Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
We got hacked (name.com)
102 points by subsection1h on May 10, 2013 | hide | past | favorite | 100 comments


“give a shit”

This language is such a turn-off. Very few organizations can use that type of flippant language successfully, especially in a serious email like this. Now's not the time to try to be hip or cool. This is a serious issue and the writer should be just as serious.

Edit: Their site is down now so here's a copy of their post

Many of you received our email or saw online that name.com was hacked. The truth is that it's one of the more painful admissions that can be made on the Internet. We want you to know that when we say that we “give a shit” we truly mean it. In an effort to maintain the open, honest, and transparent reputation we’ve built for ourselves, we’re going to give you the lowdown on what happened and what we did in response.

Our security team alerted us that unauthorized individuals had accessed our database. After doing some digging we found that the attack seemed to be geared toward a few specific accounts. The hackers had a target and name.com was a means to that end.

The information that was accessed includes usernames, passwords, physical addresses, email, hashed passwords and encrypted credit card data. EPP codes (required for domain name transfers) are not stored in the same place so those were not compromised. For the techies who are wondering, the encryption on the credit card information is 4096 bit RSA. Since the password hashes were compromised we took proactive steps and initiated a site-wide password reset (hence the email, apologies for the inconvenience).

We are genuinely sorry for the annoyance and the scare. We’re taking this incredibly seriously and are doing everything possible to continue to improve the security of our systems. We greatly appreciate the support across the web and over the phones.


I agree. I am prone to "swearing like a sailor" but in public (including the internet), I try to keep it pg-13-ish most of the time. Even on my personal blog, where some folks think I say waaay too much about my (lack of a) sex life, I try to limit the swearing. If I can figure out that this does not make a good impression, one would hope that "business people" could too (though perhaps not).

(Also, fwiw, I am grossed out by casual references to poop, no matter how nicely they say it, but especially when using the S word. I am very prone to F bombs, but, then, I actually like sex. But references to poop have me envisioning it. No thanks. Ick. Y'all are disgusting. And, though perhaps not the norm, I am probably not the only person who dislikes having images of poop forced upon them, even if others don't necessarily have the quirk of finding it more offensive than the F word.)


For someone who dislikes references to "poop", you certainly mention it a lot.


It's their tagline:

"Name.com is a fully accredited ICANN domain name registrar. In addition to great pricing and service, we offer SSL certificates, web hosting, premium and expired domains. Most importantly, we've been giving a $#*! since 2003!"


Holy shit, you're right! I thought this was a joke at first. Even after jonmrodriguez confirmed it, I thought he was continuing the joke but it's true. They actually say:

"Name.com is a fully accredited ICANN domain name registrar. In addition to great pricing and service, we offer SSL certificates, web hosting, premium and expired domains. Most importantly, we've been giving a $#*! since 2003!"

I still don't think it comes off well but, in that context, I guess it's not as bad as I originally thought. And that's probably why they put it in quotes in the message. It makes more sense now.

Thank you!


Good find, it looks like most people on this thread missed this.


To me it's really not a turn off at all. I'd rather they swear away and have a personality than be a starchy, try-not-to-offend-anyone bland corporate drone.


Swearing is not the only way to show personality. In fact, it's one of the cheapest ways to do so. It's easy to say "fuck" and "shit" to break free form the usual generic writing but you can actually write a personal and honest message without cursing.

Edit: here's a great way to show personality without being crude http://www.name.com/aboutus#/ourTeam


Is the word "shit" really that big of a deal? "Give a shit" is a colloquial way of saying they care without sounding like they're regurgitating some polished corporate-speak. It's not like they called the hackers cock-juggling thundercunt scriptkiddies while telling them to "bring it" now that they've fixed the problem. There's no element of juvenility in how they said what they said, and they're not using grown-up words to call people names for the sake of it. I sense no element of posturing.

In all cases I'd rather deal with real people than whitewashed "employees". In many ways I'm glad they offended someone over the word "shit" because it means they're being at least a little true to themselves.


I agree that sterile generic corporate speak is not good but it sounds like you're saying that the only way they could be true to themselves or to appear as real people is to use shit.

I disagree.


I actually liked the blunt honesty. It's so much better than the usual "Your call is very important to us" corporate double speak.


Blunt honesty does not have to be crude. Also being crude is not the only way to avoid being generic.

Blunt honesty without being crude: We screwed up, we're sorry.

Avoiding being generic without being crude: We want you to know that when we say that this matters to everyone in the company, we truly mean it.


> Avoiding being generic without being crude: We want you to know that when we say that this matters to everyone in the company, we truly mean it.

If that doesn't sound like whitewashed corporate-speak, I don't know what does. It sounds like an empty platitude and I wouldn't even believe it if someone said that to me.


Sure. I spent 30 seconds on it but are you saying the only way to show you care and not sound generic is to curse?


It's not the only way, it's just a damn good way!


Nah, I've experienced plenty of situations where cursing just makes me lose respect for someone/thing. I'm not saying I'm against cursing (though I don't really curse much myself). I'm saying that cursing shouldn't be used flippantly. It loses its power if it is. This sounds flippant to me, especially when they put it in quotes.


They put it in quotes because its their company strap line. It's at the footer of every one of their pages: "giving a @&$#!! since 19xx (some year I don't recall)


You're right! I didn't notice this and it puts it all in context now. I thought you and others were joking but I saw it a few times so I finally checked.

I wish I could still edit my original post to put this in.


Thank you for shedding light.


But we sincerely mean it!

We value you as a customer and appreciate your business. Thank you for your consideration, and don't forget to sign up for our newsletter.


Nah, it's just hipster double speak :)


I don't think I'd want to use a domain registrar run by people who think that using the mustache meme on their "About Us" page [1] is professional. I'm not usually prudish about language or jokes, but hosting and domains are serious business.

[1]: http://www.name.com/aboutus#/ourTeam


I can understand why you'd be turned off by that but at least it's on a page that doesn't necessarily have to be serious. You're learning about the company and this is part of their culture. In fact, that's a great example of a company showing personality without resorting to crude language.


Honestly, I don't like the use either. It is a serious issue. They know that. The writer knows that. Nevertheless the writer, while perhaps in poor judgment, assessed the situation in need of a slight touch of relief. They're trying to calm their customers. It looks like this is where they shall begin.

This commentary though, it is unnecessary. They are making an attempt of remain open and communicate with their customers. Responses like these aren't going to aid further such attempts of similar observers. Others are going continue as many still do: skating by with such breaches unreported. Your data will be out there and you won't have a clue. Would that be better?

This very view has been much of what is wrong with HN these days. Comments with this air of pseudo-intellectual, overly-critical analysis over the inherent nature of intentions (and word use).


I read this as 'give a shirt' so I was reading the article the whole time wondering 'who gets the shirt?'.


Probably because you'd sooner expect the word "shirt" in a message like this than the word "shit".


Meanwhile in looking to re-read that language I get this error:

"You don't have permission to access /blog/general/2013/05/we-got-hacked/ on this server.

Additionally, a 403 Forbidden error was encountered while trying to use an ErrorDocument to handle the request."


Same here. Given that they got hacked, given some of the other comments about the content of the post, and given that they apparently can't build a site that can handle a hackernews frontpage, I think I will continue to avoid them as a registrar.

Edit: And, their bulk domain search still appears to be broken for entering more than five domain names: http://www.name.com/names

Edit2: The new error with their blog post:

The webpage at http://www.name.com/blog/general/2013/05/we-got-hacked/ has resulted in too many redirects.


That plus their DNS hijacking [1]. I really loved their UI, but have been moving my domains off Name.com as they come up for renewal.

[1]: https://duckduckgo.com/?q=name.com+dns+hijack


I believe that you can transfer them right away without losing any time on your lease. Meaning if you have 6 months before a domain expires and transfer it to a new registrar and pay for a year, you'll have a year and a half before it expires.

I've never done it myself but I've read it in multiple occasions so it might be worth checking if you're really looking at moving away.


Correct. And some domains can be tough to transfer once you get too close to renewal time, so I'd recommend transferring sooner rather than waiting for the renewal date to come up.


Yes this is correct. You don't lose any time when switching. And actually any time a domain is switched 1 year is automatically added to the expiration date (.com/net/org/info).


Curious, where have you been moving your domains to ?


Namecheap. Seems to be the favorite among the HN crowd. Also, they donate to EFF.

Oh, and gandi.net for TLDs I can't get from namecheap, like .io, .cx.

http://community.namecheap.com/blog/2011/12/29/25000-eff-don...


Same here. Namecheap for the common domains, Gandi for the slightly more exotic ones. I've been happy with both.

I also have one domain at networksolutions (it was worth a $100 difference over five years vs gandi), but I definitely would avoid them in the future. As soon as I ordered, they started calling once per day attempting to sell further services. They are on my avoid list now.


I started the transfer process for a .im to Gandi last night. I just wish Namecheap handled that TLD so I could manage everything in one place.


Looks like all of http://www.name.com/blog is down.



Dammed if you do, dammed if you don't.


What do you mean? Who damns a company that doesn't curse in their press releases?


This is a registrar that, if you use their DNS service, refuses to return not found records and instead serves up ads, on your domain. That's cheesy thing to do. I had started to move some domains to them from GoDaddy, found out about it, contacted them to see if they can remove it, and was told off.


Breaking DNS for profit is enough reason not to use them.


Injury to insult: their TOS in no uncertain terms makes you, the website owner, liable for all content they forcibly redirect to. They're at the bottom of the barrel with GoDaddy. Total scumbags.


"The information that was accessed includes usernames, passwords, physical addresses, email, hashed passwords..." They mention passwords AND hashed passwords, I wonder if this means they had some passwords saved in the clear.


And also whether "hashed" means salted and hashed or just simply hashed.

Honestly, I would feel much more comfortable if sites publicly disclosed their password encryption strategy. Just saying "oh they're hashed" really doesn't make me feel any better -- how do I know they didn't just do a quick MD5 instead of a proper password-appropriate process?


> Honestly, I would feel much more comfortable if sites publicly disclosed their password encryption strategy.

Funny you should mention that.

I thought at one point that I could set up a http://tosdr.org/ like database, showcasing the best password securities in use. You could have lists of the people using MD5, scrypt, bcrypt, and so forth. Think of it as a trophy case of password storage algorithms. My sticking point was finding the information, aside from looking at already leaked databases, you just have to go and ask the developers.

I emailed about 35 companies with a standard block of text asking if they were willing to disclose their scheme, the responses were mostly in the following:

• "our passwords are encrypted, you don't need to worry"

• "we can't disclose this for security reasons"

• "you're trying to hack us!"

I don't know what I expected really. We will have to stick to laughing at the atrocities listed on on http://plaintextoffenders.com/ .


> "you're trying to hack us!"

This sounds like the beginning of a pretty good blog.


Yeah, the lack of transparency is what made me explicitly mention it when creating Persowna (https://www.persowna.net/).


I would feel much better if passwords were just stored on a HSM (Hardware Security Module) instead of an local unix file system.

And, from a security perspective, it's mostly irrelevant as to whether passwords were hashed (where hash = MD5, SHA, or some other high speed hash function), or salted+hashed.

Why:

Look at two scenarios,

  Scenario #1: The security of your Strong, high-entropy password.
  Scenario #2: The security of all the n00b's weak passwords.
Then, look at two options:

   Option #1: Hashed, no Salt
   Option #2: Hashed + Salt.
In Scenario #1 - your password is secure in Option #1, because your password does not appear in a rainbow table.

In Scenario #2 - the vast majority (60%+) of those weak passwords can be brute forced with sophisticated dictionary attacks in a couple days even with a hash+salt - no need to use rainbow tables.

Ironically, Salt's offer no security for you (you don't need them), or the vast majority of people (whose password will be broken, even if they are salted+hashed). Salts+Hash were relevant from 1990-2010, prior to high speed GPUs and ASICs overtaking Rainbow Tables. People learned lessons then, that are no longer relevant.

Now, where Salts ARE important, is with a multi-iteration key-derivative function like bcrypt or scrypt. There, a salt (which is part of the bcrypt and scrypt algorithm) actually does offer (a lot) of security to the n00bs. Without salts scrypt/bcrypt would once again tip the balance back in favor of Rainbow Tables. But, of course, scrypt/bcrypt are inherently salted.

But your high-entropy password is safe regardless.

As always, http://codahale.com/how-to-safely-store-a-password/


I think we all need to accept that once we've given a password to a website it's compromised. It does not matter how they protect it - it's no longer safe. If someone has walked in to their website and taken our information, it doesn't matter which hashing scheme they've used. It's no longer important. Assume that any password you ever give out is gone. Be prepared to change your password / key on a site at any time. Mine are 26 character keys I don't know and will change as required (or leave a service that loses them).


So where and how do you store these passwords which you don't know?


1password for me. You can choose whatever you want though. Write them on a piece of paper you keep in your pocket if that works for you. Whatever you do, don't reuse them between services. It's just a matter of time before someone loses them and all your accounts are wide open.

In an ideal world we wouldn't use passwords anymore. But right now we have no choice so we have to do whatever we can to mitigate our eventual compromised accounts.


1password here too. Previously used lastpass, and for me, 1password is so much better.


Using a password manager like 1Password.


KeePass


> And also whether "hashed" means salted and hashed or just simply hashed.

That really doesn't make that much of a difference anymore, given the fact that it's known information that's easily parseable. Rainbow tables are really just a quick convenience, but it's not like there aren't programs that can automate the process of getting and appending the salt to a password string and then just brute forcing. Even with something like bcrypt, you're still working against 1) infinite time and 2) users who don't understand how dangerous a weak password is.


They were using and probably are still using unsalted MySQL 4.1+ PASSWORD()

https://news.ycombinator.com/item?id=5677550


They mentioned they're using bcrypt in the comments:

http://www.name.com/blog/general/2013/05/we-got-hacked/#comm...


They're lying or confused, the data I have is definite proof. 9gag's password and ours were hashed unsalted with MySQL's PASSWORD(). I'll reply on that comment.


He seems to be correct. Here's the comment with more information: http://www.name.com/blog/general/2013/05/we-got-hacked/#comm...


I emailed them and got this as a response: http://cl.ly/image/3R1R3e2i1h0s


I was thinking the same thing. From their wording of the issue, that appears to be the case.


Name.com: Why did it take you over a month to report the fact that you were hacked to your users if you "give a shit" about us?


I think they only realized it happened after name.com was mentioned as a hacked site in HTP5.

http://www.exploit-db.com/papers/25306/


If that's the only reason they realized it happened then that's disturbing as well.


Or they only chose to do something about it once it was public domain.


So they're either incompetent or really shady. At least they're handling it as well as Linode did.


It says in the HTP5 release that Linode was placed in an intolerably difficulty situation between the HTP group and the FBI and were not in a position to make a public statement until they were directly instructed to by the FBI.


This is the big problem with their response. All I want to know two things: what they know, and when they knew it. After that, I want to know that they've fixed their problem and that's it.

I'm not sure if this answered much.


And why do they redirect DNS misses to their own advertising page? I think "give a shit" refers to the money they are getting, and not much else.


"For the techies who are wondering, the encryption on the credit card information is 4096 bit RSA."

Why would they be using RSA to encrypt fields in an internal database, rather than a symmetric algorithm?

If they really did use RSA, I'd wager they did not pad it correctly and don't have any authentication.


It's a Write-Only Memory.

The web server can write the credit card info to the database, but isn't able to read (and decrypt) that same info in case it gets hacked.

Presumably there is another machine that only does billing and has a much smaller attack surface, which is the only online place with the key to decrypt the card info.


I've seen web frontends that encrypt submitted credit card info with a public key, then had billing backends that re-encrypted with a symmetric key (usually in a HSM).

That was strictly for performance overhead and key rotation flexibility. Perhaps name.com didn't care about that.


That way you can safely put your public key on all of your application servers so that any node can write data, but only allowed nodes can read.


Here is an excerpt from the email I received from them:

"Name.com recently discovered a security breach where customer account information including usernames, email addresses, and encrypted passwords and encrypted credit card account information may have been accessed by unauthorized individuals. It appears that the security breach was motivated by an attempt to gain information on a single, large commercial account at Name.com.

Name.com stores your credit card information using strong encryption and the private keys required to access that information are stored physically in a separate remote location that was not compromised. Therefore, we don't believe that your credit card information was accessed in a usable format. Additionally, your EPP codes (required for domain transfers) were unaffected as they are also stored separately. We have no evidence to suggest that your data has been used for fraudulent activities.

As a response to these developments, and as a precautionary measure, we are requiring that all customers reset their passwords before logging in. If you use your previous Name.com password in other online systems, we also strongly recommend that you change your password in each of those systems as well."

Based on their suggestion to change your passwords on other online services using the the same password one could assume that there is a good chance they could be decrypted. On the other hand they could just be overly cautious. In any case I agree it would be nice if they could divulge more information on the encryption strategies in use.


Passwords aren't (usually) encrypted, they're hashed. Hashing buys you time, nothing more; if an attacker has a copy of your hash you should treat your password as compromised.

Nothing to see here.


Hashed was indeed what I meant. I tend to use the words interchangeably, in error. What I meant to say is the strategies in use can vary quite a bit. Are they using a salt and/or a pepper? Are they using bcrypt or the like? Based on those answers one can usually guess if its feasible to break those in a reasonable amount of time.


Sorry, reading that again I sound like a dick. I know it's a common error and I didn't mean to nitpick.

I only mention it because there's an important difference in that with hashing, it doesn't really matter as much what the strategy is, since a bad password is a bad password. Better hashing only means a lower percentage of your intermediately-secure passwords are compromised right away. Since they (should) have no way of knowing which passwords are secure, they have to treat them all as compromised even if they were storing them "right".


> Name.com recently discovered

LOL

After the hackers clued them in!


Or after the hackers leaked the info and they couldn't cover it up anymore.

Why else would they release this on a Friday?



I'd like very much to know how they got hacked. All the talk of 4096 bit RSA and security is great, but how did the database get compromised?


They've clearly omitted the line “the private key was stored securely on a separate system which was not compromised” after the statement about card data and RSA. I'd go as far as to suggest that was deliberate.


Has anyone heard anything from Moniker, or the other registrars claimed to be hacked? I wasn't able to fetch the registrar data from the zine release, and haven't found another source, though it had sounded like HTP obtained root or privileged access on Moniker.

I haven't heard anything from Moniker. My trust for them has be waning for a while, and radio silence on this doesn't help -- though I haven't attempted to reach out to their support at all either.


Don't know about Moniker but Melbourne IT admitted to some breach (although play it down): http://www.theregister.co.uk/2013/05/09/melbourne_it_hacking...


This seems like a good time to remind everyone how easy it is to upgrade to scrypt.

Also, if you just wrap your current hashing scheme, you don't even have to bug your users to update their passwords. https://gist.github.com/cagerton/5485241


What does scrypt offer over bcrypt? The only difference I seem to recall is that scrypt is more memory-intensive (making it so that the CPU/GPU/whatever isn't the only bottleneck).


scrypt is designed to be difficult on hardware. Both bcrypt and scrypt are currently difficult on GPU hardware, but it's unlikely to remain that way. Both are better than PBKDF2. scrypt is likely to be better longer. But really: throw a dart at any of the three of them.


It sounds like one of the Bitcoin alternatives is scrypt based, and they are putatively getting a roughly 10x speedup from GPUs: https://en.bitcoin.it/wiki/Litecoin#Scrypt_Proof_of_Work . Is that a new development, or is it in the neighborhood of how GPU-resistant it was supposed to be?


The Litecoin guys just set the "make GPUs suck" (aka "memory use") parameter too low.


Thanks!


Someone asked this question on the post so I will answer it I run a registrar (but not name.com obv.).

"Hypothetically, what would happen if some bad guys managed to transfer domains? What recourse would there be: would it be dealt with by yourselves, or would the previous owners of the domains have to take legal action against whoever the domains were transfered to?"

There is a procedure in place between registrars to cover situations like this. Of course this assumes that the person who has the name stolen knows it has happened and that the proper people are notified fairly quickly. There are many cases where people might not know a domain was stolen (extra domain pointing to another site for example or an unused name) so there is definitely a risk here. But assuming this was discovered right away by the person whos name was taken it could be reversed and transferred back to the losing registrar. Of course all this can be time consuming and there is no guarantee that the registrar that the name was transferred to would act quickly etc. YMMV.


Also worth noting that there's a mandatory 60-day waiting period between transfers for a domain, so a stolen domain can't be taken very far.


That's only after its first registered, no?


No it's also when transferred between registrars.


3 days after HTP supposedly hacked linode (and name.com in the process), name.com suddenly "give a shit" and did "an effort to maintain the open, honest, and transparent reputation". I do wonder if this would be made public at all without HTP announcement made.


Name.com isn't opposed to doing a little hacking of their own, on the DNS responses.

I'm glad a despicable company got hacked, but I do feel empathy for their customers--both because of the hack and because they have a malicious registrar.


This reads like something written by a marketing/PR team. Not just OK'd by them, but actually authored.


HackerNews effect - got hacked + servers down with the traffic?


"the encryption on the credit card information is 4096 bit RSA."

This language, however, is awesome.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: