Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A common web application vulnerability, poor detection capabilities and a lack of adequate encryption led to the recent hack of MilitarySingles.com, according to Imperva.
In March, the popular military dating site sustained a security breach carried out by hackers calling themselves "LulzSec Reborn," resulting in the dumping of personal information belonging to 170,000 members. The data included names, usernames, passwords, and IP addresses.
Following the breach, an unidentified administrator for ESingles Inc., the parent company of MilitarySingles.com, posted a comment on a website that records data breaches denying the attack ever occurred.
However, security firm Imperva believes the break-in certainly happened, based on analysis of the published booty and the hijacked website.
According to its "Hacker Intelligence Initiative" monthly trend report, the attackers were able to infiltrate MilitarySingles.com by exploiting a remote file inclusion vulnerability.
In this case, the saboteur posed as a user and may have uploaded a malicious executable disguised as an image, Rob Rachwald, director of security strategy at Imperva, told SCMagazine.com on Thursday.
Since the proper filters were not in place, the poisonous file ran directly on the web server, exposing the database and giving the miscreant the ability to pull out the information, Rachwald said. This could have been prevented had the proper security measures been put in place, he added.
“It's considered common practice to take a file from an external source and quarantine it or run it in a special sandbox where it won't cause too much damage,” he said.
Additionally, improper encryption methods were used to protect users' passwords, Rachwald said. According to the report, site administrators failed to deploy a common encryption best practice known as “salting,” which randomly appends the string of characters in each password.
“That complicates a hacker's life tremendously because it will take them at least a couple of days to go through that process, so they just give up and move on,” Rachwald said. “But that was not done in this case.”
As for motive, Rachwald isn't sure. But he speculates the attack was perpetrated because of the site's tie with the U.S. military, a target of politically motivated hacktivists.
A spokesperson for ESingles Inc. did not respond to an SCMagazine.com request for comment.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.