• About
  • Advertise
  • Careers
  • Contact
Monday, March 20, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Cyber Attacks

Slack Resets Passwords For Users Who Hadn’t Changed It Since 2015 Breach

by Cyber360 News
November 11, 2019
in Cyber Attacks
0
Slack Resets Passwords For Users Who Hadn’t Changed It Since 2015 Breach
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter
hacking slack

If you use Slack, a popular cloud-based team collaboration server, and recently received an email from the company about a security incident, don’t panic and read this article before taking any action.

Slack has been sending a “password reset” notification email to all those users who had not yet changed passwords for their Slack accounts since 2015 when the company suffered a massive data breach.

For those unaware, in 2015, hackers unauthorisedly gained access to one of the company’s databases that stored user profile information, including their usernames, email addresses, and hashed passwords.

At that time, attackers also secretly inserted code, probably on the login page, which allowed them to capture plaintext passwords entered by some Slack users during that time.

However, immediately following the security incident, the company automatically reset passwords for those small number of Slack users whose plaintext passwords were exposed, but asked other affected users to change their passwords manually.

Keep calm and change your password ?

Slack is resetting the passwords for all those users (approximately 1% of total) who hadn’t changed their passwords since 2015 when the company experienced a #databreach leaking users’ credentialshttps://t.co/k6jSBgloAX

Check this thread: https://t.co/Fo7QbI9pOv

— The Hacker News (@TheHackersNews) July 18, 2019

Now in its latest statement released today, the company said they learned about a new list of username and password combinations that match with the login credentials of its users who did not change their password after the 2015 data breach.

“We were recently contacted through our bug bounty program with information about potentially compromised Slack credentials,” Slack states.

“We immediately confirmed that a portion of the email addresses and password combinations were valid, reset those passwords, and explained our actions to the affected users.”

The latest security incident only affects users, who:

  • created an account before March 2015,
  • have not changed their password since the incident, and
  • accounts that do not require logging in via a single-sign-on (SSO) provider.

slack data breach

The company is not exactly aware of the source of this new leaked plaintext credentials, but suggests it could be the “result of malware attack or password reuse between services.”

Web Application Firewall

It is also possible that someone might have successfully cracked hashed passwords that were leaked in the 2015 data breach, even when it was protected using the bcrypt algorithm with a randomly generated salt per-password.

Late last month, Slack also sent a separate notification to all the affected users informing them about the potential compromise of their credentials without providing any details of the incident, but it seems many users ignored the warning and did not change their passwords voluntarily.

slack data breach 2015

Therefore, now Slack has automatically reset passwords on affected accounts, that are about 1% of the total registered users, that haven’t been updated since 2015 as a precautionary measure, asking them to set a new password using this guide.

“We have no reason to believe that any of these accounts were compromised, but we believe that this precaution is worth any inconvenience the reset may cause,” the company said.

Besides your changing password, you are also recommended to enable two-factor authentication for your Slack accounts, even if you are not affected.

Slack is still investigating the latest security incident and promises to share more information as soon as they are available.

Cyber360 News

Cyber360 News

Next Post
EvilGnome: A New Backdoor Implant Spies On Linux Desktop Users

EvilGnome: A New Backdoor Implant Spies On Linux Desktop Users

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In