MusicBrainz data dump serves as a warning for password reuse: Trend Micro

Security vendor weighs in on the recent data dump and the importance of different passwords

MusicBrainz, the popular open content music database, disclosed at the end of March that a database dump had taken place and user information had been downloaded.

One of these dumps contained password hashes for a large portion of MusicBrainz accounts, and the site responded by deleting and replacing it with correctly sanitised database dumps.

While the site admits to having no idea where the data is now located, it is asking all users to change their passwords.

MusicBrainz has attempted to downplay the incident by saying that the password hashes are neither useful or widely distributed, and that the data should not allow attackers to retrieve user passwords.

Without seeing the stolen data in question, Trend Micro A/NZ strategic products senior manager, Adam Biviano, said it is difficult to ascertain whether user passwords are at risk, as it dependant on the hash algorithm that was used.

“We saw in the recent breach of one of the ABC’s websites that the hashing algorithm allowed an attacker to quite easily discover many of the passwords,” he said.

“Even with a strong hashing algorithm, simple passwords like common words are easy to discover by using a brute force dictionary attack against the hash contents.”

In response to the situation, MusicBrainz said it will adjust its database dumping scripts to be specific about which data to export in order to avoid future leaks of private data.

Biviano said the data dump incident is not limited just to MusicBrainz, adding that “these attacks are more common than [he] would like to see."

“The ABC fell victim to this problem just recently, and I’m never surprised when I hear of these incidents as it seems to be quite commonplace these days,” he said.

Password protection

As for whether there is anything a user can do to protect themselves from these types of incidents, Biviano said it is mainly up to the site’s administrator or owner to provide protection.

However, individuals are able to take certain steps to minimise the impact to themselves.

“If they reuse the same username and password combination for many different websites, then if their password is discovered for one then an attacker may be able to take over many online services that the individual may have access to,” he said.

“If they use a complex password that is not a common word or has a mixture of letters and numbers, then if a hashed version is released to the public, the odds of it being cracked are a lot less.”

If a user discovers through an email from a site administrator that their password may have been compromised, Biviano said they should think about where else they have used that password and change it too.

Patrick Budmar covers consumer and enterprise technology breaking news for IDG Communications. Follow Patrick on Twitter at @patrick_budmar.

Tags databasestrend microhacking

More about ABC NetworksABC NetworksIDGIDG CommunicationsIDG CommunicationsIDG CommunicationsTrend Micro Australia

ARN Directory | Distributors relevant to this article

ARN Directory | Vendors relevant to this article

Comments

Comments are now closed

 

Latest News

Oct 31
Over a quarter of Australians won’t bank on their mobile: Kaspersky
Oct 31
HDS A/NZ Partner Summit 2014 in Noosa (+15 photos)
Oct 31
The Google shakeup continues: Andy Rubin is out
Oct 31
Impact Systems boss wants to buy 10 resellers
More News
05 Nov
LIVE Webcast: Lessons Learned from the Biggest Security Breaches
05 Nov
vForum 2014
10 Nov
Ascom Myco Launch Event
11 Nov
DCIM Certified Solutions Professional
View all events