Second Life Database Intrusion via Web 48
Jim writes "A major security exploit has been discovered by Linden Labs, the company that operates Second Life. It turn out that on September 6th, an intruder gained access to the Second Life database. They have since closed the exploit. Today, September 8th, they finally announced this to residents and have cancelled all passwords. They have asked everyone to use the reset password form to make a password. This has resulted in mass confusion amongst residents on the forums who cannot remember their security question. Many more details below.
Calls to Linden Labs offices in California are directed to a message telling residents to change their password via secondlife.com/password.According to the Second Life Blog:
"On September 6 we discovered evidence that an intruder was able to access the Second Life database through the web servers. The exploit was shut down on the afternoon of September 6 when we discovered it.
Detailed investigation over the last two days confirmed that some of the unencrypted customer information stored in the database was compromised, potentially including Second Life account names, real life names and contact information, along with encrypted account passwords.
No credit card information is stored on the database in question, and that information has not been compromised.
As a precaution we have invalidated all Second Life account passwords. In order to log-in to Second Life you will have to create a new password. Please access the log-in page at https://secondlife.com/password, and click on the "Forgot Password" link. An email will be sent to the email address you have registered with us. (Don't forget to check your spam filter!) Please click through the link in that email, answer the security question, and create a new password."
Ack (Score:2, Interesting)
Yes, the fact that the blog runs on the same MySQL cluster as the main account passwords has more than one side effect.
Does anyone else see a problem with this? (Score:4, Insightful)
But they're using the "security question"
and how is this fixing the problem? What exactly prevents the intruder from using the security question out of the database they compromised?
Re:Does anyone else see a problem with this? (Score:5, Informative)
SO you'd have to have that randomly-generated link to make use of said security question.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re:Does anyone else see a problem with this? (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
Q: Should I be concerned that encrypted password and encrypted payment information may have been exposed? Is the encryption unbreakable?
A: We use an MD-5 hash (scramble function) and salt (additional data) to encode passwords and payment information
So it seems pretty safe. I'm glad they reacted the way they did and use good security practices for storing info, I wish they reacted faster, I hope they did not detect the intrusion through user complaints but instead through routine chec
Re: (Score:3)
Even that isn't going to prevent a cracker from running brute force dictionary attacks against the users' e-mail addresses/servers .
Re: (Score:1)
Re: (Score:2)
Also in the database. Care to guess how many people have a standard password for low-security use (and don't know better than to use it for their email)?
Not that I'm swinging a bat a Second Life here — shit happens. People screw up. They fixed it.
Re: (Score:2)
Perhaps someone can educate me... Are the security questions in Second Life the same as most other things... You get a drop-down box with options for your question, then type in your answer?
Why do I sense a lot of phishing that's going to be going on? The user gets a phishy email, clicks on the link, does their security stuff and enter their new
Re: (Score:1)
Re: (Score:2)
Re:Does anyone else see a problem with this? (Score:5, Informative)
The answer to my security questions on ALL websites is now something to the effect of 20-40 random characters.
Re: (Score:3, Interesting)
Ya, security questions are stupid. I remember going into several chicks account on the ICQ times. The recipe was:
1. Search for interesting (age, city, status of profile) girl with ICQ search option.
2. Get into email page (preferably hotmail or yahoo mail or any other webmail) and go through the "forgot my password"
3. Bypass the "whats your age and other general info" filter, looking of courrse in their profile, it was so funny to look how they fill
Re: (Score:1)
Re: (Score:3, Insightful)
What ticks me off are banks that only allow 4 digits for PINs. My old bank allowed 6, a 1 in a million
Re: (Score:2)
But they're using the "security question"
ironically, I just got done going through the process when I decided to check slashdot lol.
In order to load the security question you have to click on a link with a UUID in an e-mail to your registered address - the attacker would have to have access to your e-mail as well.
Also I would note that the attacker go
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Oh, dear... (Score:2)
Are you kidding me... (Score:1)
Re: (Score:2)
I highly doubt that it's slashdotted... far more likely it's SLdotted - SL's website is never that fast anyways, and can crash / become unusable from load related problems completely and totally unrelated to slashdot, in my experience...
Wow! (Score:2, Funny)
Finally, it's good to see a company taking security seriously!
That said, and this isn't their fault, I'm cynical about the claim that credit card data wasn't compromised...
Re: (Score:2)
ObPA (Score:5, Funny)
Re: (Score:1)
Correct me if I'm wrong, but isn't it a bit insecure to have questions like "what's your mother's n
Re: (Score:1)
That always worries me when I have to do that.
Now that site knows all my passwords. They might even be sitting in some "invalid login" log file, in plaintext.
Re: (Score:1)
Re: (Score:3, Informative)
It took two days to cancel passwords (Score:3, Interesting)
No CC or Cell phone # Needed anymore (Score:2, Informative)
Signups now on SL are only tied to a valid email address
Praise for Linden Lab (Score:1)
I'm really impressed by the way Linden Lab has been handling this issue. Though the exploit seems to be not their fault, they are still humbly taking the blame. In addition, as soon as they figured the extent of the hack, they reported it to the users, and immediately changed all the account passwords in their systems. They didn't really need to do this, ie, they could have just issued a warning, but its shows that they care about the user's security more than their public image (no doubt this password chan
Sockpuppet? (Score:2)
C'mon this has got to be a plant. Even a rabid Second Life fanboy wouldn't be praising this security breach. Of course it's Linden's fault for the breach.
Re: (Score:2)
I dunno, you think Linden would have enough money to shell out for a professional sockpuppeting service. It's not like they've been spending all their money on server security!
holy hell (Score:1)
Hacking Second Life? I'm not worried... (Score:2)
Just curious why this is under Role Playing Games (Score:2)
Serial numbers are go! (Score:1)