No Passwords Stolen During Ubuntu Forums Data Breach

A few days ago, the Ubuntu Forums were breached by unknown assailants. A total of two million user accounts were stolen, albeit there is no need to worry just yet. User passwords are not compromised, as the assailants only obtained random text strings stored in the database. The issue has been corrected in the meantime, and full service has been restored.

Ubuntu Forums Hack Does Not Affect User Accounts

In most cases when a data breach takes place, user accounts are not safe from harm. But as far as the Ubuntu Forums hack is concerned, no user passwords were stolen. The issue came to light when a deep web seller claimed to own a copy of the Ubuntu Forums database, containing roughly two million user accounts.

The Canonical IS team investigated the matter promptly and discovered an exposure of data had taken place. The Ubuntu Forums were shut down for a while to address this issue, and ensure new security measures could be implemented. As it turns out, an SQL injection vulnerability had been used to exploit the Forumrunner add-on.

Among the information, the assailant managed to access were all database tables. However, it appears they only read from the “user” table. This list contains all specific usernames on the Ubuntu Forums, but the “password” table as not accessed by any means. Portions of the user table were downloaded, allowing assailants to get a list of usernames, email addresses, and IP addresses.



Related Post

While there were passwords stored in the user table, they were not active passwords being used on the Ubuntu Forums. Instead, there were random strings, as the forum uses Ubuntu Single Sign On for login activity. Moreover, all of these random strings were hashed and salted, adding an extra layer of security.

So far, the Ubuntu Forums administrators have backed up all of the servers running vBulletin, and rebuilt them after wiping them clean. The vBulletin software has been updated to the most recent version as well. Last but not least, all database and system passwords have been reset to ensure no further breaches could take place.

Image credit 1

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Bitget Launches OpenAI Pre-IPO Access As Crypto Exchanges Push Into Tokenized Equity Markets

Bitget officially launched pre-IPO access to OpenAI via its IPO Prime platform which deepens their…

11 hours ago

Tether Expands Open-Source Push With New Developer Grants For AI And Payment Infrastructure

Tether's presence in decentralized tech space is growing due to the launch of its developer…

1 day ago

Huma Finance Exploit Hits Legacy Contracts As Platform Maintains Stability And Accelerates Transition To V2 System

While challenges remain, the decentralized finance sector is moving forward, and Huma Finance's exploit serves…

1 day ago

Chainlink Expands Cross-Chain Reach As Major Protocols And Institutions Deepen Adoption 

Chainlink is continuing its mission to be the most widely integrated infrastructure in crypto, adding…

2 days ago

Sui Network Hit Again: DeepBook Exploit Adds To Growing List As Token Defies Pressure With Bullish Breakout

A vulnerability in one of the core DeFi protocols on Sui Network exposes the ecosystem…

3 days ago

Polygon Raises Network Capacity To 140M Gas

Polygon has made a big move in cementing its mission as one of the leading…

4 days ago