breach.
Forum Database Compromise Quote
01-10-2017 , 03:18 PM
1 hack every 1702 days doesn't seem like 2+2 is ignoring security.
Forum Database Compromise Quote
01-10-2017 , 03:26 PM
The last big hacking of 2+2 (when it was down for ages) is what made me finally get a password manager and start using unique passwords for each site I use.

So, basically 2+2 has done more for my security than any other site/company and I owe them a lot
Forum Database Compromise Quote
01-10-2017 , 03:27 PM
better than yahoo, right? And I'm sure yahoo spent millions on security

edit

looks like it's actually only half a million in the last year
Forum Database Compromise Quote
01-10-2017 , 06:24 PM
Quote:
Originally Posted by kerr
I'm beginning to think I should start using unique email addresses for every site. eg. twoplustwo@mydomain.com
this is what I do. It also allows you to know which places are selling your info. Because you start getting email to that address from other sites.
Forum Database Compromise Quote
01-10-2017 , 10:47 PM
This forum is so unprofessional!

Your forum get hacked (OK could happen to almost any site these days).

Your response: send a haughty email to all your users with no apologies at all.
Instruct them to take security measure to protect their personal computer. (What does this have to do with the hack?)
Ask them to enable two-factor authentication wherever possible, yet your own forum doesn't support it.
Forum Database Compromise Quote
01-11-2017 , 02:51 AM
Quote:
Originally Posted by Borr
If the passwords are out there, this process is just fake security. Clicking the expired password link allows the person that knows the password to change the password and email addres. Thus hijacking the account.

The only way to do this is to force a password reset (not change), requiring the user to prove to have access to the registered email address.
The problem is, even that doesn't prevent hijacks.

If we assume nefarious characters have this database and have already decrypted the passwords, it's too late. They can already have hijacked numerous accounts and changed the email addresses registered to them, and once that happens, 2+2 can force password changes all day long to no avail.

Unfortunately, there is no perfect answer now, so 2+2 has to do the best they can. It doesn't appear that any 2+2 accounts have been compromised thus far, so measures are being taken that are felt to be the best mix of reducing the risk of hijacked accounts while not overly inconveniencing 2+2 members.

Quote:
Originally Posted by Noodle Wazlib
better than yahoo, right? And I'm sure yahoo spent millions on security

edit

looks like it's actually only half a million in the last year
That's the thing - 2+2 can take security seriously while not being infallible. Much bigger companies holding much more sensitive data than 2+2 have been hacked numerous times before. I'm not saying that lets 2+2 off the hook, but I think people need to temper their expectations.

Quote:
Originally Posted by pokcalculus
This forum is so unprofessional!

Your forum get hacked (OK could happen to almost any site these days).

Your response: send a haughty email to all your users with no apologies at all.
IDK, I get that tone doesn't always come across well in written word, but I have a really hard time finding anything in this "haughty":

Quote:
Dear member of the Two Plus Two Forums:

On January 8 we learned that the user database at http://forumserver.twoplustwo.com had been compromised. We cannot find any evidence that accounts created after approximately November 20 have been compromised (we fixed a problem that day) but as a registered users you should assume that if you've been a member of the forums since before that date that the information necessary to determine your (unchanged) password is out there. Information obtained includes username, email, encrypted password, birthdate, and IP address.

The people "selling" the database claim a December 7 date, but we believe this to be wrong.

We are asking all users to reset their password if it hasn't changed in the last 45 days. You will be prompted to do so the next time you login to the forums. In addition we will shortly be invalidating the passwords of accounts that have not been active for some time. The users of those accounts will need to follow the forgotten password link to reset their password.

A user suggested that the following actions are incredibly important, and we agree:

1) Change your Password on 2+2
2) Change ALL other passwords that are the same or similair
3) Start using unique passwords for every site, these breaches are so common. I'd recommend a password manager like lastpass
4) enable 2 factor authentication on any vital accounts/emails
5) Take extra precautions to verify identity when trading via 2+2 (or any other site) via separate means

Regards,

The Two Plus Two Management
Sure, it could've been apologetic. Haughty? I'm not seeing it.

Quote:
Originally Posted by pokcalculus
Instruct them to take security measure to protect their personal computer. (What does this have to do with the hack?)
This part was cut-and-pasted from another posters' suggestion list (typos and all - ack), so maybe it should've been made clearer that those weren't directly from 2+2 but something they agreed with. Basically, it's a list of good security practices in light of the database compromise. Securing other passwords makes sense, as for most people that's really the only damage a 2+2 hack could cause - if you don't engage in transactions with other 2+2 members, your next big risk would be if you use the same password elsewhere, so I think suggestions to remedy that are a good idea.

Quote:
Originally Posted by pokcalculus
Ask them to enable two-factor authentication wherever possible, yet your own forum doesn't support it.
The suggestion was to "enable 2 factor authentication on any vital accounts/emails". I don't think most people would consider their 2+2 account to be vital in the way that I assume was meant here - to me, vital would be accounts like financial institutions, poker sites, etc. Two factor authentication seems like overkill for a forum.
Forum Database Compromise Quote
01-11-2017 , 05:16 AM
Quote:
Originally Posted by MinusEV
password manager
I couldn't tell you what my current or previous 2+2 password is (without checking my password manager). They tend to be 12-16 characters and just a mix of letters, numbers and special characters.

The new Macbooks have TouchID which would be handy.
Forum Database Compromise Quote
01-11-2017 , 12:19 PM
Quote:
Originally Posted by Freakin
If your google password is the same as a poker forum, it's a good chance that your password security needs a major overhaul.

Take this opportunity to use a password manager like Lastpass and use random passwords for every site. There is even an app for Android that can enter passwords in sites and Lastpass app on mobile so you don't have to worry about complex passwords on your cell. if you're on iPhone, you can still use the lastpass app to copy/paste password into apps, or use their browser to visit sites easily.

I used their security manager today to check my password that I used for 2+2 and saw that I had it on a few other sites as well. I went through every one where I had used this password and changed them immediately.
I use a certain variation of a password for most sites. Apparently it ended up the same on this forum as on my e-mail. But you are right it is not very secure,and I will look into a password manager.
Forum Database Compromise Quote
01-13-2017 , 05:21 PM
Chuck, Bobo, or someone else who knows for certain,

I believe I recall seeing some 2p2 administrative post to the effect that among the steps being taken was elimination of old, unused accounts. (I can't find such a post right now and it's possible I'm just imagining it.)

I have quite a few accounts, primarily for use in POG games, and some of those accounts haven't posted in years. I did just go through and change the password for every one of the accounts. (A pain in the ass, even with a password manager, but whatcha gonna do?)

Will these accounts be safe from culling, given that they have logged in but not posted or otherwise done anything on the forums? Going forward, will there be other periodic culling that I'll need to worry about?

Thank you.

(By the way, this as atakdog; I'm posting as Shrike while saving my main's 50K post for something special.)

(Further by the way: pseudorandom 24 to 27 character passwords with all character types. Everyone else should do the same. I use Lastpass but I suppose any password manager is better than none; I don't know which is best.)
Forum Database Compromise Quote
01-13-2017 , 06:02 PM
If they haven't posted in years... it's time to let them go. I know it's hard and it's ok to cry, but set them free. If it was meant to be, they'll come back.
Forum Database Compromise Quote
01-13-2017 , 06:39 PM
the only thing that might happen is more passwords might be erased again. we decided not to delete accounts unless requested.
Forum Database Compromise Quote
01-13-2017 , 08:46 PM
Quote:
Originally Posted by Mat Sklansky
the only thing that might happen is more passwords might be erased again. we decided not to delete accounts unless requested.
Cool. Thank you for answering.
Forum Database Compromise Quote
01-15-2017 , 08:21 AM
This may have already been mentioned, but I know 2p2 has had an extensive problem with password integrity in the past due to security breaches. Basically the suggestion is to make user displayed names different from the username login credentials. this promotes a healthier safeguard against numerous potential password breaches.

whether its a valid email used for the login, or for example with the poster above me, to make shrike the username he logs in with but the display ontwoplustwo shows Shrike.582 or slight variation of username. causing the username to be indistinguishable to potential intruders.

this is just a recommendation, but if the issues with passwords is expected to be a re-occurring problem every few years, maybe safeguard, such as this can add a new variable into the mix.
Forum Database Compromise Quote
01-15-2017 , 10:52 PM
Problem with that is if it's a relational database, which I'm guessing it has to be, it'd be trivial to match the login/screen name, assuming all the tables were compromised.
Forum Database Compromise Quote
01-15-2017 , 10:54 PM
I believe he is talking about people's accounts getting compromised, at least that is the problem using a different log in name than display name would solve.
Forum Database Compromise Quote
01-27-2017 , 04:13 PM
Kindly note;

Quote:
This morning (1/8) we received notification that the forums had been hacked and have determined that there is a reasonable chance that the hackers obtained enough information to decode passwords (with some effort) as a result. We have no indication at this time that any accounts have been compromised, but we are taking precautions just the same.

If you have changed your password within the last 45 days your password should not be at risk, but just in case ,if you haven't changed it, you'll be forced to the next time you login.

As always, we recommend that you do not use the same password on multiple sites, but if you have done so we suggest you change the passwords on those sites as well. We also suggest that you do not rely on a user's Two Plus Two Forums identify when conducting any meaningful transaction.
identity*

simple error that can use a quick edit.
Forum Database Compromise Quote
01-27-2017 , 04:28 PM
i have to check with the hacker to see if he can make that change.
Forum Database Compromise Quote

      
m