USPSA Website hacked and PWs/Emails compromised

The #1 community for Gun Owners in Indiana

Member Benefits:

  • Fewer Ads!
  • Discuss all aspects of firearm ownership
  • Discuss anti-gun legislation
  • Buy, sell, and trade in the classified section
  • Chat with Local gun shops, ranges, trainers & other businesses
  • Discover free outdoor shooting areas
  • View up to date on firearm-related events
  • Share photos & video with other members
  • ...and so much more!
  • bwframe

    Loneranger
    Site Supporter
    Rating - 100%
    93   0   0
    Feb 11, 2008
    38,179
    113
    Btown Rural
    What are the hackers gonna get out of this? An e-mail address to spam?

    Doesn't every third company get hacked every other day, including financial institutions?
     

    chezuki

    Human
    Rating - 100%
    48   0   0
    Mar 18, 2009
    34,158
    113
    Behind Bars
    What are the hackers gonna get out of this? An e-mail address to spam?

    Doesn't every third company get hacked every other day, including financial institutions?

    Many things use emails as usernames, and also many people (rather stupidly) use the same password for multiple things.
     

    bwframe

    Loneranger
    Site Supporter
    Rating - 100%
    93   0   0
    Feb 11, 2008
    38,179
    113
    Btown Rural
    Just got the first spam/phishing attempt to my USPSA email address:



    Hello,

    On Wed, Nov 26, 2014 12:26 AM GMT+2, we noticed an attempt to sign in to your Apple iTunes account from an unrecognized device in Norway.

    If this was you, please sign in from your regularly used device.

    If you haven't recently signed in from an unrecognized device and believe someone may have accessed your account, please visit
    **
    link removed **
    to change your password and update your account recovery information.

    Thanks for taking these additional steps to keep your account safe.

    Regards,
    Apple
     
    Last edited:

    rhino

    Grandmaster
    Rating - 100%
    24   0   0
    Mar 18, 2008
    30,906
    113
    Indiana
    I understand, but I don't get the severity of this?

    It's not a big deal for people who use different passwords for different logins.

    Think of this: take that email address and password and try them at several of the bank's web sites. It's likely you'll find a few or many whose bank accounts are accessed with that email address as their login id and that password as their password. Then you have their bank account, the paypal account, etc.

    Sure, everyone should use different password and userids wherever they go, but they don't. It is unusual and irresponsible for an organization that requires submission of valid email address or other identifying information to leave corresponding passwords giftwrapped for the taking. Especially when it's a well known stupid thing to do and they were warned (according to people who claimed to have warned them). Especially since they've been hacked before.
     

    pudly

    Grandmaster
    Rating - 100%
    35   0   0
    Nov 12, 2008
    13,329
    83
    Undisclosed
    I understand, but I don't get the severity of this?

    Although your USPSA account is likely a low impact, the real value is in how they can use that info to attack financial and other priority systems. Right in the listing was a note that about 1000 passwords worked for PayPal. They would also try the same e-mail/password combo with major banks, Ebay, Amazon, Google, Facebook, Twitter, etc. Since most people have a single e-mail that they use for many systems and reuse passwords, any site breach like this is considered a treasure trove of hackable accounts. Any such account compromises can then be used to gain financially, steal your identity, and work towards additional account or system compromises. Even if you aren't affected, it is very possible that thousands of others will be hurt by this site compromise.

    USPSA didn't follow good information security practices. Even if an organization follows good security protocols, they may still be compromised, they just lower the odds and scope of the damage. Here are some things that you can do to protect yourself and your accounts:
    • Do not reuse passwords, particularly those associated with financials and major sites (Google, Twitter, Facebook, etc).
    • Use longer (8+) and more complex passwords (upper/lower case, digits, special characters)
    • Do not use dictionary words or simple character sequences (monkey, password, 123456, qwerty, etc)
    • Given that the rules above make memorizing many passwords difficult, you may want to consider using a password manager such as LastPass, KeePass, etc. You lock the manager with a complex password and then it will handle remembering all of your other account IDs/passwords. I use this and now use random 20 character passwords on most sites that even I don't know.
    • Whereever possible, enable 2FA (two factor authentication), especially for important accounts. This is a second form of identity proof besides your password. This can come in several forms such as a code sent to your cell phone or e-mail, a small app that generates a code that you need to type in, etc. With 2FA enabled, even if the account list is compromised, you have an additional layer of security in place and they still don't have enough info to log onto your account.
     
    Last edited:

    bwframe

    Loneranger
    Site Supporter
    Rating - 100%
    93   0   0
    Feb 11, 2008
    38,179
    113
    Btown Rural
    OK, OK I'm beginning to grasp. I really had no clue that anyone still used the same e-mails and passwords for everywhere they went.
     

    pudly

    Grandmaster
    Rating - 100%
    35   0   0
    Nov 12, 2008
    13,329
    83
    Undisclosed
    There are a number of people who use the same User ID both on INGO and other gun sites. If you were to compromise one sites account list, I'd bet that you would get access to a substantial number of logins for the other sites as well.
     

    Friction

    Plinker
    Rating - 0%
    0   0   0
    Feb 21, 2014
    98
    8
    Terre Haute
    Places like USPSA are low hanging fruit WRT security protocols so they become a target for mass data that may prove valuable in more well secured places like banks. While high level places ere hit pretty routinely the reality is that in accordance with applicable laws they not only discover the hit but they report it to you where as smaller companies do not.

    How advanced do you think the IT department for your trash collection agency is? How about the mom and pop forums or web based business out there that require log-ins and PWs to use? The fact is that many of those places have been hit multiple times but they may not even know it yet, or ever.

    All you can do to protect yourself from data crimes is to work to minimize your exposure to a single breech of information by doing what folks have recommended above. Additionally, you can use a separate emails for like everyday shopping and for banking. Email addresses are free to create and the address will remain SPAM free if you only use it at well established sites so its worth having a "Shopping/forum" email and a "personal business" email.

    Whether you know it or not, you are your own CEO/CFO and IT department so treat yourself the same way a company would treat you. Would you use your office email as a point of contact on your forum registrations? Probably not, because they likely have rules in place about that so enforce those same rules with things under your control and you help minimize risk. You can always just create a very similar emails than what you have for important tasks if it makes it easier to remember.
    TURBOKILLER69@killer.com = Important stuff
    ShadywebsiteTURBOKILLER69@killer.com = online shopping at porn sites and USPSA log-ins.

    I don't know the actual numbers but I would estimate that you are at least 10,000 times more likely to be the victim of a data related crime then a strong arm robbery or other situation where a carry weapon would help you so if you are big on proactive physical personal defense you should make an effort to be vigilant with your administrative personal defense at least as much.
     

    rhino

    Grandmaster
    Rating - 100%
    24   0   0
    Mar 18, 2008
    30,906
    113
    Indiana
    There are a number of people who use the same User ID both on INGO and other gun sites. If you were to compromise one sites account list, I'd bet that you would get access to a substantial number of logins for the other sites as well.


    I'll bet the password on INGO are encrypted!
     

    blkrifle

    Master
    Site Supporter
    Rating - 0%
    0   0   0
    Nov 28, 2010
    1,960
    99
    terre haute
    So . . . how many DAYS should I expect to wait for the password reset? If they're sending an email to me with a link, it's not arriving, nor is it going to my spam folder.

    Of course, why should expect that to function from people who left thousands of email/password combinations available as a plain text file after being warned in the past?

    DUMBASSES.


    they are using the same timeline you use to renew your ro cert! bahahaaaha
     

    rhino

    Grandmaster
    Rating - 100%
    24   0   0
    Mar 18, 2008
    30,906
    113
    Indiana
    There are a number of people who use the same User ID both on INGO and other gun sites. If you were to compromise one sites account list, I'd bet that you would get access to a substantial number of logins for the other sites as well.

    they are using the same timeline you use to renew your ro cert! bahahaaaha

    D'OH!! Gut punch drops the rhino!!!

    Well played, sir!
     

    bwframe

    Loneranger
    Site Supporter
    Rating - 100%
    93   0   0
    Feb 11, 2008
    38,179
    113
    Btown Rural
    The member support section of the USPSA site has been down for a couple days. I've been trying to get my login/password changed.
     
    Top Bottom