Posts Tagged ‘Adobe’

2013 Top 20 Breaches

December 30, 2013 Leave a comment

This year is nearly gone, so if you are afraid to have missed the most remarkable breaches of 2013, you’d better browse the following chart.

It collects the most devastating breaches in terms of number of records affected, and has been drawn based on the data collected by during this endless infosec year. Do you still believe the massive breach targeting Adobe has been an isolated case?

2013 Top 20 Breaches png

Top 20 Breaches of 2013. The extension of the sphere is proportional to the number of affected records.

And The Winner Is…


200px-UbisoftJuly 2: the video game developer warns 58 million users that an intruder gained illegal access to some of its online systems, illegally accessing data from the account database, including user names, email addresses and encrypted passwords.


TurkeyDecember 16: Hurriyet News reports that Russian hackers were able to obtain 54 million Turkish citizens’ ID data. The Turkey’s Supreme Election Committee initially shared the data with Political Parties, who kept the information in insecure websites, where it was easily accessed.


200px-Evernote_logo.svgMarch 2: Evernote’s Operations & Security team discovers suspicious activity that appears to have been a coordinated attempt to access secure areas of the Evernote Service. As a precaution a massive password reset is implemented for 50 million users.


01150cc8-44ee-4bbe-9143-5ef85f27144e-q60-pngApril 26: LivingSocial suffers a massive cyber attack on its computer systems, resulting in “unauthorized access to some customer data from our servers”. The hack affects customer names, emails, birthdates and encrypted passwords and impacts 50 million customers.

Cupid Media

Cupid logo.gifNovember 20: Brian Krebs reveals that an intrusion at online dating service Cupid Media earlier this year exposed more than 42 million consumer records, including names, email addresses, unencrypted passwords and birthdays.


150px-Target_logo.svgDecember 19: Target Corp. confirms an unauthorized access to payment card data that may have impacted customers making credit and debit card purchases in its U.S. stores. Approximately 40 million credit and debit card accounts may have been impacted between Nov. 27 and Dec. 15, 2013.


200px-Adobe_Systems_logo_and_wordmark.svgOctober 3: Adobe announces a massive breach affecting customer IDs and encrypted passwords for 2.9 million customers (initially). The real extent of the breach is 38 million, and also affects the source code of ColdFusion and Acrobat family

Yahoo! Japan

Yahoo_Japan_logoMay 18: Yahoo! Japan Corp. warns its 22 million users to change their passwords after the detection of an unauthorized attempt to access the administrative systems.


chinaDecember 9: unknown hackers leak a database of an estimated 20 million hotel reservations on multiple websites and even on WeChat, the popular messaging service.

Groupon Taiwan

230px-Groupon_logo.svgMay 28: Groupon Taiwan reveals to have suffered a cyber attack compromising usernames and passwords of its 4.1 million registered users. Apparently, the intruders did not access credit cards and financial details

Maricopa County Community College

MaricopaDecember 1: the Maricopa County Community College District notifies, after seven months, 2.4 million students and employees that their academic or personal data were compromised in an April security breach.

South Korea

South KoreaJune 25: South Korean officials reveal that unknown hackers were able to hack and release publicly personal details of more than 2 million South Korean ruling party workers and 40,000 U.S. troops, including those stationed in South Korea.

Vodafone Germany

200px-Vodafone_logo.svgSeptember 12: personal details of more than 2 million customers of Vodafone Germany are stolen from an Internal Database. Data includes names, addresses, bank account numbers and birth dates.

200px-Ubuntu_logo.svgJuly 20: E-mail addresses, user names, and password data for every registered user of the Ubuntu Forums, estimated to be 1.82 million accounts, are exposed in a security breach after a hacker managed to gain administrative access to the back-end servers.


200px-Scribd_logo.svgApril 3: the world’s largest document sharing site Scribd says it was hacked and believes up to 1% of its 100 million users’ passwords were compromised due to being stored with an outdated hashing algorithm.

Washington State Courts

Washington CourtsMay 9: the Washington State Administrative Office of the Courts ( was hacked sometime between September 2012 and February 2013, and up to 160,000 SSN and 1 million driver’s license numbers may have been accessed during the data breach.


220px-Drupal-wordmark.svgMay 29: passwords for almost 1 million accounts on the website are reset after hackers gained unauthorized access to sensitive user data exploiting vulnerability in an undisclosed third-party application.


270px-VBulletin.svgNovember 15: notifies the registered users to change their password as a consequence of a sophisticated cyber attack, allowing the attackers to access customer IDs and encrypted passwords of 860,000 individuals.


MacRumorslogoNovember 11: MacRumors notifies the forum users to change their password as a consequence of a cyber attack. The number of affected users is in theory 850,000.


200px-Walla_logo.svgFebruary 14: The Anonymous hack Walla! ( an Israeli portal and dump 600.000 accounts on pastebin.

1-15 October 2013 Cyber Attacks Timeline

October 27, 2013 2 comments

It’s time to review the list of the main cyber attacks happened during the first half of October.

Of course there are few doubts: the breach involving Adobe (compromising the details of 3 million customers and the source code of two products) is for sure the most remarkable event of the month (and probably of the year), and its consequences will likely affect the Infosec landscape for long. In addition it overshadowed all the other events occurred so it is quite hard to summarize the threat landscape of the first 15 days of October.

In a nutshell, these two weeks have brought an unprecedented number of DNS Hijackings and several considerable breaches (however not comparable in size and impact with the one affecting Adobe). At first glance, looks like the number of attacks motivated by Cyber Crime is constantly increasing and leaving behind Hacktivism.

Last but not least, curiously, for this couple of weeks, I did not find any remarkable operations motivated by Cyber Espionage.

As usual, if you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012 and now 2013 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

1-15 October 2013 Cyber Attacks Timeline

Read more…

1-15 November 2012 Cyber Attacks Timeline

November 19, 2012 1 comment

The first half of November 2012 has been undoubtedly characterized by Hacktivism. Not only the month has begun with the ProjectBlackStar by the infamous Team Ghostshell (2.5 million accounts leaked belonging to different Russian sectors), but also the long-awaited November 5 has brought an unprecedented wave of Cyber Attacks against organizations all over the world, including Symantec and the UK Ministry Of Defence (more than 3,000 accounts leaked in both cases).

Moreover, after the dramatic event of the 14th of November (the killing of Ahmed Al-Jaabari, the commander of the military wing of Hamas by an Israeli missile and the consequent Operation “Pillar Of Defense”), the Anonymous have started a massive campaign of Cyber Attacks against Israel sites and in support of Palestine. This campaign is still ongoing even if it is really impossible to track all the attacks (nearly 700 defaced web sites so far), and hence, as far as possible, only a general overview is provided.

Of course these events have shadowed the other attacks, including the ones to LG (3,300 accounts leaked in two different cyber attacks) and Adobe (150,000 records allegedly compromised).

The chronicles also report of an alleged cyber attack against Telecom Italia (30,000 accounts allegedly leaked), even if there several doubts about the real authenticity of this attack.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Read more…

Categories: Cyber Attacks Timeline, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Yet Another Breach Targeting Adobe

November 15, 2012 Leave a comment

Logo of Adobe Systems Incorporated

Hard Times for Adobe. On the evening of Tuesday, November 13, 2012, immediately after the claims of an alleged Egyptian hacker dubbed ViruS_HimA, the company has taken offline the forum.

In his pastebin post, the hacker claims to have breached an unidentified Adobe server, gaining full access to it and dumping the whole Database: over 150,000 emails, passwords with full data of Adobe customers and partners with some users belonging to Adobe, Google, NASA, Military Institutions, etc.).

As a proof of his breach he has published some screenshot, and a text file containing 645 records with emails belonging to some selected domains: “”, “.mil” and “.gov”.

After the rumors, the breach has been finally confirmed by Adobe in a blog post where the company has announced the decision to take the forum offline and to reset the passwords.

Meanwhile more details about the breach are emerging: the hacker allegedly exploited a SQL Injection vulnerability, and also the cracked passwords from the breach show a lack of security with no salt, no iteration, and finally no complexity. Unfortunately we are getting more and more used to attacks exploiting SQLi and to poorly-protected passwords.

Unfortunately Adobe continues to attract the attention of cyber-attackers. At the end of September the company discovered a targeted attack against a build server accessing the code signing infrastructure with the consequence that the certificates of 5000+ applications were revoked, one month and half later the passwords of 150,000 forum users are at risk.

16-30 September 2012 Cyber Attacks Timeline

October 4, 2012 2 comments

Part One with 1-15 September 201 Timeline Here.

September is over and it’s time to analyze this month from an Information Security perspective with the second part of the Cyber Attack Timeline.

Probably this month will be remembered for the massive outage of six  U.S. Banks (Bank of America, JPMorgan Chase, Citigroup, U.S. Bank, Wells Fargo and PNC ) caused by a wave of DDoS attack carried on by alleged Muslim hackers in retaliation for the infamous movie (maybe this term is exaggerated) “The Innocence of Muslims”.

China has confirmed its intense activity inside the Cyber space. Alleged (state-sponsored?) Chinese hackers were allegedly behind the attack to Telvent, whose project files of its core product OASyS SCADA were stolen after a breach, and also behind a thwarted spear-phishing cyber attack against the White House.

Adobe suffered a high-profile breach which caused a build server to be compromised with the consequent theft of a certificate key used to sign two malware strains found on the wild (with the consequent necessary revoke of the compromised key affecting approximately 1,100 files).

Last but not least, the Hacktivism fever has apparently dropped. September has offered some attacks on the wake of the #OpFreeAssange campaign, and a new wave of attacks at the end of the month after the global protests set for September, the 29th, under the hashtag of #29s.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Read more…

Categories: Cyber Attacks Timeline, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Adobe Persistent Threat

September 28, 2012 Leave a comment

Adobe is the latest victim of a targeted attack. The news has been reported in a blog post by Brad Arkin, Director of product security and privacy at Adobe.

According to Mr. Arking the company has recently received two malware strains in disguise of malicious utilities that appeared to be digitally signed using a valid Adobe code signing certificate and has identified the possible reason for the illegitimate code signing in a compromised build server with access to the Adobe code signing infrastructure as part of the build server.

The first malicious utility is called pwdump7 v7.1 and extracts password hashes from the Windows OS as a single file that statically links the OpenSSL library libeay32.dll.  The second malicious utility, dubbed myGeeksmail.dll, is a malicious ISAPI filter.

Of course the forensic investigation is ongoing. To date Adobe has identified the presence of malware on the build server (although the details of the machine’s configuration were not to Adobe corporate standards for a build server, this was not caught during the normal provisioning process”) and the likely mechanism used to first gain access. Although the forensic investigation has found evidence linking the build server to the signing of the malicious utilities, it appears that the private key required for generating valid digital signatures was not extracted from the HSM, which is kept in physically secure facilities. Even, so far there is no evidence that the source code was compromised or stolen.

As a natural consequence the company has changed the signing process and has deployed an interim solution including an offline human verification to ensure that all files scheduled for signature are valid Adobe software. Furthermore the company is also designing and deploying a new, permanent signing solution.

All the certificates signed with the impacted key since July 10, 2012 will be revoked on Thursday October 4, 2012 (does this means that the build server has been compromised, undetected, for more than two months?). Potentially there could be 5127 applications signed with the compromised key.

According to the available information, we are in front of a typical targeted attack:

We believe the threat actors established a foothold on a different Adobe machine and then leveraged standard advanced persistent threat (APT) tactics to gain access to the build server and request signatures for the malicious utilities from the code signing service via the standard protocol used for valid Adobe software.

Moreover “Targeted Attacks generate Targeted Attacks” since the malware samples discovered (most of all in case of the pwdump7 “utility”) show the typical features used by Advanced Persistent Threats: compromise one machine, extract information to escalate privileges (see password) and use the initial entry point as a bridgehead to harvest the target network.

So at the end Adobe is the latest high-profile target to join the group of the companies hit by targeted attack: “Through this process we learned a great deal about current issues with code signing and the impact of the inappropriate use of a code signing certificate. We plan to share our lessons learned as well as foster a conversation within the industry about the best way to protect users and minimize the impact on users in cases where the revocation of a certificate becomes necessary (as in this example).”

“Please stay tuned for more details in the coming weeks.”


Get every new post delivered to your Inbox.

Join 3,711 other followers