Updated June 23: Important Information for BioWare & EA Account Holders
#151
Posté 24 juin 2011 - 09:02
Past week I got a message about this on my social network about this and already had taken the necessary steps.
Way to go EA! This news is a week old to me.
#152
Posté 24 juin 2011 - 09:05
#153
Guest_frudi_*
Posté 24 juin 2011 - 09:22
Guest_frudi_*
Well, the passwords aren't stored in readable (clear-text) form, but are stored encrypted. Hackers therefore steal the encrypted passwords and have to 'crack' them before they're able to use them.Python Jones wrote...
There is no point in having a long password when hackers just hack the site and steal them.
How fast encrypted passwords can be cracked depends on:
- the length of the password
- the number of possible different characters a password can contain
- the method used to encrypt the password
EA, in all their stupidity, put unacceptable limits on both the length of your password (it maxes out at between 16 and 18 characters) and the characters you can use (just letters and numbers).
Since anyone with $1000 can build a computer that can test billions or even tens of billions of passwords per second, such limitations are completely unacceptable.
#154
Posté 24 juin 2011 - 09:23
Good work fellas...........................................
#155
Posté 24 juin 2011 - 09:25
#156
Posté 24 juin 2011 - 09:38
Quickly making a change and putting it into production after an attack is a sure way to either another breach or even more angry customers. That being said, reducing the charset available for passwords to prevent, say, SQL injection attacks, is the wrong way of doing things.Dreammosaic wrote...
Have to agree with you. I tried to use /
! # $ in my password, long with a mix of upper and lower case letters.
Told me it wasn't accepted.
Really? Like that guy said, you were just hacked and you are still limiting the amount of variety a password can be?
Amazing work, EA/Bioware. Just brilliant.
Python Jones wrote...
There is no point in having a long password when hackers just hack the site and steal them.
Got the email this morning the most annoying thing for me was I just changed password afew days ago :| With stuff like EA Accounts and Steam we should have a chip and pin card but then that requires them to actually spend money on security.
Length of password still matters. What they got were encrypted passwords. Any site that stores its passwords in plaintext should be avoided like an ebola-infeseted leper. What a long, complex password does is buy you time. It makes it less likely that your password is in a dictionary of pre-encrypted passwords, and it makes it harder to find it via brute force.
Two-factor authentication has its own problems. Recently, RSA was attacked and their SecurID token system was compromised, allegedly leading to the breach of some defense contractors. Also, your cost argument is silly. It would just get passed directly to customers. Blizzard has the option of using fobs for their battle.net accounts, and last I checked, they didn't give the fobs away for free.
#157
Posté 24 juin 2011 - 09:42
#158
Posté 24 juin 2011 - 09:50
#159
Posté 24 juin 2011 - 09:57
Not sure what the "decade-old BioWare server system supporting the Neverwinter Nights forums" means though, I've never registered there.
#160
Posté 24 juin 2011 - 10:20
tomaltach wrote...
Length of password still matters. What they got were encrypted passwords. Any site that stores its passwords in plaintext should be avoided like an ebola-infeseted leper. What a long, complex password does is buy you time. It makes it less likely that your password is in a dictionary of pre-encrypted passwords, and it makes it harder to find it via brute force.
Fair enough point but I don't see the point of having a 20+ one, surely the more unique it is the better.
tomaltach wrote...
Two-factor authentication has its own problems. Recently, RSA was attacked and their SecurID token system was compromised, allegedly leading to the breach of some defense contractors. Also, your cost argument is silly. It would just get passed directly to customers. Blizzard has the option of using fobs for their battle.net accounts, and last I checked, they didn't give the fobs away for free.
Thats because ActiBlizzard choose to make a profit from it they're not doing it out of the kindness of their hearts. If EA are gonna link all there games to one account system (especially with it now being your origin account) I would prefer at least some sort of security enhancement.
Modifié par Python Jones, 24 juin 2011 - 10:21 .
#161
Posté 24 juin 2011 - 10:33
Nekator wrote...
Wow... way to go Bio... i posted here when this was made public. Now over a week later i get the damned email (which looks like a bad phising try)??
Yeah I thought the same thing. Even though I'd read about the breach on Kotaku when it first happened, I still thought the email looked way to "fishy", so I just did a regular password reset on the Bioware social site (instead of clicking the link in the email).
#162
Posté 24 juin 2011 - 10:47
frudi wrote...
Well, the passwords aren't stored in readable (clear-text) form, but are stored encrypted. Hackers therefore steal the encrypted passwords and have to 'crack' them before they're able to use them.
How fast encrypted passwords can be cracked depends on:
- the length of the password
- the number of possible different characters a password can contain
- the method used to encrypt the password
EA, in all their stupidity, put unacceptable limits on both the length of your password (it maxes out at between 16 and 18 characters) and the characters you can use (just letters and numbers).
Since anyone with $1000 can build a computer that can test billions or even tens of billions of passwords per second, such limitations are completely unacceptable.
While there are certainly unnecessary restrictions on the character set, it's more than just numbers and letters. I'm not especially fond of the restrictions either, but one should keep things in perspective. Even with just upper and lower case letters and numbers, guessing 10 billion pw/sec would take over two years to exhaust the password space for a 10-character password. Add a single character, and that becomes almost 165 years.
The encryption method can also affect the speed of password discovery. I use a password storage system configured to perform enough transformations on the master password that it takes about 5 seconds to open the database. That 10 billion/sec becomes maybe a few thousand/sec assuming a more modern system and cracking software taking advantage of CPU and GPU cores.
In any case, no matter how long your password is or how long it would take to crack it, if the encrypted password is stolen, it should be changed. Password strength isn't about making you secure. It's about buying you time before your next (un)scheduled password change.
#163
Posté 24 juin 2011 - 10:53
Python Jones wrote...
tomaltach wrote...
Two-factor authentication has its own problems. Recently, RSA was attacked and their SecurID token system was compromised, allegedly leading to the breach of some defense contractors. Also, your cost argument is silly. It would just get passed directly to customers. Blizzard has the option of using fobs for their battle.net accounts, and last I checked, they didn't give the fobs away for free.
Thats because ActiBlizzard choose to make a profit from it they're not doing it out of the kindness of their hearts. If EA are gonna link all there games to one account system (especially with it now being your origin account) I would prefer at least some sort of security enhancement.
Well, my point was that I don't see EA doing it out of the kindness of their hearts either
Edit: fixed broken quoting
Modifié par tomaltach, 24 juin 2011 - 11:07 .
#164
Posté 24 juin 2011 - 11:05
Modifié par tomaltach, 24 juin 2011 - 11:07 .
#165
Posté 24 juin 2011 - 11:42
I had to hunt around the forums before I clicked on the link in the email because I was afraid of a phishing attempt. I certainly was not going to go on the advice of other forum goers for my own security and deemed it necessary that I had to see an official post about this issue. Once I found that I felt safe in clicking the password reset link. Since I know it will be stated by some, I could NOT reset it manually on this site because it had already been flagged as invalid. I should not have had to scroll all the way down to the special social.bioware.com Site Help section, when I didn't even know there was a problem in the first place, until I read the email I was sent a week after the incident.
This isn't really about legacy NWN account, since I think you all will get that straightened out eventually, but I do use (or had used before I changed it) this same information for my Dragon Age account, as well as another game. I also don't entirely fault you guys for the hack, especially when there are people out there purposely targeting companies. It's not something you had control over. However, you did have control over your response to the issue, and that is where I find fault.
To be honest, these entire forums are unworthy of such a large company like Bioware, and your parent EA. I've thought this for a while now, but I certainly wasn't going to make a pissy forum post about it. Please use this as an opportunity to change things for the better and not just put a band-aid on the issue.
K K Slider wrote...
Not sure what the "decade-old BioWare server system supporting the Neverwinter Nights forums" means though, I've never registered there.
The old Neverwinter Nights website (nwn.bioware.com - now just redirecting to the main Bioware page) and forum were organized differently as well as probbaly built on different software. Also, I assume that the statements about servers is a literal one: they were over 10 years old. Who knows how long it's been since they did security patches and so forth. "This is an older game, we don't need to do as much to manage it." So, the servers just sit there, and as long as nothining breaks on the forums, or with the game registration process, there is really no need to maintain them as much. Since NWN is so much older, there will be less traffic to the site and forums, which also decreases the need for maintenance.
As I said above, hopefully this will be a learning experience.
Modifié par nightscrawl, 24 juin 2011 - 11:53 .
#166
Posté 24 juin 2011 - 12:10
K K Slider wrote...
Received the email during the early hours of this morning. Thought it was a phishing attempt. Good job I checked here.
Not sure what the "decade-old BioWare server system supporting the Neverwinter Nights forums" means though, I've never registered there.
I'm in the same exact situation. I too never registered for the Neverwinter Nights forum that was hacked, yet still received the e-mail...and that e-mail looks rather phishy (pardon the pun), especially considering this is the e-mail address it came from "support-bwfbb2bbgwmbfsau65qw3rakctc6rf@em.ea.com"
I do believe more could have been done to make users aware of the breach, as well as make users feel more comfortable with the legitimacy of the password reset e-mail.
Modifié par Y2Kevin, 24 juin 2011 - 12:17 .
#167
Posté 24 juin 2011 - 12:19
I changed my password again today just to be sure but still its annoying as hell.
#168
Posté 24 juin 2011 - 12:32
this ofcourse took me to the ea.com support pages, got the e-mail to reset my password sent to me.
now hotmail didn't actually like this e-mail a whole lot, but i suspect it's because there seems to be a bit of a bug with it, it is from the @em.ea.com line of e-mails i get from all EA stuff, sims etc (yes i play, sue me
but for some reason the e-mail uses @@em.ea.com so i suspect it got flagged for that reason.
suspicious part number two, the e-mail mixed german and norgwegian, i'm norwegian, first paragraph was in german, then it went on to talk about origin in Norwegian, seems really really suspect to me, but then again this is what i got from just using Biowares lost password on the main bioware page, and not through the initial e-mail recived.
anyone else got anything like this in their lost password e-mail?
just to note, the whole page to type inn the e-mail for the password reset on the EA page was also in norwegian, no german mixed inn here.
#169
Posté 24 juin 2011 - 12:37
support.ea.com/app/answers/detail/a_id/5367/showhome/true
When I got the email I questioned it right away and search for info and found above and other sites talking about
#170
Guest_Heed_*
Posté 24 juin 2011 - 12:53
Guest_Heed_*
#171
Posté 24 juin 2011 - 01:00
#172
Posté 24 juin 2011 - 01:29
#173
Posté 24 juin 2011 - 01:30
#174
Posté 24 juin 2011 - 02:05
That being said, I had different passwords for both accounts. Does this mean that both were compromised?
IF it is only the legacy account that's been hacked, why reset EA account passwords? Just for security(better safe than sorry?)?
Modifié par SarKter, 24 juin 2011 - 02:14 .
#175
Posté 24 juin 2011 - 02:26
It's not the security break that's shocking - read about that a week ago on gaming blogs. Rather, for the life of me, I can't remember ever using my work email to register on ANY EA or Bioware associated forums, so I'm a bit spooked by the fact that I received the warning email there.





Retour en haut




