eHarmony Leak – 1.51 Million Passwords

Well with little sleep to go on I keep reading the articles from the supposed LinkedIn hack.  There was a lot of incomplete information floating around yesterday.  To start off with these hashes were posted on a forum (we all know this already) but the “hacker” was asking for help to crack the hashes … and from what I see, not gloating about a LinkedIn hack.

What else do we see?  Well it was another user on the forum that pointed out the suspicious connection to LinkedIn. All of this from the forum at insidepro.com  The page http://forum.insidepro.com/viewtopic.php?p=96122 looks to be the main thread of the LinkedIn hashes (thanks to Google Cache for keeping this) but insidepro.com has deleted the thread for obvious reasons.  Just do a little Google hacking and you should be able to see it all for yourself.  Start with “dwdm” linkedin site:forum.insidepro.com and your cache awaits.

Now there is also one thing that the majority of tweets and blog posts overlooked yesterday.  eHarmony.com apparently also got nailed in this hack when apparently someone else made a connection to eharmony in another hash list posted by the same guy (dwdm).

“Experts said that the fact that some of the passwords included the phrase “eHarmony” indicated they were taken from the online dating website, which has more than 20 million members worldwide.” – http://www.telegraph.co.uk/technology/news/9316218/LinkedIn-hacker-also-stole-1.5m-passwords-from-dating-site-eHarmony.html  The smaller of the two lists is a wee bit different.  The hashes are not SHA1 but MD5.  This does indicate that the hashes are from a different source.

This is a little piece of one of the “cracked” lists that was posted on the forum for this file.

84f928034c38d9a079d8bd411d820a1f:ILUVCAMERON
57bccd751f2ee5e91bcd3dbe86e81720:ILOVEMARTIN
0a9b4c74cdac8e956a0b21e89099dd21:ELLAMATTHEW
379f947f5e5c61a2373a60988ea92322:COLLINS3411
c5c89c1e4fed2740b58f4fec1e4e2823:HARMONYBABY
bdacef83f0e50d07c2d70e863ea1e523:ELCHAVODEL8
f7701c0adaa1520303c45edb32b0f923:DIVAGODDESS
7f87b6d82415be6d23997ff269042c24:ILOVESANDRA
330aa67a7344a92ebd189ef36d441225:ILOVESOPHIE
15833c399862b6109de6d5dd75481925:LINDS103086
a7d88acd2b1933c35903811dbe4f2c25:JULIANA2323

So what does eHarmony have to say about all this? Well pretty much the same public relations BS that LinkedIn spewed out. If you want to read the propaganda it is right here http://advice.eharmony.com/blog/2012/06/06/update-on-compromised-passwords/  So basically the procedure here is to calm the users down, wait out the storm, and hopefully everyone forgets about it the next time Sony gets hacked.  REALLY!?  As users of these services are we not entitled to a full explanation of the exploit, what was done to repair it, and what will be done to prevent further issues?  This really pisses me off as a LinkedIn user, because they are now probably all sitting back thinking that they have dealt with the issue.  Sure from a people point of view you have, but what about the underlaying technology that is the root cause?  We will never hear about it I am sure.

Well with this new information, and other articles that I have read on the net … maybe these hashes are from linkedin.com and eharmony.com  OK maybe I was wrong, and the two sites did get hacked.  One thing I am still skeptical about though is who hacked the sites, and how did this dwdm guy get his/her hands on the hashes?  Surely anyone who can hack these sites and dump the hashes would know how to download a rainbow table and go to town … right?

So once again I start to think a little.  Where did these hashes come from?  Well as most of us all know the internet goes way beyond the reaches of Google into the digital abyss where you can buy anything, and I mean ANYTHING!  I will not go into details here about how to dive into this world because many have already done it.  One great example is this article http://www.csoonline.com/article/705316/how-online-black-markets-work  So maybe our friend dwdm had some bitcoins just laying around and came across a K-Mart blue light special on hash files.  You know buy the LinkedIn hashes and get the eHarmony hashes for FREE!  Probably not the case, but has it come to the point where “hackers” can break into a web site and don’t know jack about cryptography?

Sure I can sit back and rant and rave about how these guys and gals don’t know everything … but neither do I … or anyone for that matter.  What I can say though is if they were not publicly available I wouldn’t be touching those files with a 10 foot pole!  These people have got balls.  Now if they do this out of curiosity, or if they have malicious intent it doesn’t really matter.  What does matter is the outcome of this.  What have we all learned?

1.  Storing passwords using SHA1 isn’t good enough anymore LinkedIn
2.  Really eHarmony MD5 Passwords are no better
3.  Hackers like any other group will work together to reach a common goal
4.  The public has been schooled a little bit on passwords … MAKE ‘EM LONG!
5.  Most importantly eHarmony, and LinkedIn are now aware that they have a problem, and the public knows it too.  They have to fix it.
6.  Other web sites and companies should learn from LinkedIn’s, and eHarmony’s mistakes and fix their crap before it’s too late.

See if your eHarmony Password was Stolen

Once again I have been so nice and setup a (fairly ugly) PHP app for people to check if their eHarmony password was in the MD5 hash list. So go try it now [link removed]!

See if your LinkedIn Password was Stolen

I have created a simple PHP page that hashes your password and searches the hash list that I downloaded from yandex.ru and lets you know if your password was one of the 6.5 million Start [link removed]!

All Work on this site is not to be reproduced without written permision from Nick Schroedl.