November 14, 2013 12:49 pm
Adobe Security Breach
BACKGROUND: In October 2013, Adobe suffered a data breach. Their database of 38 million usernames and passwords was stolen and subsequently posted online . If you would like to see if your email address was in this published data, LastPass has posted an online search tool. Adobe did not protect user passwords to industry standards, and attackers were able to exploit that. Also stored with the passwords were the users' password hints in clear text. Many of the hints are weak and easily exploited by third parties. Security experts agree that it will be trivial for miscreants to discover the passwords.
Of the estimated 38 million Adobe customers affected, analysis indicates that there were over 2 million education-related accounts. We don't know how many of the email addresses are attached to active institutional accounts.
Adobe reached out to individual affected users via email. The notification thoughtfully included "[we] recommend that you also change your password on any website where you use the same user ID or password". However, there are reports of non-delivery (it might have been filtered as spam) and users disregarding the e-mail (it might have been thought to be a phishing message).
IMPACT: If the same password used for Adobe System accounts was used for work, school, banking, or other accounts, those accounts may be at risk. Repercussions could range from simple to severe, such as account hijacks to send spam, theft of bank deposits, or hackers gaining a foothold in a place of employment to conduct widespread damaging attacks.
RECOMMENDATIONS: We recommend that you take the following actions:
1. CHANGE PASSWORDS IMMEDIATELY. Persons who used the same password for Adobe and other accounts should immediately change their passwords at the other locations and monitor for unusual activity. If you have used the same password for both your Adobe and CCA accounts please change your password immediately going to the ETS website and selecting ‘Password Change’ from the Quicklinks tab.
2. ADOBE PASSWORDS SHOULD BE RESET only by manually visiting the Adobe website and going to the “Customer Security Alert” area, and not by clicking on links arriving via email, as there is now a concern that there will be a rise in phishing related to this event.
3. NEVER REUSE YOUR INSTITUTIONAL PASSWORD for external web sites or Internet services. If you reuse a password at multiple locations when the password is compromised at one site the miscreants then can gain access to all sites where you've used that password. The best policy is to always use different passwords for different accounts.
5. BE ON THE LOOKOUT FOR PHISHING. Miscreants will be using the Adobe breach as a pretext for phishing.
6. USE INFORMATION THAT IS NOT EASILY GUESSED. When providing password hints use information that is not easily guessed or discovered. For example, if your hint is "dog's name" and you mention your dog on social networking sites miscreants can discover that information.