<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Troy Hunt]]></title><description><![CDATA[Hi, I'm Troy Hunt, I write this blog, run "Have I Been Pwned" and am a Microsoft Regional Director and MVP who travels the world speaking at events and training technology professionals]]></description><link>https://www.troyhunt.com/</link><image><url>https://www.troyhunt.com/favicon.png</url><title>Troy Hunt</title><link>https://www.troyhunt.com/</link></image><generator>Ghost 5.79</generator><lastBuildDate>Fri, 23 Feb 2024 06:27:02 GMT</lastBuildDate><atom:link href="https://www.troyhunt.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Weekly Update 387]]></title><description><![CDATA[<p>It&apos;s a short video this week after a few days in Sydney doing both NDC and the Azure user group. For the most part, I spoke about the same things as I did at NDC Security in Oslo last month... except that since then we&apos;ve had</p>]]></description><link>https://www.troyhunt.com/weekly-update-387/</link><guid isPermaLink="false">65d1958aac8a5000010f44d9</guid><category><![CDATA[Weekly update]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Sun, 18 Feb 2024 05:50:01 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2024/02/Splash-Template@1x_1-2.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2024/02/Splash-Template@1x_1-2.jpg" alt="Weekly Update 387"><p>It&apos;s a short video this week after a few days in Sydney doing both NDC and the Azure user group. For the most part, I spoke about the same things as I did at NDC Security in Oslo last month... except that since then we&apos;ve had the Spoutibe incident. It was fascinating to talk about this in front of a live audience and see everyone&apos;s reactions first hand, let&apos;s just say there were a lot of &quot;oh wow!&quot; responses &#x1F632;</p>
<!--kg-card-begin: html-->
<div><div style="width: 170px; display: inline-block; margin-right: 3px;"><a href="https://itunes.apple.com/au/podcast/troy-hunts-weekly-update-podcast/id1176454699?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/05/Listen-on-Apple-Podcasts.svg" alt="Weekly Update 387"></a></div><div style="width: 146px; display: inline-block; margin-right: 3px;"><a href="https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&amp;%3B%3Bisi=691797987&amp;%3B%3Bius=googleplaymusic&amp;%3B%3Bapn=com.google.android.music&amp;%3B%3Blink=https%3A%2F%2Fplay.google.com%2Fmusic%2Fm%2FIf3tw7npymckucxq4q76762ncny%3Ft%3DTroy_Hunt%27s_Weekly_Update_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16&amp;%3B%3Bref=troy-hunt&amp;%3Bref=troy-hunt&amp;ref=troyhunt.com"><img src="https://www.troyhunt.com/content/images/2018/05/Get-it-on-Google-Play.svg" alt="Weekly Update 387"></a></div><div style="width: 118px; display: inline-block; margin-right: 3px;"><a href="https://open.spotify.com/show/7jMtKFohdrw6qmz8AkLqit?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2019/10/spotify.svg" class="kg-image" alt="Weekly Update 387"></a></div><div style="width: 120px; display: inline-block;"><a href="https://omny.fm/shows/troy-hunt-weekly-update/playlists/podcast.rss?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/07/Download-via-RSS.svg" alt="Weekly Update 387"></a></div><iframe width="100%" height="480" src="https://www.youtube.com/embed/OKojaI8t4J4" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></div>
<!--kg-card-end: html-->
<h3 id="references">References</h3><ol><li><a href="https://kolide.com/troyhunt?ref=troyhunt.com" rel="noopener">Sponsored by:&#xA0;Unpatched devices keeping you up at night? Kolide can get your entire fleet updated in days. It&apos;s Device Trust for Okta. Watch the demo!</a></li><li><a href="https://ndcsydney.com/?ref=troyhunt.com" rel="noreferrer">That&apos;s another NDC Sydney done and dusted</a> (my &quot;How I Met Your Data&quot; talk will eventually be online and free to watch)</li><li><a href="https://www.chainalysis.com/blog/ransomware-2024/?ref=troyhunt.com" rel="noreferrer">Ransomware payments finally passed the $1B mark in 2023</a> (I&apos;ve often commented over the last year that it feels like it&apos;s really up-ticked, now here we are)</li><li><a href="https://learn.microsoft.com/en-us/azure/azure-sql/database/serverless-tier-overview?view=azuresql&amp;tabs=general-purpose&amp;ref=troyhunt.com" rel="noreferrer">We&apos;re presently rolling HIBP from Table Storage to serverless SQL Azure</a> (by next week&apos;s update we should actually have this live and I&apos;ll be able to talk a lot more about it)</li><li><a href="https://openai.com/sora?ref=troyhunt.com" rel="noreferrer">OpenAI&apos;s Sora is just mind-blowing mind &#x1F92F;</a> (it&apos;s the rate of change that has so many people stunned, just remember what AI video from text prompts looked like only a year ago...)</li></ol>]]></content:encoded></item><item><title><![CDATA[Weekly Update 386]]></title><description><![CDATA[<p>Somehow, an hour and a half went by in the blink of an eye this week. The Spoutible incident just has so many interesting aspects to it: loads of data that should <em>never </em>be returned publicly, awesome response time to the disclosure, lacklustre transparency in their disclosure, some really fundamental</p>]]></description><link>https://www.troyhunt.com/weekly-update-386/</link><guid isPermaLink="false">65c5c7a23b38ba000167eca3</guid><category><![CDATA[Weekly update]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Fri, 09 Feb 2024 06:55:32 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2024/02/Splash-Template@1x_1-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2024/02/Splash-Template@1x_1-1.jpg" alt="Weekly Update 386"><p>Somehow, an hour and a half went by in the blink of an eye this week. The Spoutible incident just has so many interesting aspects to it: loads of data that should <em>never </em>be returned publicly, awesome response time to the disclosure, lacklustre transparency in their disclosure, some really fundamental misunderstands about hashing algorithms and a controversy-laden past if you read back over events of the last year. Phew! No wonder so much time went on this! (and if you want to just jump directly to the Spoutible bits, that&apos;s at the 8:50 mark)</p>
<!--kg-card-begin: html-->
<div><div style="width: 170px; display: inline-block; margin-right: 3px;"><a href="https://itunes.apple.com/au/podcast/troy-hunts-weekly-update-podcast/id1176454699?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/05/Listen-on-Apple-Podcasts.svg" alt="Weekly Update 386"></a></div><div style="width: 146px; display: inline-block; margin-right: 3px;"><a href="https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&amp;%3B%3Bisi=691797987&amp;%3B%3Bius=googleplaymusic&amp;%3B%3Bapn=com.google.android.music&amp;%3B%3Blink=https%3A%2F%2Fplay.google.com%2Fmusic%2Fm%2FIf3tw7npymckucxq4q76762ncny%3Ft%3DTroy_Hunt%27s_Weekly_Update_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16&amp;%3B%3Bref=troy-hunt&amp;%3Bref=troy-hunt&amp;ref=troyhunt.com"><img src="https://www.troyhunt.com/content/images/2018/05/Get-it-on-Google-Play.svg" alt="Weekly Update 386"></a></div><div style="width: 118px; display: inline-block; margin-right: 3px;"><a href="https://open.spotify.com/show/7jMtKFohdrw6qmz8AkLqit?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2019/10/spotify.svg" class="kg-image" alt="Weekly Update 386"></a></div><div style="width: 120px; display: inline-block;"><a href="https://omny.fm/shows/troy-hunt-weekly-update/playlists/podcast.rss?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/07/Download-via-RSS.svg" alt="Weekly Update 386"></a></div><iframe width="100%" height="480" src="https://www.youtube.com/embed/Cfzq7m8acwg" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></div>
<!--kg-card-end: html-->
<h3 id="references">References</h3><ol><li><a href="https://kolide.com/troyhunt?ref=troyhunt.com" rel="noopener">Sponsored by:&#xA0;Got Linux? (And Mac and Windows and iOS and Android?) Then Kolide has the device trust solution for you. Click here to watch the demo.</a></li><li><a href="https://ndcsydney.com/?ref=troyhunt.com" rel="noreferrer">I&apos;ll be speaking at NDC in Sydney next week</a> (it&apos;s all about &quot;How I Met Your Data&quot;)</li><li><a href="https://www.meetup.com/azure-sydney-user-group/events/298402875/?ref=troyhunt.com" rel="noreferrer">I&apos;ll also be at the Azure Sydney User Group</a> (this one is &quot;Cloud-Enhanced Cybersecurity Tales from the Dark Web&quot;)</li><li><a href="https://www.troyhunt.com/how-spoutibles-leaky-api-spurted-out-a-deluge-of-personal-data/" rel="noreferrer">Spoutible&apos;s spurted deluge of personal data</a> (how much data does it need to be before it&apos;s a deluge? &#x1F914;)</li><li><a href="https://twitter.com/troyhunt/status/1755372975371804981?s=61&amp;t=beHN95Zd9G3fQiuO1h_jzA&amp;ref=troyhunt.com" rel="noreferrer">There are a lot more nuances to hashing algorithms than what many people seem to realise</a> (perhaps most notably is that the strength of the password itself plays an <em>enormous</em> part in how likely a hash is to be cracked)</li></ol>]]></content:encoded></item><item><title><![CDATA[How Spoutible’s Leaky API Spurted out a Deluge of Personal Data]]></title><description><![CDATA[<p>Ever hear one of those stories where as it unravels, you lean in ever closer and mutter &#x201C;No way! <em>No way! NO WAY!</em>&#x201D; This one, as far as infosec stories go, had me leaning and muttering like never before. Here goes:</p><p>Last week, someone reached out to me</p>]]></description><link>https://www.troyhunt.com/how-spoutibles-leaky-api-spurted-out-a-deluge-of-personal-data/</link><guid isPermaLink="false">65beee3d92f29f0001ce1f1a</guid><category><![CDATA[Security]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Mon, 05 Feb 2024 07:36:46 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2024/02/ezgif-4-50602b781b.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2024/02/ezgif-4-50602b781b.jpg" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data"><p>Ever hear one of those stories where as it unravels, you lean in ever closer and mutter &#x201C;No way! <em>No way! NO WAY!</em>&#x201D; This one, as far as infosec stories go, had me leaning and muttering like never before. Here goes:</p><p>Last week, someone reached out to me with what they claimed was a <a href="https://spoutible.com/?ref=troyhunt.com" rel="noreferrer">Spoutible</a> data breach obtained by exploiting an enumerable API. Just your classic case of putting someone else&apos;s username in the URL and getting back data about them, which at first glance I assumed was another scraping situation <a href="https://www.helpnetsecurity.com/2024/01/23/trello-users-data-scraped/?ref=troyhunt.com" rel="noreferrer">like we recently saw with Trello</a>. They sent me a file with 207k scraped records and a URL that looked like this:</p>
<!--kg-card-begin: html-->
<pre><code>https://spoutible.com/sptbl_system_api/main/user_profile_box?username=troyhunt</code></pre>
<!--kg-card-end: html-->
<p>But they didn&apos;t send me my account, in fact I didn&apos;t even have an account at the time and if I&apos;m honest, I had to go and look up exactly what Spoutible was. The penny dropped as I read into it: Spoutible emerged in the wake of Elon taking over Twitter, which left a bunch of folks unhappy with their new social overlord so they sought out alternate platforms. Mastodon and Bluesky were popular options, Spoutible was another <a href="https://twitter.com/cbouzy/status/1753774671168688638?ref=troyhunt.com" rel="noreferrer">which was clearly intended to be an alternative to the incumbent</a>.</p><p>In order to unravel this saga in increasing increments of &quot;no way!&quot; reactions, let&apos;s just start with the basics of what that API endpoint was returning:</p>
<!--kg-card-begin: html-->
<pre><code>{
  err_code: 0,
  status: 200,
  user: {
    id: 735525,
    username: &quot;troyhunt&quot;,
    fname: &quot;Troy&quot;,
    lname: &quot;Hunt&quot;,
    about: &quot;Creator of Have I Been Pwned. Microsoft Regional Director. Pluralsight author. Online security, technology and &#x201C;The Cloud&#x201D;. Australian.&quot;,</code></pre>
<!--kg-card-end: html-->
<p>Pretty standard stuff and I&apos;d expect any of the major social platforms to do exactly the same thing. Name, username, bio and ID are all the sorts of data attributes you&apos;d expect to find publicly available via an API or rendered into the HTML of the website. These fields, however, are quite different:</p>
<!--kg-card-begin: html-->
<pre><code>email: &quot;[redacted]&quot;,
ip_address: &quot;[redacted]&quot;,
verified_phone: &quot;[redacted]&quot;,
gender: &quot;M&quot;,</code></pre>
<!--kg-card-end: html-->
<p>Ok, that&apos;s now a &quot;no way!&quot; because I had no expectation at all of any of that data being publicly available (note: phone number is optional, I chose to add mine). It&apos;s certainly not indicated on the pages where I entered it:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/02/image.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="764" height="426" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image.png 600w, https://www.troyhunt.com/content/images/2024/02/image.png 764w"></figure><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/02/image-1.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="762" height="368" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image-1.png 600w, https://www.troyhunt.com/content/images/2024/02/image-1.png 762w"></figure><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/02/image-10.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="760" height="424" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image-10.png 600w, https://www.troyhunt.com/content/images/2024/02/image-10.png 760w"></figure><p>But it&apos;s also not that different to previous scraping incidents; the aforementioned Trello scrape exposed the association of email addresses to usernames and <a href="https://www.troyhunt.com/the-facebook-phone-numbers-are-now-searchable-in-have-i-been-pwned/" rel="noreferrer">the Facebook scrape of a few years ago</a> did the same thing with phone numbers. That&apos;s not unprecedented, but this is:</p>
<!--kg-card-begin: html-->
<pre><code>password: &quot;$2y$10$B0EhY/bQsa5zUYXQ6J.NkunGvUfYeVOH8JM1nZwHyLPBagbVzpEM2&quot;,</code></pre>
<!--kg-card-end: html-->
<p><em>No way!</em> Is it... real? Is that genuinely a bcrypt hash of my own password? Yep, <a href="https://bcrypt.online/?ref=troyhunt.com" rel="noreferrer">that&apos;s exactly what it is</a>:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/02/image-2.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="1046" height="454" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image-2.png 600w, https://www.troyhunt.com/content/images/size/w1000/2024/02/image-2.png 1000w, https://www.troyhunt.com/content/images/2024/02/image-2.png 1046w"></figure><p><strong>The Spoutible API enabled any user to retrieve the bcrypt hash of any other user&apos;s password.</strong></p><p>I had to check, double check then triple check to make sure this was the case because I can only think of one other time I&apos;ve ever seen an API do this...</p><p>&lt;TangentialStory&gt;</p><p>During <a href="https://www.troyhunt.com/today-marks-two-important-milestones/" rel="noreferrer">my 14 years at Pfizer</a>, I once reviewed an iOS app built for us by a low-cost off-shored development shop. I proxied the app through Fiddler, watched the requests and found an API that was returning every user record in the system and for each user, their corresponding password in plain text. When quizzing the developers about this design decision, their response was - and I kid you not, this isn&apos;t made up - &quot;don&apos;t worry, our users don&apos;t use Fiddler&quot; &#x1F926;&#x200D;&#x2642;&#xFE0F;</p><p>&lt;/TangentialStory&gt;</p><p>I cannot think of any reason ever to return any user&apos;s hashed password to any interface, including an appropriately auth&apos;d one where only the user themselves would receive it. There is <em>never</em> a good reason to do this. And even though bcrypt is the accepted algorithm of choice for storing passwords these days, it&apos;s far from uncrackable <a href="https://www.troyhunt.com/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages/" rel="noreferrer">as I showed 7 years ago now after the Cloudpets breach</a>. Here I used a small dictionary of weak, predictable passwords and easily cracked a bunch of the hashes. Weak passwords like... &quot;spoutible&quot;. Wondering just how crazy things would get, I checked the change password page and found I could easily create a password of 6 or more characters (so long as it didn&apos;t exceed 20 characters) with no checks on strength whatsoever:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/02/image-3.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="770" height="670" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image-3.png 600w, https://www.troyhunt.com/content/images/2024/02/image-3.png 770w"></figure><p>Strong hashing algorithms like bcrypt are weakened when poor password choices are allowed and strong password choices (such as having more than 20 characters in it), are blocked. For exactly the same reason breached services advise customers to change their passwords even when hashed with a strong algorithm, all Spoutible users are now in the same boat - change you password!</p><p>But fortunately these days many people make use of 2 factor authentication to protect against account takeover attacks where the adversary knows the password. Which brings us to the next piece of data the API returned:</p>
<!--kg-card-begin: html-->
<pre><code>2fa_secret: &quot;7GIVXLSNKM47AM4R&quot;,
2fa_enabled_at: &quot;2024-02-03 02:26:11&quot;,
2fa_backup_code: &quot;$2y$10$6vQRDRDHVjyZdndGUEKLM.gmIIZVDq.E5NWTWti18.nZNQcqsEYki&quot;,</code></pre>
<!--kg-card-end: html-->
<p><em>Oh wow!</em> Why?! Let&apos;s break this down and explore both the first and last line. The 2FA secret is the seed that&apos;s used to generate the one time password to be used as the second factor. If you - as an attacker - know this value then 2FA is rendered useless. To test that this was what it looked like, I asked <a href="https://haveibeenpwned.com/About?ref=troyhunt.com" rel="noreferrer">Stef&#xE1;n</a> to retrieve my data from the public API, take the 2FA secret and send me the OTP:</p><figure class="kg-card kg-image-card"><img src="https://www.troyhunt.com/content/images/2024/02/image-4.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="542" height="310"></figure><p>It was a match. <em>If</em> Stef&#xE1;n&#xA0;could have cracked my bcrypted password hash (and he&apos;s a smart guy so &quot;spoutible&quot; would have definitely been in his word list), he could have then passed the second factor challenge. And the 2FA backup code? Thinking that would also be exactly what it looked like, I&apos;d screen grabbed it when enabling 2FA:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/02/image-5.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="622" height="266" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image-5.png 600w, https://www.troyhunt.com/content/images/2024/02/image-5.png 622w"></figure><p>Now, using the same bcrypt hash checker as I did for the password, here&apos;s what I found:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/02/image-6.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="1058" height="468" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image-6.png 600w, https://www.troyhunt.com/content/images/size/w1000/2024/02/image-6.png 1000w, https://www.troyhunt.com/content/images/2024/02/image-6.png 1058w"></figure><p>What I just don&apos;t get is if you&apos;re going to return the 2FA secret anyway, why bother bcrypting the backup code? And further, it&apos;s only a 6 digit number, do you know how long it takes to crack a bcrypted 6 digit number? Let&apos;s find out:</p>
<!--kg-card-begin: html-->
<blockquote class="twitter-tweet"><p lang="und" dir="ltr">570075, 2m59s</p>&#x2014; Martin Sundhaug (@sundhaug92@mastodon.social) (@sundhaug92) <a href="https://twitter.com/sundhaug92/status/1753977138133242028?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">February 4, 2024</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<!--kg-card-end: html-->
<p>Many other people worked it out in single-digit minutes as well, but Martin did it fastest at the time of writing so he gets the shout-out &#x1F60A;</p><p>You know how I said you&apos;d keep leaning in further and further? Yeah, we&apos;re not done yet because then I found this:</p>
<!--kg-card-begin: html-->
<pre><code>em_code: &quot;c62fcf3563dc3ab38d52ba9ddb37f9b1577d1986&quot;</code></pre>
<!--kg-card-end: html-->
<p>Maybe I&apos;ve just seen too many data breaches before, but as vague as this looks I had a really good immediate hunch of what it was but just to be sure, I logged out and went to the password reset page:</p><figure class="kg-card kg-image-card"><img src="https://www.troyhunt.com/content/images/2024/02/image-7.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="466" height="366"></figure><p>Leaning in far enough now, anticipating what&apos;s going to happen next? Yep, it&apos;s exactly what you thought:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/02/image-8.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="650" height="282" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image-8.png 600w, https://www.troyhunt.com/content/images/2024/02/image-8.png 650w"></figure><figure class="kg-card kg-image-card"><img src="https://www.troyhunt.com/content/images/2024/02/image-9.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="744" height="961" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image-9.png 600w, https://www.troyhunt.com/content/images/2024/02/image-9.png 744w" sizes="(min-width: 720px) 720px"></figure><p><strong><em>NO WAY!</em> Exposed password reset tokens meant that anyone could immediately takeover anyone else&apos;s account &#x1F92F;</strong></p><p>After changing the password, no notification email was sent to the account holder so just to make things even worse, if someone&apos;s account was taken over using this technique they&apos;d have absolutely no idea until they either realised their original password no longer worked or their account started spouting weird messages. There&apos;s also no way to see if there are other active sessions, for example <a href="https://twitter.com/settings/sessions/?ref=troyhunt.com" rel="noreferrer">the way Twitter shows them</a>:</p><figure class="kg-card kg-image-card"><img src="https://www.troyhunt.com/content/images/2024/02/image-13.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="590" height="766"></figure><p>Further, changing the password doesn&apos;t invalidate existing sessions so as best as I can tell, if someone has successfully accessed someone else&apos;s Spoutible account there&apos;s no way to know and no way to boot them out again. That&apos;s going to make recovering from this problematic unless Spoutible has another mechanism to invalidate all active sessions.</p><p>The one saving grace is that the token was rotated after reset so you can&apos;t use the one in the image above, but of course the <em>new one</em> was now publicly exposed in the API! And there&apos;s no 2FA challenge on password reset either but of course even if there was, well, you already read this far so you know how that could have been easily circumvented.</p><p>There&apos;s just one more &quot;oh wow!&quot; remaining, and it&apos;s the ease with which the vulnerable API was found. Spoutible has a feature called <a href="https://spoutible.com/pod/65bed4fa1db49c2a3f15f345?ref=troyhunt.com" rel="noreferrer">Pods</a> and when you browse to that page, people listening to the pod are displayed with the ability to hover over their profile and display further information. For example, here&apos;s Rosetta and if we watch the request that&apos;s made in the dev tools...</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/02/image-12.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="1348" height="1116" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image-12.png 600w, https://www.troyhunt.com/content/images/size/w1000/2024/02/image-12.png 1000w, https://www.troyhunt.com/content/images/2024/02/image-12.png 1348w"></figure><p>By design, all the personal information including email and IP address, phone number, gender, bcrypt hashed password, 2FA secret and backup code <em>and</em> the code that can be immediately used to reset the password is returned to every single person that uses this feature. How many times has this API spouted troves of personal data out to people without them even knowing? Who knows, but I do know it wasn&apos;t the only API doing that because the one that listed the pods <em>also</em> did it:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/02/image-11.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="1076" height="889" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image-11.png 600w, https://www.troyhunt.com/content/images/size/w1000/2024/02/image-11.png 1000w, https://www.troyhunt.com/content/images/2024/02/image-11.png 1076w"></figure><p>Because the vulnerable APIs was requested organically as a natural part of using the service as it was intended, Spoutible almost certainly won&apos;t be able to fully identify abuse of it. To use <a href="https://arstechnica.com/tech-policy/2022/02/missouri-governor-rebuffed-journalist-wont-be-prosecuted-for-viewing-html/?ref=troyhunt.com" rel="noreferrer">the definition of the infamous Missouri governor who recently attempt to prosecute a journalist for pressing F12</a>, <em>everyone</em> who used those features inadvertently became a hacker.</p><p>Just one last finding and I&apos;ve not been able to personally validate it so let&apos;s keep it out of &quot;oh wow!&quot; scope: the individual that sent me the data and details of the vulnerability said that the exposed data includes access tokens for other platforms. A couple of months ago, <a href="https://wedistribute.org/2023/12/spoutible-cross-posting/?ref=troyhunt.com" rel="noreferrer">Spoutible announced cross-posting to Mastodon and Bluesky</a> and my own data does have a &quot;cross_posting_auth&quot; node, albeit set to null. I couldn&apos;t see anywhere within the UI to enable this feature, but there are profiles with values in there. During the disclosure process (more on that soon), Spoutible did say that those value were encrypted and without evidence of a private key compromise, they believe they&apos;re safe.</p><p>Here&apos;s my full record as it was originally returned by the vulnerable API:</p>
<!--kg-card-begin: html-->
<style>
.gist-data{
    height:300px;
    overflow-y: visible;
}
</style>
<script src="https://gist.github.com/troyhunt/47c486211aaefd5902b20e0260be73d6.js"></script>
<!--kg-card-end: html-->
<p>To be as charitable as possible to Spoutible, you could argue that this is largely just the one vulnerability that is the inadvertent exposure of internal data via a public API. This is data that has a legitimate purpose in their system and it may simply be a case of a framework automatically picking all entity attributes up from the data tier and returning them via the UI. But it&apos;s the circumstances that allowed this to happen and then exacerbated the problem when it did that concern me more; clearly there&apos;s been no security review around this feature because it was so easily discoverable (at least there certainly wasn&apos;t review whilst it was live), nor has been any thought put in to notifying people of potential account takeovers or providing them with the means to invalidate other sessions. Then there are periphery issues such as very weak password rules that make cracking bcrypt so much easier, weak 2FA backup codes and pointless bcrypting of them. Not major issues in and of themselves, but they amplify the problems the exposed data presents.</p><p>Clearly this required disclosure before publication, unfortunately <a href="https://spoutible.com/.well-known/security.txt?ref=troyhunt.com" rel="noreferrer">Spoutible does not publish a security.txt file</a> so I went directly to the founder <a href="https://twitter.com/cbouzy?ref=troyhunt.com" rel="noreferrer">Christopher Bouzy</a> on both Twitter and email (obviously I could have reached out on Spoutible, but he&apos;s very active on Twitter and my profile has more credibility there than a brand new Spoutible account). Here&apos;s the timeline, all AEST:</p><ol><li>4 Feb, 15:30: Initial outreach asking for security contact</li><li>4 Feb, 17:27: Response from Spoutible </li><li>4 Feb, 18:31: Full details provided to Spoutible</li><li>4 Feb, 19:48 (or earlier): API is fixed</li><li>5 Feb 01:28 (or earlier): <a href="https://help.spoutible.com/support/solutions/articles/150000174284-important-security-update?ref=troyhunt.com" rel="noreferrer">Announcement made about the incident</a></li><li>5 Feb 07:52: Spoutible confirmed all em_code values have been rotated</li></ol><p>To give credit where it&apos;s due, Spoutible&apos;s response time was excellent. In the space of only about 4 hours, the data returned by the API had a huge number of attributes trimmed off it and now aligns with what I&apos;d expect to see (although the 207k previously scraped records obviously still contain all the data). I&apos;ll also add that Christopher&apos;s communication with me commendable; he&apos;s clearly genuinely passionate about the platform and was dismayed to learn of the vulnerability. I&apos;ve dealt with many founders of projects in the past that had suffered data breaches and it&apos;s especially personal for them, having poured so much of themselves into it.</p><p>Here&apos;s their disclosure in its entirety:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/02/image-14.png" class="kg-image" alt="How Spoutible&#x2019;s Leaky API Spurted out a Deluge of Personal Data" loading="lazy" width="732" height="1188" srcset="https://www.troyhunt.com/content/images/size/w600/2024/02/image-14.png 600w, https://www.troyhunt.com/content/images/2024/02/image-14.png 732w"></figure><p>The revised API is now returning over 80% less data and looks like this:</p>
<!--kg-card-begin: html-->
<script src="https://gist.github.com/troyhunt/649eb212a736a55929477f687416f800.js"></script>
<!--kg-card-end: html-->
<p>If you&apos;re a detail person, yes, the forward slashes are no longer escaped and the remaining fields are ordered slightly differently so it looks like the JSON encoder has changed. In case you&apos;re interested, <a href="https://www.diffchecker.com/5GQl6DPS/?ref=troyhunt.com" rel="noreferrer">here&apos;s a link to a diff between the two</a> with a little bit of manipulation to make it easier to see precisely what&apos;s changed.</p><p>As to my own advice to Spoutible users, here are the actions I&apos;d recommend:</p><ol><li>Change your Spoutible password and change any other account you reused that password on</li><li>If you had 2FA turned on for Spoutible, turn it off then back on again so that it generates a different secret</li><li>If you enabled cross-posting to Mastodon or Bluesky, out of an abundance of caution you should invalidate the keys on those platforms</li><li>Recognise that your email address, IP address, phone number if you added it and any intentionally publicly visible data associated to your profile may have been exposed</li></ol><p>The 207k exposed email addresses that were sent to me are now searchable in <a href="https://haveibeenpwned.com/?ref=troyhunt.com" rel="noreferrer">Have I Been Pwned</a> and my impacted subscribers have received email notifications.</p>]]></content:encoded></item><item><title><![CDATA[Weekly Update 385]]></title><description><![CDATA[<p>I told ya so. Right from the beginning, it was pretty obvious what &quot;MOAB&quot; was probably going to be and sure enough, this tweet came true:</p>
<!--kg-card-begin: html-->
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">Interesting find by <a href="https://twitter.com/MayhemDayOne?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">@MayhemDayOne</a>, wonder if it was from a shady breach search service (we&#x2019;ve seen a bunch shut down</p></blockquote>]]></description><link>https://www.troyhunt.com/weekly-update-385/</link><guid isPermaLink="false">65c03e4192f29f0001ce20dd</guid><category><![CDATA[Weekly update]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Mon, 05 Feb 2024 02:01:04 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2024/02/Splash-Template@1x_1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2024/02/Splash-Template@1x_1.jpg" alt="Weekly Update 385"><p>I told ya so. Right from the beginning, it was pretty obvious what &quot;MOAB&quot; was probably going to be and sure enough, this tweet came true:</p>
<!--kg-card-begin: html-->
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">Interesting find by <a href="https://twitter.com/MayhemDayOne?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">@MayhemDayOne</a>, wonder if it was from a shady breach search service (we&#x2019;ve seen a bunch shut down over the years)? Either way, collecting and storing this data is now trivial so not a big surprise to see someone screw up their permissions and (re)leak it all. <a href="https://t.co/DM7udeUcRk?ref=troyhunt.com">https://t.co/DM7udeUcRk</a></p>&#x2014; Troy Hunt (@troyhunt) <a href="https://twitter.com/troyhunt/status/1749545280394133650?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">January 22, 2024</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<!--kg-card-end: html-->
<p>What I didn&apos;t know at the time was the hilarity of how similar this service would be to those that had come before it... and been shut down by law enforcement agencies. I mean seriously, when you&apos;re literally copying and pasting clauses from LeakedSource, what do you think is going to happen?! I sense another &quot;I told ya so&quot; coming...</p>
<!--kg-card-begin: html-->
<div><div style="width: 170px; display: inline-block; margin-right: 3px;"><a href="https://itunes.apple.com/au/podcast/troy-hunts-weekly-update-podcast/id1176454699?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/05/Listen-on-Apple-Podcasts.svg" alt="Weekly Update 385"></a></div><div style="width: 146px; display: inline-block; margin-right: 3px;"><a href="https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&amp;%3B%3Bisi=691797987&amp;%3B%3Bius=googleplaymusic&amp;%3B%3Bapn=com.google.android.music&amp;%3B%3Blink=https%3A%2F%2Fplay.google.com%2Fmusic%2Fm%2FIf3tw7npymckucxq4q76762ncny%3Ft%3DTroy_Hunt%27s_Weekly_Update_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16&amp;%3B%3Bref=troy-hunt&amp;%3Bref=troy-hunt&amp;ref=troyhunt.com"><img src="https://www.troyhunt.com/content/images/2018/05/Get-it-on-Google-Play.svg" alt="Weekly Update 385"></a></div><div style="width: 118px; display: inline-block; margin-right: 3px;"><a href="https://open.spotify.com/show/7jMtKFohdrw6qmz8AkLqit?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2019/10/spotify.svg" class="kg-image" alt="Weekly Update 385"></a></div><div style="width: 120px; display: inline-block;"><a href="https://omny.fm/shows/troy-hunt-weekly-update/playlists/podcast.rss?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/07/Download-via-RSS.svg" alt="Weekly Update 385"></a></div><iframe width="100%" height="480" src="https://www.youtube.com/embed/8tdLMISsOWw" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></div>
<!--kg-card-end: html-->
<h3 id="references">References</h3><ol><li><a href="https://report-uri.com/?src=troyhunt.com&amp;ref=troyhunt.com" rel="noreferrer">Sponsored by: Report URI: Guarding you from rogue JavaScript! Don&#x2019;t get pwned; get real-time alerts &amp; prevent breaches #SecureYourSite</a></li><li><a href="https://www.troyhunt.com/the-data-breach-personal-stash-ecosystem/" rel="noreferrer">&quot;MOAB&quot; was the breach that wasn&apos;t</a> (but it&apos;s very much the shady breach site that really is)</li><li><a href="https://twitter.com/troyhunt/status/1751401970945142792?ref=troyhunt.com" rel="noreferrer">I expected the poll on the impact of scraping to be more emphatically against it</a> (but I do wonder if that&apos;s simply an issue of the short poll not properly explaining the impact)</li><li><a href="https://twitter.com/troyhunt/status/1752627031391797431?ref=troyhunt.com" rel="noreferrer">The Europcar breach wasn&apos;t a breach at all, but that&apos;s not what&apos;s noteworthy about it</a> (<em>not everything is &quot;AI&quot; FFS you over-hyped marketing droids!</em>)</li></ol>]]></content:encoded></item><item><title><![CDATA[The Data Breach "Personal Stash" Ecosystem]]></title><description><![CDATA[<p>I&apos;ve always thought of it a bit like baseball cards; a kid has a card of this one player that another kid is keen on, and that kid has a card the first one wants so they make a trade. They both have a bunch of cards they&</p>]]></description><link>https://www.troyhunt.com/the-data-breach-personal-stash-ecosystem/</link><guid isPermaLink="false">65b6b60ecfc8e00001a12a2e</guid><category><![CDATA[Have I Been Pwned]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Mon, 29 Jan 2024 08:07:33 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2024/01/ezgif-7-88792e93e9.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2024/01/ezgif-7-88792e93e9.jpg" alt="The Data Breach &quot;Personal Stash&quot; Ecosystem"><p>I&apos;ve always thought of it a bit like baseball cards; a kid has a card of this one player that another kid is keen on, and that kid has a card the first one wants so they make a trade. They both have a bunch of cards they&apos;ve collected over time and by virtue of existing in the same social circles, trades are frequent, and cards flow back and forth on a regular basis. That&apos;s the analogy I often use to describe the data breach &quot;personal stash&quot; ecosystem, but with one key difference: if you trade a baseball card then you no longer have the original card, but if you trade a data breach which is merely a digital file, it replicates.</p><p>There are personal stashes of data breaches all over the place and they&apos;re usually presented like this one:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/image-5.png" class="kg-image" alt="The Data Breach &quot;Personal Stash&quot; Ecosystem" loading="lazy" width="932" height="462" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/image-5.png 600w, https://www.troyhunt.com/content/images/2024/01/image-5.png 932w"></figure><p>You&apos;ll recognise many of those names because they&apos;re noteworthy incidents that received a bunch of press. My Space. Adobe. LinkedIn. Ashley Madison.</p><p>The same incidents appear here:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/image-7.png" class="kg-image" alt="The Data Breach &quot;Personal Stash&quot; Ecosystem" loading="lazy" width="806" height="480" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/image-7.png 600w, https://www.troyhunt.com/content/images/2024/01/image-7.png 806w"></figure><p>And so on and so forth. Stashes of breaches like this are <em>all over the place</em> and they fuel an exchange ecosystem that replicates billions of records of personal data over and over again. Your data. My data. The data of a significant portion of the global internet-using population, just freely flowing backwards and forwards not just in the shady corners of &quot;the dark web&quot; but traded out there in the clear on mainstream websites. Until inevitably:</p><figure class="kg-card kg-gallery-card kg-width-wide"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://www.troyhunt.com/content/images/2024/01/download.png" width="1600" height="900" loading="lazy" alt="The Data Breach &quot;Personal Stash&quot; Ecosystem" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/download.png 600w, https://www.troyhunt.com/content/images/size/w1000/2024/01/download.png 1000w, https://www.troyhunt.com/content/images/2024/01/download.png 1600w" sizes="(min-width: 1200px) 1200px"></div></div></div></figure><p><a href="https://www.euronews.com/next/2023/06/02/raidforums-the-child-hacker-facing-extradition-to-the-us?ref=troyhunt.com" rel="noreferrer">Diogo Santos Coelho was 14 when he started RaidForums</a>, and <a href="https://www.vice.com/en/article/dyp9nk/fbi-doj-law-enforcement-seize-raidforums?ref=troyhunt.com" rel="noreferrer">was 21 by the time he was arrested for running the service 2 years ago.</a> A kid, exchanging data without the maturity to understand the consequences of his actions. RaidForums left a void that was quickly filled by BreachForums:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/banner.jpg" class="kg-image" alt="The Data Breach &quot;Personal Stash&quot; Ecosystem" loading="lazy" width="1920" height="1077" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/banner.jpg 600w, https://www.troyhunt.com/content/images/size/w1000/2024/01/banner.jpg 1000w, https://www.troyhunt.com/content/images/size/w1600/2024/01/banner.jpg 1600w, https://www.troyhunt.com/content/images/2024/01/banner.jpg 1920w"></figure><p><a href="https://techcrunch.com/2023/03/24/how-the-fbi-caught-the-breachforums-admin/?ref=troyhunt.com" rel="noreferrer">Conor Fitzpatrick was 20 years old when he was finally picked up for running the service last year</a>. Still just a kid, at least in the colloquial fashion in which we refer to youngsters as when we get a bit older, but surely still legally a minor when he chose to begin collecting data breaches.</p><p>Websites like these are taken down for a simple reason:</p><p><strong>The ecosystem of personal stashes exchanged with other parties fuels crime.</strong></p><p>For example, data breaches seed services set up with the express intent of monetising a broad range of personal attributes to the detriment of people who are <em>already </em>victims of a breach. Call them shady versions of Have I Been Pwned if you will, and this talk I gave at AusCERT a couple of years ago is a great explainer (deep-linked to the start of that segment):</p>
<!--kg-card-begin: html-->
<iframe width="100%" height="480" src="https://www.youtube.com/embed/93_z-iulJ6A?start=1191" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe>
<!--kg-card-end: html-->
<p>The first service I spoke about in that segment was We Leak Info and <a href="https://arstechnica.com/information-technology/2020/01/fbi-partners-sieze-breach-data-marketplace-alleged-operators-arrested/?ref=troyhunt.com" rel="noreferrer">it was run by two 22 year old guys</a>. The website first appeared 3 years earlier - only a year after the creators had left childhood - and it allowed anyone with the money to access anyone else&apos;s personal data including:</p><blockquote>names, email addresses, usernames, phone numbers, and passwords</blockquote><p><a href="https://therecord.media/operator-of-weleakinfo-database-marketplace-sentenced-to-two-years-in-prison?ref=troyhunt.com" rel="noreferrer">One of the duo was later sentenced to 2 years in prison for his role</a>, and when you read the sorts of conversations they were having, you can&apos;t help but think they behaved exactly like you&apos;d expect a couple of young guys who thought they were anonymous would:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/2021_05_We_Leak_Info_chat_fb44a5ec90.png" class="kg-image" alt="The Data Breach &quot;Personal Stash&quot; Ecosystem" loading="lazy" width="791" height="300" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/2021_05_We_Leak_Info_chat_fb44a5ec90.png 600w, https://www.troyhunt.com/content/images/2024/01/2021_05_We_Leak_Info_chat_fb44a5ec90.png 791w"></figure><p>In the video, I mentioned Jordan Bloom in relation to LeakedSource, a veritable older gentleman of this class of crime <a href="https://krebsonsecurity.com/2018/01/canadian-police-charge-operator-of-hacked-password-service-leakedsource-com/?ref=troyhunt.com" rel="noreferrer">being 24 when the site first appeared</a>. He eventually <a href="https://www.securityweek.com/leakedsource-operator-pleads-guilty-canada/?ref=troyhunt.com" rel="noreferrer">pled guilty to charges that included trafficking identity information</a> and when you read what that involved, you can see why this would attract the ire of law enforcement agencies:</p><blockquote>However, unlike other breach notification services, such as Have I Been Pwned, LeakedSource also gave subscribers access to usernames, passwords (including in clear text), email addresses and IP addresses. LeakedSource services were often advertised on hacking forums and there was suspicion that its operators were actively looking to hack organizations whose data they could add to their database.</blockquote><p>In 2016, a well-wisher purchased my own data from LeakedSource and sent over a dozen different records similar to this one:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/image-8.png" class="kg-image" alt="The Data Breach &quot;Personal Stash&quot; Ecosystem" loading="lazy" width="981" height="462" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/image-8.png 600w, https://www.troyhunt.com/content/images/2024/01/image-8.png 981w"></figure><p>Not mentioned in my talk but running in the same era was Leakbase, yet another service that collated huge volumes of sensitive data and sold it to absolutely anyone:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/image-9.png" class="kg-image" alt="The Data Breach &quot;Personal Stash&quot; Ecosystem" loading="lazy" width="998" height="737" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/image-9.png 600w, https://www.troyhunt.com/content/images/2024/01/image-9.png 998w"></figure><p>And just like all the other ones, the same data appeared over and over again:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/image-10.png" class="kg-image" alt="The Data Breach &quot;Personal Stash&quot; Ecosystem" loading="lazy" width="1136" height="214" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/image-10.png 600w, https://www.troyhunt.com/content/images/size/w1000/2024/01/image-10.png 1000w, https://www.troyhunt.com/content/images/2024/01/image-10.png 1136w"></figure><p><a href="https://krebsonsecurity.com/2017/12/hacked-password-service-leakbase-goes-dark/?ref=troyhunt.com" rel="noreferrer">It went dark at the end of 2017</a> amidst speculation the disappearance was tied to the takedown of the Hansa dark web market. If that was the case, why did we never hear of charges being laid as we did with We Leak Info and LeakedSource? Could it be that the operator of Leakbase was only ever so slightly younger than the other guys mentioned above and not having yet reached adulthood, managed to dodge charges? It would certainly be consistent with the demographic pattern of those with personal stashes of data breaches.</p><p>Speaking of patterns: We <strong>Leak</strong> Info, <strong>Leaked</strong>Source, <strong>Leak</strong>base - it&apos;s like there&apos;s a theme of shady services attached to the word. As I say in the video, there&apos;s also a theme of attempting to remain anonymous (which clearly hasn&apos;t worked very well!),  and a theme of attempting to eschew legal responsibility for how the data is used by merely putting words in the terms of service. For example, here&apos;s Jordan&apos;s go at deflecting his role in the ecosystem and yes, this was <em>the entire terms of service:</em></p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/image-12.png" class="kg-image" alt="The Data Breach &quot;Personal Stash&quot; Ecosystem" loading="lazy" width="953" height="833" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/image-12.png 600w, https://www.troyhunt.com/content/images/2024/01/image-12.png 953w"></figure><p>I particularly like this clause:</p><blockquote>You may only use this tool for your own personal security and data research. You may only search information about yourself, or those you are authorized in writing to do so.</blockquote><p><em>That&apos;s not going to keep you out of trouble!</em> Time and time again, I see this sort of wording on services used as if it&apos;s going to make a difference when the law comes asking hard questions; &quot;Hey we literally told people to play nice with the data!&quot;</p><p><a href="https://web.archive.org/web/20190709223052/https://weleakinfo.com/legal/tos" rel="noreferrer">We Leak Info used similar entertaining wording</a> with some of the highlights including:</p><ol><li>We Leak Info strictly prohibits the use of its Services to cause damage or harm to others</li><li>You may not use Our Services in acts deemed illegal by the laws in Your region</li><li>We Leak Info does not knowingly participate in the act of obtaining or distributing Data</li><li>We Leak Info will cooperate with any legal investigations that it determines worthy and valid at its own discretion</li></ol><p>That last one in particular is an absolute zinger! But again, remember, we&apos;re talking about guys who stood this service up as teenagers and literally worked on the assumption of &quot;as [l]ong as we cooperate they [the FBI] won&apos;t fuck with us&quot; &#x1F926;&#x200D;&#x2642;&#xFE0F; The ignorance of that attitude whilst advertising services on criminal forums is just mind-blowing, even for kids.</p><p>All of which brings me to the inspiration for this blog post:</p>
<!--kg-card-begin: html-->
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">Interesting find by <a href="https://twitter.com/MayhemDayOne?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">@MayhemDayOne</a>, wonder if it was from a shady breach search service (we&#x2019;ve seen a bunch shut down over the years)? Either way, collecting and storing this data is now trivial so not a big surprise to see someone screw up their permissions and (re)leak it all. <a href="https://t.co/DM7udeUcRk?ref=troyhunt.com">https://t.co/DM7udeUcRk</a></p>&#x2014; Troy Hunt (@troyhunt) <a href="https://twitter.com/troyhunt/status/1749545280394133650?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">January 22, 2024</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<!--kg-card-end: html-->
<p>It&apos;s like I&apos;ve seen it all before! No, really, because only a couple of days later someone running a service popped up and claimed responsibility for having exposed the data due to &quot;a firewall misconfiguration&quot;. I&apos;m not going to name or link the service, but I will describe a few key features:</p><ol><li>After purchasing access, it returns extensive personal information exposed in data breaches including names, email addresses, usernames, phone numbers, and passwords</li><li>The operator is clearly trying to remain anonymous with no discoverable information about who is running it</li><li>It has ToS that include: &quot;You may only use this service for your own personal security and research. Furthermore, you may only search for information about yourself or those who you are authorized in writing to do so.&quot; (I know what you&apos;re thinking, <a href="https://www.diffchecker.com/HIK8x7rG/?ref=troyhunt.com" rel="noreferrer">so I diff&apos;d it for you</a>)</li><li>The name of the service starts with the word &quot;leak&quot;</li></ol><p>I could write predictions about the future of this service but if you&apos;ve read this far and paid attention to the precedents, you can reliably form your own conclusion. The outcome is easily predictable and indeed it was the predictability of the whole situation when I started getting bombarded with queries about the &quot;Mother of all Breaches&quot; that frustrated me; <em>of course</em> it was someone&apos;s personal stash, because we&apos;ve seen it all before and we live in an era where it&apos;s dead easy to build services like this. Cloud is ubiquitous and storage is cheap, you can stand up great looking websites in next to no time courtesy of freely available templates, and the whole data breach trading ecosystem I referred to earlier can easily seed services like this.</p><p>Maybe the young guy running this service (assuming the previously observed patterns apply) will learn from history and quietly exit while the getting is good, I don&apos;t know, time will tell. At the very least, if he reads this and takes nothing else away, <em>don&apos;t go driving around in a bright green Lamborghini!</em></p>]]></content:encoded></item><item><title><![CDATA[Weekly Update 384]]></title><description><![CDATA[<p>I spent longer than I expected talking about Trello this week, in part because I don&apos;t feel the narrative they presented properly acknowledges their responsibility for the incident and in part because I think the impact of scraping in general is misunderstood. I suspect many of us are</p>]]></description><link>https://www.troyhunt.com/weekly-update-384/</link><guid isPermaLink="false">65b599aacfc8e00001a129d4</guid><category><![CDATA[Weekly update]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Sun, 28 Jan 2024 00:36:58 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2024/01/Splash-Template-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2024/01/Splash-Template-1.jpg" alt="Weekly Update 384"><p>I spent longer than I expected talking about Trello this week, in part because I don&apos;t feel the narrative they presented properly acknowledges their responsibility for the incident and in part because I think the impact of scraping in general is misunderstood. I suspect many of us are prone to looking at this in a very binary fashion: if the data is publicly accessible anyway, scraping it poses no risk. But in my view, there&apos;s a hell of a big difference between say, looking at one person&apos;s personal info on LinkedIn via the browser versus having a corpus of millions of records of the same data saved offline. That&apos;s before we even get into the issue of whether in Trello&apos;s case, it should <em>ever </em>be possible for a third party to match email address to username and IRL name.</p><p>To add some more perspective, I&apos;ve just posted a poll immediately before publishing this blog post, let&apos;s see what the masses have to say:</p>
<!--kg-card-begin: html-->
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">Scraping: should we be concerned if an individual&apos;s personal data is scraped, aggregated en mass and redistributed if that same data is already publicly accessible on the service anyway? Vote and if possible, add more context in a reply.</p>&#x2014; Troy Hunt (@troyhunt) <a href="https://twitter.com/troyhunt/status/1751401970945142792?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">January 28, 2024</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<!--kg-card-end: html-->

<!--kg-card-begin: html-->
<div><div style="width: 170px; display: inline-block; margin-right: 3px;"><a href="https://itunes.apple.com/au/podcast/troy-hunts-weekly-update-podcast/id1176454699?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/05/Listen-on-Apple-Podcasts.svg" alt="Weekly Update 384"></a></div><div style="width: 146px; display: inline-block; margin-right: 3px;"><a href="https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&amp;%3B%3Bisi=691797987&amp;%3B%3Bius=googleplaymusic&amp;%3B%3Bapn=com.google.android.music&amp;%3B%3Blink=https%3A%2F%2Fplay.google.com%2Fmusic%2Fm%2FIf3tw7npymckucxq4q76762ncny%3Ft%3DTroy_Hunt%27s_Weekly_Update_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16&amp;%3B%3Bref=troy-hunt&amp;%3Bref=troy-hunt&amp;ref=troyhunt.com"><img src="https://www.troyhunt.com/content/images/2018/05/Get-it-on-Google-Play.svg" alt="Weekly Update 384"></a></div><div style="width: 118px; display: inline-block; margin-right: 3px;"><a href="https://open.spotify.com/show/7jMtKFohdrw6qmz8AkLqit?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2019/10/spotify.svg" class="kg-image" alt="Weekly Update 384"></a></div><div style="width: 120px; display: inline-block;"><a href="https://omny.fm/shows/troy-hunt-weekly-update/playlists/podcast.rss?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/07/Download-via-RSS.svg" alt="Weekly Update 384"></a></div><iframe width="100%" height="480" src="https://www.youtube.com/embed/UHeAVCbspq8" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></div>
<!--kg-card-end: html-->
<h3 id="references">References</h3><ol><li><a href="https://report-uri.com/?src=troyhunt.com&amp;ref=troyhunt.com" rel="noopener">Sponsored by:&#xA0;Report URI: Guarding you from rogue JavaScript! Don&#x2019;t get pwned; get real-time alerts &amp; prevent breaches #SecureYourSite</a></li><li><a href="https://twitter.com/troyhunt/status/1749536876166566238?ref=troyhunt.com" rel="noreferrer">Trello had 15M records scraped and posted publicly</a> (somehow the narrative feels like it&apos;s pushing back on things that were never said to begin with)</li><li><a href="https://twitter.com/troyhunt/status/1749545280394133650?ref=troyhunt.com" rel="noreferrer">The &quot;Mother of all Breaches&quot;... which isn&apos;t</a> (someone leaving their personal stash of existing breaches doesn&apos;t make everything re-breached)</li><li><a href="https://twitter.com/ClareONeilMP/status/1750074597352075752?ref=troyhunt.com" rel="noreferrer">HIBP got a nice little shout-out from our MP for Cyber Security</a> (I&apos;m still fascinated at just how mainstream this little service has become &#x1F60A;)</li></ol>]]></content:encoded></item><item><title><![CDATA[Weekly Update 383]]></title><description><![CDATA[<p>They&apos;re an odd thing, credential lists. Whether they&apos;re from a stealer as in this week&apos;s Naz.API incident, or just aggregated from multiple data breaches (which is also in Naz.API), I inevitably get some backlash after loading them: &quot;this doesn&apos;t</p>]]></description><link>https://www.troyhunt.com/weekly-update-383/</link><guid isPermaLink="false">65aaa218c62b3100012978dd</guid><category><![CDATA[Weekly update]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Sat, 20 Jan 2024 15:33:10 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2024/01/Splash-Template@1x_1-3.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2024/01/Splash-Template@1x_1-3.jpg" alt="Weekly Update 383"><p>They&apos;re an odd thing, credential lists. Whether they&apos;re from a stealer as in this week&apos;s Naz.API incident, or just aggregated from multiple data breaches (which is also in Naz.API), I inevitably get some backlash after loading them: &quot;this doesn&apos;t tell me anything useful, why are you loading this?!&quot; The answer is easy: because that&apos;s what the vast majority of people want me to do:</p>
<!--kg-card-begin: html-->
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">If I have a MASSIVE spam list full of personal data being sold to spammers, should I load it into <a href="https://twitter.com/haveibeenpwned?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">@haveibeenpwned</a>?</p>&#x2014; Troy Hunt (@troyhunt) <a href="https://twitter.com/troyhunt/status/798318611085430784?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">November 15, 2016</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<!--kg-card-end: html-->
<p>Spam lists are the same kettle of fish in that once you learn you&apos;re in one, I can&apos;t provide you any further info about where it came from and there&apos;s no recourse available to you. You&apos;re just in there, good luck! And if you do find yourself in one of these lists and are unhappy not that you&apos;re in there, but rather that I&apos;ve told you you&apos;re in there, you have 2 easy options:</p><ol><li>Ignore it</li><li>Unsubscribe</li></ol><p>Or, if you&apos;ve come along to HIBP, done a search and then been unhappy with <em>me</em>, <a href="https://www.troyhunt.com/if-you-dont-want-guitar-lessons-stop-following-me/" rel="noreferrer">my guitar lessons blog post</a> is an entertaining read &#x1F60A;</p><p>That&apos;s all from Europe folks, see you from the sunny side next week!</p>
<!--kg-card-begin: html-->
<div><div style="width: 170px; display: inline-block; margin-right: 3px;"><a href="https://itunes.apple.com/au/podcast/troy-hunts-weekly-update-podcast/id1176454699?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/05/Listen-on-Apple-Podcasts.svg" alt="Weekly Update 383"></a></div><div style="width: 146px; display: inline-block; margin-right: 3px;"><a href="https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&amp;%3B%3Bisi=691797987&amp;%3B%3Bius=googleplaymusic&amp;%3B%3Bapn=com.google.android.music&amp;%3B%3Blink=https%3A%2F%2Fplay.google.com%2Fmusic%2Fm%2FIf3tw7npymckucxq4q76762ncny%3Ft%3DTroy_Hunt%27s_Weekly_Update_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16&amp;%3B%3Bref=troy-hunt&amp;%3Bref=troy-hunt&amp;ref=troyhunt.com"><img src="https://www.troyhunt.com/content/images/2018/05/Get-it-on-Google-Play.svg" alt="Weekly Update 383"></a></div><div style="width: 118px; display: inline-block; margin-right: 3px;"><a href="https://open.spotify.com/show/7jMtKFohdrw6qmz8AkLqit?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2019/10/spotify.svg" class="kg-image" alt="Weekly Update 383"></a></div><div style="width: 120px; display: inline-block;"><a href="https://omny.fm/shows/troy-hunt-weekly-update/playlists/podcast.rss?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/07/Download-via-RSS.svg" alt="Weekly Update 383"></a></div><iframe width="100%" height="480" src="https://www.youtube.com/embed/VZFANlfCRtE" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></div>
<!--kg-card-end: html-->
<h3 id="references">References</h3><ol><li><a href="https://report-uri.com/?src=troyhunt.com&amp;ref=troyhunt.com" rel="noopener">Sponsored by:&#xA0;Report URI: Guarding you from rogue JavaScript! Don&#x2019;t get pwned; get real-time alerts &amp; prevent breaches #SecureYourSite</a></li><li><a href="https://www.troyhunt.com/inside-the-massive-naz-api-credential-stuffing-list/" rel="noreferrer">The Naz.API stealer logs and credential stuffing lists got a lot of attention</a> (big shout out to the folks angry that I wouldn&apos;t either store truck loads of plain text passwords for them or link them through to the original breach of everyone&apos;s personal info &#x1F926;&#x200D;&#x2642;&#xFE0F;)</li><li><a href="https://twitter.com/troyhunt/status/1748051140078420057?ref=troyhunt.com" rel="noreferrer">Couple of phillips head screws through a laptop will stop it from disappearing</a> (and if your takeaway is the correct identification of the laptop make, you&apos;re kinda missing the point...)</li></ol>]]></content:encoded></item><item><title><![CDATA[Inside the Massive Naz.API Credential Stuffing List]]></title><description><![CDATA[<p>It feels like not a week goes by without someone sending me yet another credential stuffing list. It&apos;s usually something to the effect of &quot;hey, have you seen the Spotify breach&quot;, to which I politely reply with a link to my old <a href="https://www.troyhunt.com/no-spotify-wasnt-hacked/" rel="noreferrer">No, Spotify Wasn&apos;</a></p>]]></description><link>https://www.troyhunt.com/inside-the-massive-naz-api-credential-stuffing-list/</link><guid isPermaLink="false">65a67e43c62b310001297795</guid><category><![CDATA[Have I Been Pwned]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Wed, 17 Jan 2024 14:05:19 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2024/01/2024-01-16_15-13-08.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2024/01/2024-01-16_15-13-08.png" alt="Inside the Massive Naz.API Credential Stuffing List"><p>It feels like not a week goes by without someone sending me yet another credential stuffing list. It&apos;s usually something to the effect of &quot;hey, have you seen the Spotify breach&quot;, to which I politely reply with a link to my old <a href="https://www.troyhunt.com/no-spotify-wasnt-hacked/" rel="noreferrer">No, Spotify Wasn&apos;t Hacked</a> blog post (it&apos;s just the output of a small set of credentials successfully tested against their service), and we all move on. Occasionally though, the corpus of data is of much greater significance, most notably <a href="https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/" rel="noreferrer">the Collection #1 incident of early 2019</a>. But even then, <a href="https://www.troyhunt.com/the-race-to-the-bottom-of-credential-stuffing-lists-and-collections-2-through-5-and-more/" rel="noreferrer">the rapid appearance of Collections #2 through #5 (and more)</a> quickly became, as I phrased it in that blog post, &quot;a race to the bottom&quot; I did not want to take further part in.</p><p>Until the Naz.API list appeared. Here&apos;s the back story: this week I was contacted by a well-known tech company that had received a bug bounty submission based on a credential stuffing list posted to a popular hacking forum:</p>
<!--kg-card-begin: html-->
<figure><img src="https://www.troyhunt.com/content/images/2024/01/2024-01-16_15-13-08.png" alt="Inside the Massive Naz.API Credential Stuffing List"></figure>
<!--kg-card-end: html-->
<p>Whilst this post dates back almost 4 months, it hadn&apos;t come across my radar until now and inevitably, also hadn&apos;t been sent to the aforementioned tech company. They took it seriously enough to take appropriate action against their (very sizeable) user base which gave me enough cause to investigate it further than your average cred stuffing list. Here&apos;s what I found:</p><ol><li>319 files totalling 104GB</li><li>70,840,771 unique email addresses</li><li>427,308 individual HIBP subscribers impacted</li><li>65.03% of addresses already in HIBP (based on a 1k random sample set)</li></ol><p>That last number was the real kicker; when a third of the email addresses have never been seen before, that&apos;s statistically significant. This isn&apos;t just the usual collection of repurposed lists wrapped up with a brand-new bow on it and passed off as the next big thing; it&apos;s a significant volume of new data. When you look at the above forum post the data accompanied, the reason why becomes clear: it&apos;s from &quot;stealer logs&quot; or in other words, malware that has grabbed credentials from compromised machines. Apparently, this was sourced from <a href="https://www.hackread.com/osint-tool-illicit-services-shuts-down/?ref=troyhunt.com" rel="noreferrer">the now defunct illicit.services website</a> which (in)famously provided search results for other people&apos;s data along these lines:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/osint-tool-illicit-services-shuts-down-1024x676.jpg" class="kg-image" alt="Inside the Massive Naz.API Credential Stuffing List" loading="lazy" width="1024" height="676" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/osint-tool-illicit-services-shuts-down-1024x676.jpg 600w, https://www.troyhunt.com/content/images/size/w1000/2024/01/osint-tool-illicit-services-shuts-down-1024x676.jpg 1000w, https://www.troyhunt.com/content/images/2024/01/osint-tool-illicit-services-shuts-down-1024x676.jpg 1024w"></figure><p>I was aware of this service because, well, just look at the first example query &#x1F926;&#x200D;&#x2642;&#xFE0F; </p><p>So, what does a stealer log look like? Website, username and password:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/image.png" class="kg-image" alt="Inside the Massive Naz.API Credential Stuffing List" loading="lazy" width="2000" height="1112" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/image.png 600w, https://www.troyhunt.com/content/images/size/w1000/2024/01/image.png 1000w, https://www.troyhunt.com/content/images/size/w1600/2024/01/image.png 1600w, https://www.troyhunt.com/content/images/2024/01/image.png 2262w"></figure><p>That&apos;s just the first 20 rows out of 5 million in that particular file, but it gives you a good sense of the data. Is it legit? Whilst I won&apos;t test a username and password pair on a service (that&apos;s way too far into the grey for my comfort), I regularly use enumeration vectors on websites to validate whether an account actually exists or not. For example, take that last entry for <a href="https://www.racedepartment.com/?ref=troyhunt.com">racedepartment.com</a>, head to the password reset feature and mash the keyboard to generate a (quasi) random alias @hotmail.com:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/image-1.png" class="kg-image" alt="Inside the Massive Naz.API Credential Stuffing List" loading="lazy" width="1512" height="334" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/image-1.png 600w, https://www.troyhunt.com/content/images/size/w1000/2024/01/image-1.png 1000w, https://www.troyhunt.com/content/images/2024/01/image-1.png 1512w"></figure><p>And now, with the actual Hotmail address from that last line:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/image-2.png" class="kg-image" alt="Inside the Massive Naz.API Credential Stuffing List" loading="lazy" width="1844" height="902" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/image-2.png 600w, https://www.troyhunt.com/content/images/size/w1000/2024/01/image-2.png 1000w, https://www.troyhunt.com/content/images/size/w1600/2024/01/image-2.png 1600w, https://www.troyhunt.com/content/images/2024/01/image-2.png 1844w"></figure><p>The email address exists.</p><p>The VideoScribe service on line 9:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/image-3.png" class="kg-image" alt="Inside the Massive Naz.API Credential Stuffing List" loading="lazy" width="948" height="358" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/image-3.png 600w, https://www.troyhunt.com/content/images/2024/01/image-3.png 948w"></figure><p>Exists.</p><p>And even the service on the very first line:</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2024/01/image-4.png" class="kg-image" alt="Inside the Massive Naz.API Credential Stuffing List" loading="lazy" width="1018" height="592" srcset="https://www.troyhunt.com/content/images/size/w600/2024/01/image-4.png 600w, https://www.troyhunt.com/content/images/size/w1000/2024/01/image-4.png 1000w, https://www.troyhunt.com/content/images/2024/01/image-4.png 1018w"></figure><p>From a verification perspective, this gives me a high degree of confidence in the legitimacy of the data. The question of how valid the accompanying passwords remain aside, time and time again the email addresses in the stealer logs checked out on the services they appeared alongside.</p><p>Another technique I regularly use for validation is to reach out to impacted HIBP subscribers and simply ask them: &quot;are you willing to help verify the legitimacy of a breach and if so, can you confirm if your data looks accurate?&quot; I usually get pretty prompt responses:</p><blockquote>Yes, it does. This is one of the old passwords I used for some online services.&#xA0;</blockquote><p>When I asked them to date when they might have last used that password, they believed it was was either 2020 or 2021.</p><p>And another whose details appears alongside a Webex URL:</p><blockquote>Yes, it does. but that was very old password and i used it for webex cuz i didnt care and didnt use good pass because of the fear of leaking</blockquote><p>And another:</p><blockquote>Yes these are passwords I have used in the past.</blockquote><p>Which got me wondering: is my own data in there? Yep, turns out it is and with a <em>very</em> old password I&apos;d genuinely used pre-2011 <a href="https://www.troyhunt.com/only-secure-password-is-one-you-cant/" rel="noreferrer">when I rolled over to 1Password for all my things</a>. So that sucks, but it does help me put the incident in more context and draw an important conclusion: this corpus of data isn&apos;t <em>just </em>stealer logs, it also contains your classic credential stuffing username and password pairs too. In fact, the largest file in the collection is just that: 312 million rows of email addresses and passwords.</p><p>Speaking of passwords, given the significance of this data set we&apos;ve made sure to roll every single one of them into Pwned Passwords. Stef&#xE1;n&#xA0;has been working tirelessly the last couple of days to trawl through this massive corpus and get all the data in so that anyone hitting <a href="https://haveibeenpwned.com/API/v3?ref=troyhunt.com#PwnedPasswords" rel="noreferrer">the k-anonymity API</a> is already benefiting from those new passwords. And there&apos;s <em>a lot</em> of them: it&apos;s a rounding error off 100 million <em>unique</em> passwords that appeared 1.3 <em>billion</em> times across the corpus of data &#x1F632; Now, what does that tell you about the general public&apos;s password practices? To be fair, there are instances of duplicated rows, but there&apos;s also a massive prevalence of people using the same password across multiple difference services and completely different people using the same password (there are a finite set of dog names and years of birth out there...) And now more than ever, the impact of this service is absolutely <em>huge!</em></p>
<!--kg-card-begin: html-->
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">When we weren&apos;t looking, <a href="https://twitter.com/haveibeenpwned?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">@haveibeenpwned</a>&apos;s Pwned Passwords rocketed past 7 *billion* requests in a month &#x1F632; <a href="https://t.co/hVDxWp3oQG?ref=troyhunt.com">pic.twitter.com/hVDxWp3oQG</a></p>&#x2014; Troy Hunt (@troyhunt) <a href="https://twitter.com/troyhunt/status/1747250819605381276?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">January 16, 2024</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<!--kg-card-end: html-->
<p>Pwned Passwords remains totally free and completely open source for both code and data so do please make use of it to the fullest extent possible. This is such an easy thing to implement, and it has a <em>profound</em> impact on credential stuffing attacks so if you&apos;re running any sort of online auth service and you&apos;re worried about the impact of Naz.API, this now completely kills any attack using that data. Password reuse remain rampant so attacks of this type prosper (<a href="https://www.bitdefender.com/blog/hotforsecurity/23andme-confirms-data-beach-that-started-as-a-credential-stuffing-attack/?ref=troyhunt.com" rel="noreferrer">23andMe&apos;s recent incident</a> comes immediately to mind), definitely get out in front of this one as early as you can.</p><p>So that&apos;s the story with the Naz.API data. All the email addresses are now in HIBP and searchable either individually or via domain and all those passwords are in Pwned Passwords. There are inevitably going to be queries along the lines of &quot;can you show me the actual password&quot; or &quot;which website did my record appear against&quot; and as always, this just isn&apos;t information we store or return in queries. That said, if you&apos;re following the age-old guidance of using a password manager, creating strong and unique ones and turning 2FA on for all your things, this incident should be a non-event. If you&apos;re not and you find yourself in this data, maybe this is the prompt you finally needed to go ahead and do those things right now &#x1F642;</p><p><strong>Edit:</strong> A few clarifications based on comments:</p><ol><li>The blog post refers to both stealer logs and classic credential stuffing lists. Some of this data does not come from malware and has been around for a significant period of time. My own email address, for example, accompanied a password not used for well over a decade and did not accompany a website indicating it was sourced from malware.</li><li>If you&apos;re in this corpus of data and are not sure which password was compromised, <a href="https://blog.1password.com/finding-pwned-passwords-with-1password/?ref=troyhunt.com" rel="noreferrer">1Password can automatically (and anonymously) scan all your passwords against Pwned Passwords</a> which includes all passwords from this corpus of data.</li><li>It&apos;s already in the last para of the blog post but given how many comments have asked the question: no, we don&apos;t store any data beyond the email addresses in the breach. This means we don&apos;t store any additional data from the breach such as if a specific website was listed next to a given address.</li></ol>]]></content:encoded></item><item><title><![CDATA[Weekly Update 382]]></title><description><![CDATA[<p>Geez it&apos;s nice to be back in Oslo! This city has such a special place in my heart for so many reasons, not least of which by virtue of being Charlotte&apos;s home town we have so many friends and family here. Add in NDC Security this</p>]]></description><link>https://www.troyhunt.com/weekly-update-382/</link><guid isPermaLink="false">65a54f56c62b310001297748</guid><category><![CDATA[Weekly update]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Mon, 15 Jan 2024 15:46:28 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2024/01/Splash-Template.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2024/01/Splash-Template.jpg" alt="Weekly Update 382"><p>Geez it&apos;s nice to be back in Oslo! This city has such a special place in my heart for so many reasons, not least of which by virtue of being Charlotte&apos;s home town we have so many friends and family here. Add in NDC Security this week with so many more mutual connections, beautiful snowy weather, snowboarding, sledging and even curling, it&apos;s just an awesome time. Awesome enough to still be here for the next weekly update so until then, I&apos;ll leave you with the pics I promised at the end of this week&apos;s vid. Enjoy &#x1F60A;</p>
<!--kg-card-begin: html-->
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">Perfect Oslo - fresh snow, cool temps and sunshine &#x1F1F3;&#x1F1F4; <a href="https://t.co/yPtnCkKIwo?ref=troyhunt.com">pic.twitter.com/yPtnCkKIwo</a></p>&#x2014; Troy Hunt (@troyhunt) <a href="https://twitter.com/troyhunt/status/1746841993857155469?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">January 15, 2024</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<!--kg-card-end: html-->

<!--kg-card-begin: html-->
<div><div style="width: 170px; display: inline-block; margin-right: 3px;"><a href="https://itunes.apple.com/au/podcast/troy-hunts-weekly-update-podcast/id1176454699?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/05/Listen-on-Apple-Podcasts.svg" alt="Weekly Update 382"></a></div><div style="width: 146px; display: inline-block; margin-right: 3px;"><a href="https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&amp;%3B%3Bisi=691797987&amp;%3B%3Bius=googleplaymusic&amp;%3B%3Bapn=com.google.android.music&amp;%3B%3Blink=https%3A%2F%2Fplay.google.com%2Fmusic%2Fm%2FIf3tw7npymckucxq4q76762ncny%3Ft%3DTroy_Hunt%27s_Weekly_Update_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16&amp;%3B%3Bref=troy-hunt&amp;%3Bref=troy-hunt&amp;ref=troyhunt.com"><img src="https://www.troyhunt.com/content/images/2018/05/Get-it-on-Google-Play.svg" alt="Weekly Update 382"></a></div><div style="width: 118px; display: inline-block; margin-right: 3px;"><a href="https://open.spotify.com/show/7jMtKFohdrw6qmz8AkLqit?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2019/10/spotify.svg" class="kg-image" alt="Weekly Update 382"></a></div><div style="width: 120px; display: inline-block;"><a href="https://omny.fm/shows/troy-hunt-weekly-update/playlists/podcast.rss?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/07/Download-via-RSS.svg" alt="Weekly Update 382"></a></div><iframe width="100%" height="480" src="https://www.youtube.com/embed/sp2KH0TMvtQ" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></div>
<!--kg-card-end: html-->
<h3 id="references">References</h3><ol><li><a href="https://kolide.com/troyhunt?ref=troyhunt.com" rel="noopener">Sponsored by:&#xA0;Kolide ensures that if a device isn&apos;t secure, it can&apos;t access your apps. It&apos;s Device Trust for Okta. Watch the demo today!</a></li><li><a href="https://twitter.com/europarl_en/status/1743912858100887808?s=46&amp;t=ulpVIG0ecbywnRh7tIIlWA&amp;ref=troyhunt.com" rel="noreferrer">Standardising on USB-C as a common connector for all phones, tablets and cameras can only be a good thing</a> (by extension, hopefully that will filter through to all the other USB-A / C / Mini / Micro connectors as well)</li><li><a href="https://twitter.com/troyhunt/status/1744409379212808531?ref=troyhunt.com" rel="noreferrer">Capelli finally got back to Scott and Joe regarding their lapsed domain the guys subsequently registered</a> (yet still, their JavaScript remains running on the Capelli website &#x1F937;&#x200D;&#x2642;&#xFE0F;)</li><li><a href="https://restoreprivacy.com/hacker-allegedly-holds-data-of-41-million-hathway-customers/?ref=troyhunt.com" rel="noreferrer">The Hathway ISP in India went into HIBP</a> (it&apos;s a weeks old incident, but it seems they&apos;re unwilling to make a statement on the breach whatsoever)</li></ol>]]></content:encoded></item><item><title><![CDATA[Weekly Update 381]]></title><description><![CDATA[<p>It&apos;s another weekly update from the other side of the world with Scott and I in Rome as we continue a bit of downtime before hitting NDC Security in Oslo next week. This week, Scott&apos;s sharing details of how he and Joe Tiedman registered a domain</p>]]></description><link>https://www.troyhunt.com/weekly-update-381/</link><guid isPermaLink="false">659a620bc62b310001297705</guid><category><![CDATA[Weekly update]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Sun, 07 Jan 2024 08:56:48 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2024/01/Splash-Template@1x_1-2.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2024/01/Splash-Template@1x_1-2.jpg" alt="Weekly Update 381"><p>It&apos;s another weekly update from the other side of the world with Scott and I in Rome as we continue a bit of downtime before hitting NDC Security in Oslo next week. This week, Scott&apos;s sharing details of how he and Joe Tiedman registered a domain Capelli Sport let lapse and <a href="https://capellisport.com/cart?ref=troyhunt.com" rel="noreferrer">now have <em>their</em> JavaScript running on the websites shopping cart page</a> (check your browser console after loading that link) &#x1F632; That&apos;s not the crazy bit though, the <em>crazy</em> bit is the months they&apos;ve spent trying to disclose this to Capelli and getting absolutely nowhere. I&apos;ll give them a shout-out this week and see if I have any more luck but when it&apos;s this hard to report egregiously bad security issues, is it any wonder we have so many data breaches. As I keep lamenting, it&apos;s a great time to be in this industry...</p>
<!--kg-card-begin: html-->
<div><div style="width: 170px; display: inline-block; margin-right: 3px;"><a href="https://itunes.apple.com/au/podcast/troy-hunts-weekly-update-podcast/id1176454699?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/05/Listen-on-Apple-Podcasts.svg" alt="Weekly Update 381"></a></div><div style="width: 146px; display: inline-block; margin-right: 3px;"><a href="https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&amp;%3B%3Bisi=691797987&amp;%3B%3Bius=googleplaymusic&amp;%3B%3Bapn=com.google.android.music&amp;%3B%3Blink=https%3A%2F%2Fplay.google.com%2Fmusic%2Fm%2FIf3tw7npymckucxq4q76762ncny%3Ft%3DTroy_Hunt%27s_Weekly_Update_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16&amp;%3B%3Bref=troy-hunt&amp;%3Bref=troy-hunt&amp;ref=troyhunt.com"><img src="https://www.troyhunt.com/content/images/2018/05/Get-it-on-Google-Play.svg" alt="Weekly Update 381"></a></div><div style="width: 118px; display: inline-block; margin-right: 3px;"><a href="https://open.spotify.com/show/7jMtKFohdrw6qmz8AkLqit?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2019/10/spotify.svg" class="kg-image" alt="Weekly Update 381"></a></div><div style="width: 120px; display: inline-block;"><a href="https://omny.fm/shows/troy-hunt-weekly-update/playlists/podcast.rss?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/07/Download-via-RSS.svg" alt="Weekly Update 381"></a></div><iframe width="100%" height="480" src="https://www.youtube.com/embed/jUI9REq7a9M" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></div>
<!--kg-card-end: html-->
<h3 id="references">References</h3><ol><li><a href="https://kolide.com/troyhunt?ref=troyhunt.com" rel="noopener">Sponsored by:&#xA0;Unpatched devices keeping you up at night? Kolide can get your entire fleet updated in days. It&apos;s Device Trust for Okta. Watch the demo!</a></li><li><a href="https://techcrunch.com/2024/01/03/23andme-tells-victims-its-their-fault-that-their-data-was-breached/?ref=troyhunt.com" rel="noreferrer">23andMe is blaming end users for account takeover attacks</a> (it&apos;s obviously lawyery deflection, but they&apos;re also <em>partly</em> right)</li><li><a href="https://twitter.com/Scott_Helme/status/1726906880130465911?ref=troyhunt.com" rel="noreferrer">Anyone got a security contact at Capelli Sport?</a> (I&apos;ll give that line a push publicly this coming week, it&apos;s just nuts how hard it is to report this stuff)</li></ol>]]></content:encoded></item><item><title><![CDATA[Weekly Update 380]]></title><description><![CDATA[<p>We&apos;re in Paris! And feeling proper relaxed after several days of wine and cheese too, I might add. This was a very impromptu end of 2023 weekly update as we balanced family time with doing the final video for the year. On the cyber side, the constant theme</p>]]></description><link>https://www.troyhunt.com/weekly-update-380/</link><guid isPermaLink="false">65903e98c62b3100012976b2</guid><category><![CDATA[Weekly update]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Sat, 30 Dec 2023 16:17:17 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2024/01/Splash-Template@1x_1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2024/01/Splash-Template@1x_1.jpg" alt="Weekly Update 380"><p>We&apos;re in Paris! And feeling proper relaxed after several days of wine and cheese too, I might add. This was a very impromptu end of 2023 weekly update as we balanced family time with doing the final video for the year. On the cyber side, the constant theme over the last week has been ransomware; big firms, little firms, Aussie firms, American firms - it&apos;s just completely indiscriminate. Anecdotally, this seems to have really ramped up over 2023 so on that basis, 2024 will bring... well, let&apos;s wait and see, this industry is nothing if not full of surprises. Happy New Year friends &#x1F60A;</p>
<!--kg-card-begin: html-->
<div><div style="width: 170px; display: inline-block; margin-right: 3px;"><a href="https://itunes.apple.com/au/podcast/troy-hunts-weekly-update-podcast/id1176454699?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/05/Listen-on-Apple-Podcasts.svg" alt="Weekly Update 380"></a></div><div style="width: 146px; display: inline-block; margin-right: 3px;"><a href="https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&amp;%3B%3Bisi=691797987&amp;%3B%3Bius=googleplaymusic&amp;%3B%3Bapn=com.google.android.music&amp;%3B%3Blink=https%3A%2F%2Fplay.google.com%2Fmusic%2Fm%2FIf3tw7npymckucxq4q76762ncny%3Ft%3DTroy_Hunt%27s_Weekly_Update_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16&amp;%3B%3Bref=troy-hunt&amp;%3Bref=troy-hunt&amp;ref=troyhunt.com"><img src="https://www.troyhunt.com/content/images/2018/05/Get-it-on-Google-Play.svg" alt="Weekly Update 380"></a></div><div style="width: 118px; display: inline-block; margin-right: 3px;"><a href="https://open.spotify.com/show/7jMtKFohdrw6qmz8AkLqit?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2019/10/spotify.svg" class="kg-image" alt="Weekly Update 380"></a></div><div style="width: 120px; display: inline-block;"><a href="https://omny.fm/shows/troy-hunt-weekly-update/playlists/podcast.rss?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/07/Download-via-RSS.svg" alt="Weekly Update 380"></a></div><iframe width="100%" height="480" src="https://www.youtube.com/embed/p0FZ6iLmYtA" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></div>
<!--kg-card-end: html-->
<h3 id="references">References</h3><ol><li><a href="https://kolide.com/troyhunt?ref=troyhunt.com" rel="noopener">Sponsored by:&#xA0;Unpatched devices keeping you up at night? Kolide can get your entire fleet updated in days. It&apos;s Device Trust for Okta. Watch the demo!</a></li><li><a href="https://twitter.com/BleepinComputer/status/1740470721854177555?ref=troyhunt.com" rel="noreferrer">Eagers Automotive in Australia got ransom&apos;d</a> (that&apos;s a fairly significant Aussie brand)</li><li><a href="https://twitter.com/H4ckManac/status/1740320665079607520?ref=troyhunt.com" rel="noreferrer">The University of Western Australia has had a dump turn up on a popular hacking forum</a> (not ransom by the look of it, but obviously still bad)</li><li><a href="https://twitter.com/DarkWebInformer/status/1740106448284058077?ref=troyhunt.com" rel="noreferrer">Ohio Lottery is another ransomware victim</a> (play the odds, lose your data)</li><li><a href="https://www.barclaycard.co.uk/personal/help/credit-cards/gaming-transactions?ref=troyhunt.com" rel="noreferrer">And no, you definitely can&apos;t use a credit card in the UK to buy lottery tickets</a> (borrowing money to gamble ain&apos;t exactly financially sensible)</li><li>Even a very localised Aussie taxi firm is on this week&apos;s ransomware books (I suspect there&apos;s a degree of automation that makes it a no-brainer to add even small firms)</li></ol>]]></content:encoded></item><item><title><![CDATA[Weekly Update 379]]></title><description><![CDATA[<p>It&apos;s that time of the year again, time to head from the heat to the cold as we jump on the big plane(s) back to Europe. The next 4 weekly updates will all be from places of varying degrees colder than home, most of them done with</p>]]></description><link>https://www.troyhunt.com/weekly-update-379/</link><guid isPermaLink="false">6587abb0c62b310001297663</guid><category><![CDATA[Weekly update]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Sun, 24 Dec 2023 04:14:50 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2023/12/Splash-Template@1x_1-2.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2023/12/Splash-Template@1x_1-2.jpg" alt="Weekly Update 379"><p>It&apos;s that time of the year again, time to head from the heat to the cold as we jump on the big plane(s) back to Europe. The next 4 weekly updates will all be from places of varying degrees colder than home, most of them done with Scott Helme too so they&apos;ll be a little different to usual. For now, here&apos;s a pretty casual Christmas edition, see you next week from the other side &#x1F642;</p>
<!--kg-card-begin: html-->
<div><div style="width: 170px; display: inline-block; margin-right: 3px;"><a href="https://itunes.apple.com/au/podcast/troy-hunts-weekly-update-podcast/id1176454699?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/05/Listen-on-Apple-Podcasts.svg" alt="Weekly Update 379"></a></div><div style="width: 146px; display: inline-block; margin-right: 3px;"><a href="https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&amp;%3B%3Bisi=691797987&amp;%3B%3Bius=googleplaymusic&amp;%3B%3Bapn=com.google.android.music&amp;%3B%3Blink=https%3A%2F%2Fplay.google.com%2Fmusic%2Fm%2FIf3tw7npymckucxq4q76762ncny%3Ft%3DTroy_Hunt%27s_Weekly_Update_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16&amp;%3B%3Bref=troy-hunt&amp;%3Bref=troy-hunt&amp;ref=troyhunt.com"><img src="https://www.troyhunt.com/content/images/2018/05/Get-it-on-Google-Play.svg" alt="Weekly Update 379"></a></div><div style="width: 118px; display: inline-block; margin-right: 3px;"><a href="https://open.spotify.com/show/7jMtKFohdrw6qmz8AkLqit?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2019/10/spotify.svg" class="kg-image" alt="Weekly Update 379"></a></div><div style="width: 120px; display: inline-block;"><a href="https://omny.fm/shows/troy-hunt-weekly-update/playlists/podcast.rss?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/07/Download-via-RSS.svg" alt="Weekly Update 379"></a></div><iframe width="100%" height="480" src="https://www.youtube.com/embed/vP9e_hjeFFY" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></div>
<!--kg-card-end: html-->
<h3 id="references">References</h3><ol><li><a href="https://kolide.com/troyhunt?ref=troyhunt.com" rel="noopener">Sponsored by:&#xA0;Unpatched devices keeping you up at night? Kolide can get your entire fleet updated in days. It&apos;s Device Trust for Okta. Watch the demo!</a></li><li><a href="https://twitter.com/troyhunt/status/1736668341023240340?ref=troyhunt.com" rel="noreferrer">K&apos;gari / Fraser Island is just exceedingly beautiful</a> (and now we need a bigger wall to put these photos up on &#x1F923;)</li><li><a href="https://ui.com/cloud-gateways/dream-wall?ref=troyhunt.com" rel="noreferrer">The Ubiquiti Dream Wall is a really sweet looking piece of kit</a> (awesome solution to avoid having a full rack setup if you don&apos;t need it)</li><li><a href="https://ndcoslo.com/?ref=troyhunt.com" rel="noreferrer">I&apos;ll be back as NDC Oslo in June for the first time since 2019</a> (this is the event that gave me everything from a career to a wife - it&apos;s kinda special to me &#x1F60A;)</li><li><a href="https://www.404media.co/cmg-cox-media-actually-listening-to-phones-smartspeakers-for-ads-marketing/?ref=troyhunt.com" rel="noreferrer">The story about a marketing company pitching ads based on eavesdropped conversations by mobile devices is really wild</a> (for so long, this amounted to tinfoil-hattery, now here we are...)</li></ol>]]></content:encoded></item><item><title><![CDATA[Weekly Update 378]]></title><description><![CDATA[<p>I&apos;d say the balloon fetish segment was the highlight of this week&apos;s video. No, seriously, it&apos;s a moment of levity in an otherwise often serious industry. It&apos;s still a bunch of personal info exposed publicly and that suchs regardless of the nature</p>]]></description><link>https://www.troyhunt.com/weekly-update-378/</link><guid isPermaLink="false">657d4d9dc62b310001297620</guid><category><![CDATA[Weekly update]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Sat, 16 Dec 2023 07:22:43 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2023/12/Splash-Template@1x_1-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2023/12/Splash-Template@1x_1-1.jpg" alt="Weekly Update 378"><p>I&apos;d say the balloon fetish segment was the highlight of this week&apos;s video. No, seriously, it&apos;s a moment of levity in an otherwise often serious industry. It&apos;s still a bunch of personal info exposed publicly and that suchs regardless of the nature of the site, but let&apos;s be honest, the subject matter did make for some humorous comments &#x1F923;</p>
<!--kg-card-begin: html-->
<div><div style="width: 170px; display: inline-block; margin-right: 3px;"><a href="https://itunes.apple.com/au/podcast/troy-hunts-weekly-update-podcast/id1176454699?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/05/Listen-on-Apple-Podcasts.svg" alt="Weekly Update 378"></a></div><div style="width: 146px; display: inline-block; margin-right: 3px;"><a href="https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&amp;%3B%3Bisi=691797987&amp;%3B%3Bius=googleplaymusic&amp;%3B%3Bapn=com.google.android.music&amp;%3B%3Blink=https%3A%2F%2Fplay.google.com%2Fmusic%2Fm%2FIf3tw7npymckucxq4q76762ncny%3Ft%3DTroy_Hunt%27s_Weekly_Update_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16&amp;%3B%3Bref=troy-hunt&amp;%3Bref=troy-hunt&amp;ref=troyhunt.com"><img src="https://www.troyhunt.com/content/images/2018/05/Get-it-on-Google-Play.svg" alt="Weekly Update 378"></a></div><div style="width: 118px; display: inline-block; margin-right: 3px;"><a href="https://open.spotify.com/show/7jMtKFohdrw6qmz8AkLqit?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2019/10/spotify.svg" class="kg-image" alt="Weekly Update 378"></a></div><div style="width: 120px; display: inline-block;"><a href="https://omny.fm/shows/troy-hunt-weekly-update/playlists/podcast.rss?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/07/Download-via-RSS.svg" alt="Weekly Update 378"></a></div><iframe width="100%" height="480" src="https://www.youtube.com/embed/gySgbd1a8Hw" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></div>
<!--kg-card-end: html-->
<h3 id="references">References</h3><ol><li><a href="https://buy.aura.com/troyhunt?ref=troyhunt.com" rel="noopener">Sponsored by:&#xA0;Identity theft isn&#x2019;t cheap. Secure your family with Aura the #1 rated proactive protection that helps keep you safe online. Get started.</a></li><li><a href="https://twitter.com/troyhunt/status/1734027500114895244?ref=troyhunt.com" rel="noreferrer">I now have solar radiation and UV sensors tied into my IoT</a> (in a week of bright sun constantly interjected by storm cells, this has been a really cool way to control lighting)</li><li><a href="https://www.dailydot.com/debug/inflatevids-balloon-videos-hack-sensitive-user-data-leaked/?ref=troyhunt.com" rel="noreferrer">Many people were left feeling deflated after the balloon fetish website got pwned</a> (the whole thing was a real let down)</li><li><a href="https://twitter.com/shoucccc/status/1734802168723734764?ref=troyhunt.com" rel="noreferrer">The Twitter XSS + CSRF bug was rather nasty</a> (but - assuming the reporting is accurate - it&apos;s their claimed handling of the bug report that&apos;s particularly bad)</li><li><a href="https://cyberscoop.com/dc-health-link-breach-russia-hacker-congress/?ref=troyhunt.com" rel="noreferrer">The DC Health Link breach was earlier this year and not particularly large at only 48k records</a> (but it&apos;s in DC with a lot of politicians in it)</li></ol>]]></content:encoded></item><item><title><![CDATA[Weekly Update 377]]></title><description><![CDATA[<p>10 years later... &#x1F92F; Seriously, how did this thing turn into this?! It was the humblest of beginning with absolutely no expectations of anything, and now it&apos;s, well, <em>massive!</em> I&apos;m a bit lost for words if I&apos;m honest, I hope the chat with Charlotte</p>]]></description><link>https://www.troyhunt.com/weekly-update-377/</link><guid isPermaLink="false">6572c63fc62b3100012975d6</guid><category><![CDATA[Weekly update]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Fri, 08 Dec 2023 07:44:03 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2023/12/Splash-Template@1x_1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2023/12/Splash-Template@1x_1.jpg" alt="Weekly Update 377"><p>10 years later... &#x1F92F; Seriously, how did this thing turn into this?! It was the humblest of beginning with absolutely no expectations of anything, and now it&apos;s, well, <em>massive!</em> I&apos;m a bit lost for words if I&apos;m honest, I hope the chat with Charlotte adds some candour to this week&apos;s update, she&apos;s seen this thing grow since before its first birthday, through the hardest times and the best times and now lives and breathes HIBP day in day out with me. I hope you enjoy this video, and we&apos;d both love to hear those swag ideas from you too &#x1F60A;</p>
<!--kg-card-begin: html-->
<div><div style="width: 170px; display: inline-block; margin-right: 3px;"><a href="https://itunes.apple.com/au/podcast/troy-hunts-weekly-update-podcast/id1176454699?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/05/Listen-on-Apple-Podcasts.svg" alt="Weekly Update 377"></a></div><div style="width: 146px; display: inline-block; margin-right: 3px;"><a href="https://playmusic.app.goo.gl/?ibi=com.google.PlayMusic&amp;%3B%3Bisi=691797987&amp;%3B%3Bius=googleplaymusic&amp;%3B%3Bapn=com.google.android.music&amp;%3B%3Blink=https%3A%2F%2Fplay.google.com%2Fmusic%2Fm%2FIf3tw7npymckucxq4q76762ncny%3Ft%3DTroy_Hunt%27s_Weekly_Update_Podcast%26pcampaignid%3DMKT-na-all-co-pr-mu-pod-16&amp;%3B%3Bref=troy-hunt&amp;%3Bref=troy-hunt&amp;ref=troyhunt.com"><img src="https://www.troyhunt.com/content/images/2018/05/Get-it-on-Google-Play.svg" alt="Weekly Update 377"></a></div><div style="width: 118px; display: inline-block; margin-right: 3px;"><a href="https://open.spotify.com/show/7jMtKFohdrw6qmz8AkLqit?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2019/10/spotify.svg" class="kg-image" alt="Weekly Update 377"></a></div><div style="width: 120px; display: inline-block;"><a href="https://omny.fm/shows/troy-hunt-weekly-update/playlists/podcast.rss?ref=troy-hunt"><img src="https://www.troyhunt.com/content/images/2018/07/Download-via-RSS.svg" alt="Weekly Update 377"></a></div><iframe width="100%" height="480" src="https://www.youtube.com/embed/6MHGUb5P7hE" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe></div>
<!--kg-card-end: html-->
<h3 id="references">References</h3><ol><li><a href="https://app.any.run/?utm_source=toyhunt&amp;utm_medium=banner&amp;utm_campaign=december2023&amp;utm_content=app" rel="noopener">Sponsored by:&#xA0;Get insights into malware&#x2019;s behavior with ANY.RUN: instant results, live VM interaction, fresh IOCs, and configs without limit.</a></li><li><a href="https://www.troyhunt.com/a-decade-of-have-i-been-pwned/" rel="noreferrer">I wrote up a blog post on the highlights earlier this week</a> (it still feels like I&apos;ve missed a million things)</li></ol>]]></content:encoded></item><item><title><![CDATA[A Decade of Have I Been Pwned]]></title><description><![CDATA[<p>A decade ago to the day, I published a tweet launching what would surely become yet another pet project that scratched an itch, was kinda useful to a few people but other than that, would shortly fade away into the same obscurity as all the other ones I&apos;d</p>]]></description><link>https://www.troyhunt.com/a-decade-of-have-i-been-pwned/</link><guid isPermaLink="false">65643c4a9a5a0d000103c2d5</guid><category><![CDATA[Have I Been Pwned]]></category><dc:creator><![CDATA[Troy Hunt]]></dc:creator><pubDate>Mon, 04 Dec 2023 07:05:48 GMT</pubDate><media:content url="https://www.troyhunt.com/content/images/2023/12/Troy-Hunt-LM-0189.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.troyhunt.com/content/images/2023/12/Troy-Hunt-LM-0189.jpg" alt="A Decade of Have I Been Pwned"><p>A decade ago to the day, I published a tweet launching what would surely become yet another pet project that scratched an itch, was kinda useful to a few people but other than that, would shortly fade away into the same obscurity as all the other ones I&apos;d launched over the previous couple of decades:</p>
<!--kg-card-begin: html-->
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">It&apos;s alive! &quot;Have I been pwned?&quot; by <a href="https://twitter.com/troyhunt?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">@troyhunt</a> is now up and running. Search for your account across multiple breaches <a href="http://t.co/U0QyHZxP6k?ref=troyhunt.com">http://t.co/U0QyHZxP6k</a></p>&#x2014; Have I Been Pwned (@haveibeenpwned) <a href="https://twitter.com/haveibeenpwned/status/408153032698785792?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">December 4, 2013</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<!--kg-card-end: html-->
<p>And then, as they say, things kinda escalated quickly. The very next day <a href="https://www.troyhunt.com/working-with-154-million-records-on/" rel="noreferrer">I published a blog post about how I made it so fast to search through 154M records</a> and thus began <a href="https://www.troyhunt.com/tag/have-i-been-pwned-3f/" rel="noreferrer">a now 185-post epic</a> where I began detailing the minutiae of how I built this thing, the decisions I made about how to run it and commentary on all sorts of different breaches. And now, a 10th birthday blog post about what really sticks out a decade later. And that&apos;s precisely what this 185th blog post tagging HIBP is - the noteworthy things of the years past, including a few things I&apos;ve never discussed publicly before.</p><h3 id="pwned">Pwned?</h3><p>You know why it&apos;s called &quot;Have I Been Pwned&quot;? Try coming up with almost any conceivable <em>normal </em>sounding English name and getting a .com domain for it. <em>Good luck!</em> That was certainly part of it, but another part of the name choice was simply that I honestly didn&apos;t expect this thing to go anywhere. It&apos;s like I said in the intro of this post where I fully expected this to be another failed project, so why does the name matter?</p><p>But it&apos;s weird how &quot;pwned&quot; has stuck and increasingly, become synonymous with HIBP. For many people, the first time they ever hear the word is in the context of &quot;Have I Been...&quot; with an ensuing discussion often explaining the origins of the term as it relates to gaming culture. And if you do go and look for a definition of the term online, you&apos;ll come across resources such as <a href="https://www.inverse.com/gaming/pwned-meaning-definition-origins-video-games-internet-hackers?ref=troyhunt.com" rel="noreferrer">How &#x201C;PWNED&#x201D; went from hacker slang to the internet&#x2019;s favourite taunt</a>:</p><blockquote>Then in 2013, when various web services and sites saw an uptick in personal data breaches, security expert Troy Hunt created the website &#x201C;Have I Been Pwned?&#x201D; Anyone can type in an email address into the site to check if their personal data has been compromised in a security breach.</blockquote><p>And somehow, this little project is now referenced in the definition of the name it emerged from. Weird.</p><p>But, because it&apos;s such an odd name that has so frequently been mispronounced or mistyped, I&apos;ve ended up with a whole raft of bizarre domain names including <a href="http://haveibeenpaened.com/?ref=troyhunt.com" rel="noreferrer">haveibeenpaened.com</a>, <a href="http://haveibeenpwnded.com/?ref=troyhunt.com" rel="noreferrer">haveibeenpwnded.com</a>,  <a href="http://haveibeenporned.com/?ref=troyhunt.com" rel="noreferrer">haveibeenporned.com</a> and my personal favourite, <a href="http://haveibeenprawned.com/?ref=troyhunt.com" rel="noreferrer">haveibeenprawned.com</a> (because a journo literally pronounced it that way in a major news segment &#x1F926;&#x200D;&#x2642;&#xFE0F;). Not to mention all the other weird variations including <a href="http://haveibeenburned.com/?ref=troyhunt.com" rel="noreferrer">haveibeenburned.com</a>, <a href="http://haveigotpwned.com/?ref=troyhunt.com" rel="noreferrer">haveigotpwned.com</a>, <a href="http://haveibeenrekt.com/?ref=troyhunt.com" rel="noreferrer">haveibeenrekt.com</a> and after someone made the suggestion following the revelation that PornHub follows me, <a href="http://haveibeenfucked.com/?ref=troyhunt.com" rel="noreferrer">haveibeenfucked.com</a> &#x1F937;&#x200D;&#x2642;&#xFE0F;</p><h3 id="press">Press</h3><p>It&apos;s difficult to even know where to start here. How does the little site with the weird name end up in the press? Inevitably, &quot;because data breaches&quot;, and it&apos;s <em>nuts</em> just how much exposure this project has had because of them. These are often mainstream news events and what reporters often want to impart to people is along the lines of &quot;Here&apos;s what you should do if you&apos;ve been impacted&quot;, which often boils down to checking HIBP.</p><p>Press is great for raising awareness of the project, but it has also quite literally DDoS&apos;d the service with <a href="https://www.troyhunt.com/brief-lessons-on-handling-huge-traffic-spikes/" rel="noreferrer">the Martin Lewis Money Show in the UK  knocking it offline in 2016</a>. Cool! No, for real, I learned some really valuable lessons from that experience which, of course, I shared in a blog post. And then ensured could never happen again.</p><p>Back in 2018, Gizmodo reckoned HIBP was <a href="https://gizmodo.com/100-websites-that-shaped-the-internet-as-we-know-it-1829634771?ref=troyhunt.com" rel="noreferrer">one of the top 100 websites that shaped the internet as we knew it</a>, alongside the likes of Wikipedia, Google, Amazon and Goatse (don&apos;t Google it). Only the year after it launched, <a href="https://time.com/3054279/50-best-websites-2014/?ref=troyhunt.com" rel="noreferrer">TIME magazine reckon&apos;d it was one of the 50 best websites of the year</a>. And every time I do a Google search for a major news outlet, I find this little website. <a href="https://www.wsj.com/articles/how-to-know-if-hackers-stole-your-personal-info-and-how-to-protect-yourself-1468588297?ref=troyhunt.com" rel="noreferrer">The Wall Street Journal</a>. <a href="https://www.standard.co.uk/news/tech/worlds-biggest-stolen-data-trove-nears-10-billion-records-a4485241.html?ref=troyhunt.com" rel="noreferrer">The Standard</a> (nice headline!) <a href="https://www.usatoday.com/story/tech/columnist/2021/04/20/your-password-hacked-here-sites-alert-breaches/7262433002/?ref=troyhunt.com" rel="noreferrer">USA Today</a>. <a href="https://www.thestar.com/business/bell-small-business-customer-information-leaked-by-hackers/article_244a34a5-1b26-5378-8641-fec011cdc907.html?ref=troyhunt.com" rel="noreferrer">Toronto Star</a>. <a href="https://www.telegraaf.nl/nieuws/1835903/is-jouw-wachtwoord-ooit-gestolen-op-deze-website-kan-je-het-testen?ref=troyhunt.com" rel="noreferrer">De Telegraaf</a>. <a href="https://www.vg.no/forbruker/teknologi/i/goWoa/dropbox-avviser-hackerangrep?ref=troyhunt.com" rel="noreferrer">VG</a>. <a href="https://www.lemonde.fr/pixels/article/2016/09/06/les-donnees-de-790-000-utilisateurs-du-site-pornographique-brazzers-derobees_4993334_4408996.html?ref=troyhunt.com" rel="noreferrer">Le Monde</a>. <a href="https://www.corriere.it/tecnologia/cards/password-peggiori-ancora-piu-usate-rischio-hacker/come-scoprire-se-si-compromessi.shtml?ref=troyhunt.com" rel="noreferrer">Corriere della Sera</a>. It&apos;s wild - I just kept Googling for the largest newspapers in various parts of the world and kept getting hits!</p><p>The point is that it&apos;s had impact, and nobody is more surprised about that than me.</p><h3 id="congress">Congress</h3><p>How on earth did I end up here?!</p><figure class="kg-card kg-image-card"><img src="https://www.troyhunt.com/content/images/2023/11/File-7-12-17--07-54-50.png" class="kg-image" alt="A Decade of Have I Been Pwned" loading="lazy" width="1334" height="878" srcset="https://www.troyhunt.com/content/images/size/w600/2023/11/File-7-12-17--07-54-50.png 600w, https://www.troyhunt.com/content/images/size/w1000/2023/11/File-7-12-17--07-54-50.png 1000w, https://www.troyhunt.com/content/images/2023/11/File-7-12-17--07-54-50.png 1334w" sizes="(min-width: 720px) 720px"></figure><p>6 years and a few days ago now, I found myself in a place I&apos;d only ever seen before in the movies: Congress. <em>American</em> Congress. <em>Saying &quot;pwned&quot;!</em></p><p>For reasons I still struggle to completely grasp, the folks there thought it would be a good idea if I flew to the other side of the world and talked about the impact of data breaches on identity verification. &quot;You know they&apos;re just trying to get you to DC so they can arrest you for all that stolen data you have, right?! &#x1F923;&quot;, the internet quipped. But instead, I had one of the most memorable moments of my career as <a href="https://youtu.be/A0HPTrBiU5g?t=1359&amp;ref=troyhunt.com" rel="noreferrer">I read my testimony</a> (these are public hearings so it&apos;s all recorded and available to watch), responded to questions from congressmen and congresswomen and rounded out the trip staring down at where they inaugurate presidents:</p><figure class="kg-card kg-image-card"><img src="https://www.troyhunt.com/content/images/2023/11/IMG_0313.JPG" class="kg-image" alt="A Decade of Have I Been Pwned" loading="lazy" width="2000" height="2667" srcset="https://www.troyhunt.com/content/images/size/w600/2023/11/IMG_0313.JPG 600w, https://www.troyhunt.com/content/images/size/w1000/2023/11/IMG_0313.JPG 1000w, https://www.troyhunt.com/content/images/size/w1600/2023/11/IMG_0313.JPG 1600w, https://www.troyhunt.com/content/images/size/w2400/2023/11/IMG_0313.JPG 2400w" sizes="(min-width: 720px) 720px"></figure><p>Today, that photo adorns the wall outside my office and dozens of times a day I look at it and ask the same question - <em>how did it all lead to this?!</em></p><h3 id="svalbard">Svalbard</h3><p>The potential sale of HIBP was a very painful, very expensive chapter of life, announced in <a href="https://www.troyhunt.com/project-svalbard-the-future-of-have-i-been-pwned/" rel="noreferrer">a blog post from June 2019</a>. For the most part, I was as transparent and honest as I could be about the reasons behind the decision, including the stress:</p><blockquote>To be completely honest, it&apos;s been an enormously stressful year dealing with it all.</blockquote><p>More than one year later, <a href="https://www.troyhunt.com/sustaining-performance-under-extreme-stress/" rel="noreferrer">I finally wrote about the source of so much of that stress</a>: divorce. Relationship circumstances had put a huge amount of pressure on me and I needed a relief valve which at the time, I thought would be the sale of the project I loved so much but was becoming increasingly demanding. Ultimately, Project Svalbard (the code name for the sale of HIBP), had the opposite effect as years of bitter legal battles with my ex ensued, in part due to the perceived value that would have been realised had it been sold and some big tech company owned my arse for years to come. The project I built out of a passion to do community good was now being used as a tool to extract as much money out of me as possible. There&apos;s a wild story to be told there one day but whilst that saga is now well and truly behind me, the scars are still raw.</p><p>There were many times throughout Project Svalbard where I felt like I was living out an episode of Silicon Valley, especially as I hopped between interviews at the who&apos;s-who of tech firms in San Francisco to meet potential acquirers. But there was one moment in particular that I knew at the time would form an indelible memory, so I took a photo of it:</p><figure class="kg-card kg-image-card"><img src="https://www.troyhunt.com/content/images/2023/11/IMG_3439.JPG" class="kg-image" alt="A Decade of Have I Been Pwned" loading="lazy" width="2000" height="1500" srcset="https://www.troyhunt.com/content/images/size/w600/2023/11/IMG_3439.JPG 600w, https://www.troyhunt.com/content/images/size/w1000/2023/11/IMG_3439.JPG 1000w, https://www.troyhunt.com/content/images/size/w1600/2023/11/IMG_3439.JPG 1600w, https://www.troyhunt.com/content/images/size/w2400/2023/11/IMG_3439.JPG 2400w" sizes="(min-width: 720px) 720px"></figure><p>I&apos;m sitting in a rental car in Yosemite whilst driving from the aforementioned meetings in SF and onto Vegas for the annual big cyber-events. I had a scheduled call with a big tech firm who was a potential acquirer and should that deal go through, the guy I was speaking to would be my new boss. I&apos;d done that dozens of times by now and I don&apos;t know if it was because I was especially tired or emotional or if there was something in the way he phrased the question, but this triggered something deep inside me:</p><blockquote>So Troy, what would your perfect day in the office look like?</blockquote><p>I didn&apos;t say it this directly, but I kid you not this is exactly what popped into my mind:</p><blockquote>I get on my jet ski and I do whatever the fuck I want</blockquote><p>My potential new overlord had somehow managed to find exactly the raw nerve to touch that made me realise how valuable independence had become to me. 6 months later, Project Svalbard was dead after a deal I&apos;d struck fell through. I still can&apos;t talk about the precise circumstances due to being NDA&apos;d up to wazoo, but the term we chose to use was &quot;a change of business circumstances on behalf of the purchaser&quot;. With the benefit of hindsight, I&apos;ve never been so happy to have lost so much &#x1F60A;</p><h3 id="the-fbi">The FBI</h3><p>10 years ago, I certainly didn&apos;t see this on the cards:</p>
<!--kg-card-begin: html-->
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">This is so cool, thanks <a href="https://twitter.com/FBI?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">@FBI</a> &#x1F60A; <a href="https://t.co/aqMi3as91O?ref=troyhunt.com">pic.twitter.com/aqMi3as91O</a></p>&#x2014; Troy Hunt (@troyhunt) <a href="https://twitter.com/troyhunt/status/1674132801837477888?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">June 28, 2023</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<!--kg-card-end: html-->
<p>Nor did I expect them to be <a href="https://www.troyhunt.com/open-source-pwned-passwords-with-fbi-feed-and-225m-new-nca-passwords-is-now-live/" rel="noreferrer">actively feeding data into HIBP</a>. Or the UK&apos;s NCA to be feeding data in. Or various other law enforcement agencies the world over. And I never envisioned a time where dozens of national governments would be happy to talk about using the service.</p><p>A couple of months ago, the ABC wrote a long piece on how this whole thing is, to use their term, <a href="https://www.abc.net.au/news/2023-09-23/cybersecurity-troy-hunt-have-i-been-pwned-fighting-data-breaches/102803748?ref=troyhunt.com" rel="noreferrer">a strange sign of the times</a>.</p><blockquote>He&#x2019;s just &#x201C;a dude on the web&#x201D;, but Troy Hunt&#xA0;has ended up playing&#xA0;an oddly central role in&#xA0;global&#xA0;cybersecurity.</blockquote><figure class="kg-card kg-image-card kg-width-full"><img src="https://www.troyhunt.com/content/images/2023/12/99e2645c477b37a47f0639e2c91ca9e6.jpg" class="kg-image" alt="A Decade of Have I Been Pwned" loading="lazy" width="2000" height="1126" srcset="https://www.troyhunt.com/content/images/size/w600/2023/12/99e2645c477b37a47f0639e2c91ca9e6.jpg 600w, https://www.troyhunt.com/content/images/size/w1000/2023/12/99e2645c477b37a47f0639e2c91ca9e6.jpg 1000w, https://www.troyhunt.com/content/images/size/w1600/2023/12/99e2645c477b37a47f0639e2c91ca9e6.jpg 1600w, https://www.troyhunt.com/content/images/2023/12/99e2645c477b37a47f0639e2c91ca9e6.jpg 2150w"></figure><p>It&apos;s strange until you look at through the lens of aligned objectives: the whole idea of HIBP was &quot;to do good things after bad things happen&quot; which is well aligned with the mandates of law enforcement agencies. You could call it... common ground:</p>
<!--kg-card-begin: html-->
<iframe src="https://www.linkedin.com/embed/feed/update/urn:li:share:7107432281870319616" height="1066" width="504" frameborder="0" allowfullscreen title="Embedded post"></iframe>
<!--kg-card-end: html-->
<p>This is something I suspect a lot of people don&apos;t understand - that law enforcement agencies often work in conjunction with private enterprise to further their goals of protecting people just like you and me. It&apos;s something I certainly didn&apos;t understand 10 years ago, and I still remember the initial surprise when agencies started reaching out. Many years on, these have become really productive relationships with a bunch of top notch people, a number of whom I now count as friends and make an effort to spend time with on my travels.</p><h3 id="passwords">Passwords</h3><p>This was never on the cards originally. In fact, I&apos;d always been adamant that there should never be passwords in HIBP although in my defence, the sentiment was that they should never appear <em>next to the username</em> to which they originally accompanied. But looking at passwords through the lens of how breach data can be used to do good things, a list of known compromised passwords disassociated from any form of PII made a lot of sense. So, in 2017, <a href="https://www.troyhunt.com/introducing-306-million-freely-downloadable-pwned-passwords/" rel="noreferrer">Pwned Passwords was born</a>. You know what I was saying earlier about things escalating quickly? Yeah:</p>
<!--kg-card-begin: html-->
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">Setting all new records for Pwned Passwords this week: biggest day ever yesterday at 282M requests and biggest rolling 30 days ever, now passing the 6 *billion* requests mark! <a href="https://t.co/dQiuQim3da?ref=troyhunt.com">pic.twitter.com/dQiuQim3da</a></p>&#x2014; Troy Hunt (@troyhunt) <a href="https://twitter.com/troyhunt/status/1701473422335692997?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">September 12, 2023</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<!--kg-card-end: html-->
<p>As if to make the point, I just checked the latest stats and last week we did 301.6M requests in a single day. 100% of those requests - and that&apos;s not a rounded number either, it&apos;s 100.0000000000% - were served from Cloudflare&apos;s cache &#x1F92F;</p><p>There&apos;s so much I love about this service. I love that it&apos;s free, there&apos;s no auth, it&apos;s entirely open source (both code and data), the FBI feeds data into it and perhaps most importantly, it has <em>real</em> impact on security. It&apos;s such a simple thing, but every time you see a headline such as &quot;Big online website hit with credential stuffing attack&quot;, a significant portion of the accounts being taken over have passwords that could easily have been blocked.</p><h3 id="the-paradox-of-handling-data-breaches">The Paradox of Handling Data Breaches</h3><p>On multiple occasions now, I&apos;ve had conversations that can best be paraphrased as follows:</p><p><strong>Random Internet Person:</strong> I&apos;m going to report you to the FBI for having all that stolen data</p><p><strong>Me:</strong> Maybe you should start by Googling &quot;troy hunt fbi&quot; first...</p><p>But I understand where they&apos;re coming from and the paradox I refer to is the perceived conflict between handling what is usually the output of a crime whilst simultaneously trying to perform a community good. It&apos;s the same discussion I&apos;ve often had with people citing privacy laws in their corner of the world (often the EU and GDPR) as the reason why HIBP shouldn&apos;t exist: &quot;but you&apos;re processing data without informed consent!&quot;, they&apos;ll claim. The issue of there being other legal bases for processing aside, <em>nobody</em> consents to being in a data breach! The natural progression of that conversation is that being in a data breach is a parallel discussion to HIBP then indexing it and making it searchable, <a href="https://www.troyhunt.com/the-ethics-of-running-a-data-breach-search-service/" rel="noreferrer">which is something I&apos;ve devoted many words to addressing in the past</a>.</p><p>But for all the bluster the occasional random internet person can have (and honestly, I could count the number of annual instances of this on one hand), nothing has come of any complaints. And when I say &quot;complaints&quot;, it&apos;s often nothing more than a polite conversation which may simply conclude with an acknowledgment of opposing views and that&apos;s it. There has been <em>one</em> exception in the entire decade of running this service where a complaint did come via a government privacy regulator, I responded to all the questions that were asked and that was the end of it.</p><h3 id="people">People</h3><p>When you have a pet project like HIBP was in the beginning, it&apos;s usually just you putting in the hours. That&apos;s fine, it&apos;s a hobby and you&apos;re scratching an itch, so what does it matter that there&apos;s nobody else involved? Like many similar passion projects, HIBP consumed a lot of hours from early on, everything from obviously building the service then sourcing data breaches, verifying and disclosing them, writing up descriptions and even editing every single one of those 700+ logos by hand to be just the right dimensions and file size. But in the beginning, if I&apos;d just stopped one day, what would happen? Nothing. But today, a genuinely important part of the internet that a huge number of individuals, corporations and governments have built dependencies on would stop working if I lost interest.</p><p>The dependency on just me was partly behind the possible sale in 2019, but clearly that didn&apos;t eventuate. There was always the option to employ people and build it out like most people would a normal company, but every time I gave that consideration it just didn&apos;t stack up for a whole bunch of reasons. It was certainly feasible from the perspective of building some sort of valuable commercial entity, but in just the same way as that question about my perfect day in the office sucked the soul from my body, so did the prospect of being responsible for other people. Employment contracts. Salary negotiations. Performance reviews. Sick leave and annual leave and all sorts of other people issues from strangers I&apos;d need to entrust with &quot;my baby&quot;. So, bringing in more people was a really unattractive idea, with 2 exceptions:</p><p>In early 2021, my (soon to be at the time) wife Charlotte started working for HIBP.</p><figure class="kg-card kg-image-card"><img src="https://www.troyhunt.com/content/images/2023/12/CharlotteHunt.jpg" class="kg-image" alt="A Decade of Have I Been Pwned" loading="lazy" width="400" height="284"></figure><p>Charlotte had spent the last 8 years working with people just like me; software nerds. As a project manager for the NDC conferences based out of Norway, she&apos;d dealt with hundreds of speakers (including me on many occasions), and thousands of attendees at the best conference I&apos;ve ever been a part of. Plus, she spent a great deal of time coordinating sponsors, corporate attendees and all sorts of other folks that live in the tech world HIBP inhabited. For Charlotte, even though she&apos;s not a technical person (her qualifications are in PR and entrepreneurial studies), this was very familiar territory.</p><p>So, for the last few years, Charlotte has done absolutely everything that she can to ensure that I can focus on the things that need my attention. She onboards new corporate subscribers, handles masses of tickets for API and domain subscribers and does all the accounting and tax work. And she does this tirelessly every single day at all sorts of hours whether we&apos;re at home or travelling. She is... amazing &#x1F929;</p><p>Earlier this year, <a href="https://stebet.net/?ref=troyhunt.com" rel="noreferrer">Stef&#xE1;n J&#xF6;kull Sigur&#xF0;arson</a> started working for us part time writing code, cleaning up code, migrating code and, well, doing lots of different code things.</p><figure class="kg-card kg-image-card"><img src="https://www.troyhunt.com/content/images/2023/12/Stef-nJ-kullSigur-arson.jpg" class="kg-image" alt="A Decade of Have I Been Pwned" loading="lazy" width="400" height="276"></figure><p>Just today I asked Stef&#xE1;n&#xA0;what I should write about him, thinking he&apos;d give me some bullet points I&apos;d massage and then incorporate into this blog post. Instead, I reckon what he wrote was so spot on that I&apos;m just going to quote the entire thing here:</p><blockquote>&quot;Just&quot; that having had my eye on the service since it was released and then developing one of the first big integrations with the PwnedPasswords v2 API in EVE, coinciding with us meeting for the first time at NDC Oslo in 2018 shortly after,&#xA0; HIBP has managed to take me on this awesome journey where it has been a part of launching my public speaking career, contributing to OSS with Pwned Passwords, becoming an MVP and helped me meet a bunch of awesome people and allowed me to contribute to a better and hopefully safer internet. I&apos;m very happy and honoured to a be a part of this project which is full of awesome challenges and interesting problems to deal with. Having meeting invites from the FBI in my inbox a few years after doing a few experimental rest calls to the Pwned Passwords API in early 2018 was definitely not something I was expecting &#x1F605;</blockquote><p>What really resonated with me in Stef&#xE1;n&apos;s message is that for him, this isn&apos;t just a job, it&apos;s a passion. His journey is my journey in that we freely devoted our time to do something we love and it led to many wonderful things, including MVP roles and speaking at &quot;Charlotte&apos;s&quot; conference, NDC. Stef&#xE1;n&#xA0;is based in Iceland, but we&apos;ve still had many opportunities to share beers together and establish a relationship that transcends merely writing code. I can&apos;t think of anyone better to do what he does today.</p><h2 id="breaches">Breaches</h2><p>731 breaches later, here we are. So, what stands out? Just going off the top of my head here:</p><p><strong>Ashley Madison.</strong> Every knows the name so it needs no introduction, but that incident in 2015 had a major impact on HIBP in terms of use of the service, and also a major impact on me in terms of the engagements I had with impacted parties. My blog post on <a href="https://www.troyhunt.com/heres-what-ashley-madison-members-have/" rel="noreferrer">Here&#x2019;s what Ashley Madison members have told me</a> still feels harrowing to read.</p><p><strong>Collection #1.</strong> This is the one that really contributed to my stress levels in early 2019 and had a profound impact on my decision to look at selling the service. <a href="https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/" rel="noreferrer">Read about where those 773M records came from</a> (still the largest breach in HIBP to date).</p><p><strong>Rosebutt.</strong> Don&apos;t make a joke about it, don&apos;t make a joke about it, don&apos;t... aw man, <a href="https://web.archive.org/web/20160512105342/http://www.theregister.co.uk/2016/05/11/embarassing_data_breach/" rel="noreferrer">thanks The Register!</a> (link to an archive.org version as they seem to have thought better of their image choice later on...) The point is that even serious data breaches can have their moments of levity.</p><p><strong>Shit Express.</strong> Sometimes, you just need a bit of hilarity in your data breach. Shit Express is literally a site to send other people pieces of that - <em>anonymously </em>- <a href="https://www.bleepingcomputer.com/news/security/anonymous-poop-gifting-site-hacked-customers-exposed/?ref=troyhunt.com" rel="noreferrer">and they got breached</a>, thus somewhat affecting their anonymity. The more serious point is that as I later wrote, <a href="https://www.troyhunt.com/safe-secure-anonymous-and-other-misleading-claims/" rel="noreferrer">claims of anonymity are often highly misleading</a>.</p><h2 id="future">Future</h2><p>I often joke about my life being very much about getting up each morning, reading my emails and events from overnight and then just winging it from there. Of course there are the occasional scheduled things not to mention travel commitments, but for the most part it&apos;s very much just rolling with whatever is demanding attention on the day. This is also probably a significant part of why I don&apos;t really want to see this thing grow into a larger concern with more responsibilities, I just don&apos;t want to lose that freedom. Yet...</p><p>We&apos;re gradually moving in a direction where things become more formalised. 3 years ago, I did 100% of everything myself. 1 year ago, I did everything technical myself. 6 months ago, we had no ticketing system for support. But these are small, incremental steps forward and that&apos;s what I&apos;d like to see continuing. I want HIBP to outlive me, I just don&apos;t want it to become a burden I&apos;m beholden to in the process. I&apos;d like to have more people involved but as you can see from above, that&apos;s been a very slow process with only those very close to me playing a role.</p><p>The only thing I have real certainty on at the moment is that there will be more breaches. I&apos;ve commented many times recently that the scourge that is ransomware feels like it&apos;s really accelerated lately, I wonder how many of the people in the emails and documents and all sorts of other data that get dumped there ever learn of their exposure? It&apos;s a non-trivial exercise to index that (for all sorts of reasons), but it also seems like an increasingly worthy exercise. Who knows, let&apos;s see how I feel when I get up tomorrow morning &#x1F642;</p><p>Finally, for this week&apos;s regular video, I&apos;m going to make a birthday special and do it live with Charlotte. Please come and join us, I&apos;m not entirely sure what we&apos;ll cover (I&apos;ll work it out on the morning!) but let&apos;s make a virtual 10th birthday party out of it &#x1F382;</p>
<!--kg-card-begin: html-->
<iframe width="100%" height="480" src="https://www.youtube.com/embed/6MHGUb5P7hE" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe>
<!--kg-card-end: html-->
]]></content:encoded></item></channel></rss>