My feed
Premium

Please
or
to access all these features

MNHQ have commented on this thread

Site stuff

More about the Technical side of the attacks on Mumsnet

720 replies

JustineMumsnet · 19/08/2015 11:17

Hi all,
There are have been, understandably, a lot of questions about the tech side of the attack on Mumsnet, so here - courtesy of the tech team is some more detail. We obviously do have to be a bit careful with the details because we don't want to give away information that could help other hackers. Whilst it's true that "security through obscurity" isn't real security, we have no wish to make it easier for a future attacker.

We've spent a lot of time since the attacks began, proactively defending against them, minimising the impact of it and protecting against future attacks. With a busy site like Mumsnet there is a lot of information to go through. When we uncover a new snippet of information, perhaps a new suspicious user account, we have to go back to the start and reanalyze, so it can be slow going at times. We are working with our technology partners who have a lot of experience of these kind of attacks and we have used lots of resources available to us.

Some aspects of our technology stack have already been extensively tested by external specialists. Some of our software code is quite old - nearly as old as Mumsnet itself - and things have moved on a lot over that time. However, we have a program of code review whereby all new code is checked by someone other than the person who created it. It's not perfect and everyone makes mistakes, but we take the quality of our code very seriously.

The Denial Of Service (DOS) attack against Mumsnet was a heavy, sustained attack which initially overwhelmed our ability to respond to legitimate requests. Mumsnet might typically get something like 50-100 requests per second. During the attack we were getting around 17,000 requests per second. Each request carried more data than is normal as well.

The hacking attack on our website was separate from the DOS, though we believe perpetrated by the same person or people. We follow many of the industry's best practices, such as using HTTPS for our login pages, keeping our database separate from our cluster of web servers and not accessible from the internet, and so on. We don't necessarily use the same standards of security as say your online banking service might use, for example requiring multiple passwords or using two factor authentication. We try to balance security against usability and the sensitivity of the information we hold. After all, as pointed out by one of you in an earlier thread, the majority of information we have about a user is what that user publishes in Talk, which is there for all to see.

As has been mentioned several times, we keep our passwords encrypted and we use the recommended algorithms for this, with high "strength" settings. This means that if someone somehow obtained the password data from our database they wouldn't be able to make any use of them - they wouldn't work on our site or on any other site even if the user used the same password on that other site. This remains the case even for MNHQ staff; they cannot un-encrypt the passwords either.

We are now pretty confident it was a phishing attack. Phishing, where a hacker gets a user to enter their username and password into a form from which they can capture that information, fits all the data we have. The hacker doesn't need to decrypt anything, because they capture the password in the browser as it is entered (either by typing it, or if it was automatically remembered by the user's browser or password manager). The list of passwords that has been published includes some that users have identified as being ones that they've mistyped. Our database wouldn't have mistyped ones, only accurate ones, whereas those collected by recording what a user submits would and does contain errors.

It's not obvious how it has been conducted though. We have been able to create a proof of concept which shows that it could work, but that relies on some steps that would be difficult or virtually impossible for a hacker. Phishing attacks sometimes use social engineering to "trick" people into using the fake website rather than the real one, but again, for various reasons, we can rule some of these out. Other phishing attacks are more technical and use other means to get people to visit the fake page. One such example is Cross Site Scripting (XSS). XSS is ranked number three on Open Web Application Security Project top ten list of web site security problems. If the hacker can get the website to put his own code on pages which are to be viewed by other users, s/he can modify the page to either redirect the login process to their own site, to a page which looks just like our login page but is actually recording the details and sending them to the hacker. Also possible, but even less likely, is modifying our login page to submit the details to the hacker as well as to us. If the hacker had gained access to our Content Management System he could have done the former, though not the later. However, we record all changes that are made and there are no suspicious ones.

It's impossible for us to know how many users' passwords have been collected. It's a reasonable assumption, and our working one, that the passwords of everybody that has logged since 6th August 2015, and possibly some time before that, have been collected.

In light of the attacks, we've bolstered some aspects of our security, particularly around our administrative functions. We have further changes planned and will be working on these in the coming days.

Forcing everyone to reset their password, as we have done, would render the list useless provided that users don't choose the same new password and they've not used the same username and password elsewhere.

Some users have questioned why certain other changes aren't being made already, such as a move to enforcing stricter passwords, which makes sense. However, given how crucial the part of our system that deals with passwords is, we have to be really cautious when making changes to it so we don't want to rush and end up creating bigger holes but we will certainly take steps to encourage users to strengthen passwords as soon as practicable.

Any questions do post here - we'll answer as transparently as we can - bearing in mind the caveat about helping future hackers mentioned earlier.

OP posts:
Report
DavidTech · 19/08/2015 13:03

@Altinkum

*davidtech*

when posters are being forced to password change, can you put an alert message on stating it has to be a new password? not the old one!

many posters as have many said, still do not the the site is under attack.


Yes, we are doing that. It's not ready yet but it will be in our next update.

@UnbelievableBollocks

There has always been a requirement for at least 8 characters, which is actually the OWASP's recommendation.

They may have been recommendations, but it's established good practice that admin passwords should be more complex, regardless of whether you have enforced complexity rules. It's a bit like having the best safe money can buy, with a lock combo of 00000000 because the recommendation is a code of 8 numbers. It's valid, but bonkers.

Hey ho!


Absolutely. Some of those passwords were woefully inadequate. Again, without giving away too much, for what it's worth, MNHQ did recently do a whole-company session on data security.
Report
WorraLiberty · 19/08/2015 13:03

Thanks Justine Thanks

Report
JustineMumsnet · 19/08/2015 13:03

@Thisisbonkers

I only found out about this via a (completely unrelated!) Facebook group. I only use one or two of the talk sections and there are probably many more like me. I think you need to pin something everywhere that people can see.

I was forced logged out yesterday, was somewhat confused when my 'remembered' password wouldn't work. So hit the reset link and set it back to what i thought it was. I now need to change that again (!) but there was no mention of any hacking.

I'm on 'a' list. It's a bit unsettling to be honest.


It has been pinned on active conversations, top of chat and aibu threads (most trafficked parts of site) plus home page and site stuff. Plus we've emailed reg users. But will check all still in place as original thread maxed out.
OP posts:
Report
MaudGonneMad · 19/08/2015 13:03

Sorry DavidTech, I don't understand.

Have I logged in securely or not? Why the notice to log in via https if we are redirected to http?

Report
MardyBra · 19/08/2015 13:03

Meet - there are a lot of lurkers who rarely post though.

Report
LauraGrooves · 19/08/2015 13:05

There should be a live blog style post. Would save having all these confusing threads and save email being clogged up with the same questions.

It still seams unclear if this was piahing or not.

Report
ChilliAndMint · 19/08/2015 13:05

Yes, I agree Maud, changed my password after being hacked.

Report
BertieBotts · 19/08/2015 13:06

To be fair, although a lot of people are/were ridiculing the HQ passwords, the one about a cup of tea and a biscuit actually fulfils this idea of what is a strong password.

Report
JustineMumsnet · 19/08/2015 13:06

@LauraGrooves

There was no requirement for passwords to be 8 characters until recently.

I used to have a 6 character all letters for ages.

Does seam like a mixture of very outdated custom technology, and a real lack of any planning of what to do after a data leak and very bad communication. Failing on many sides but does sound at least like the passwords were decently incripted so these probably haven't been stolen.

Pretty shocking failings considering the popularity.


With hindsight we do wish we'd enforced stronger password protocol for sure but then hindsight is a wonderful thing. Not sure we could have done more with communication given what we knew when.
OP posts:
Report
MeetMeInTheMorning · 19/08/2015 13:07

YOU WANTED ACCOUNTS NOT USED FOR SOME TIME.

Try these who have not posted for ages or at all...

Nini4
ccindisguise
Mariedj
sgwatkins5286
sakura_06

Report
DragonWithAGirlTattoo · 19/08/2015 13:07

Can you sort a board or thread for all the worriers to go it pls so I can ignore it

I'm an active thread lurker and it's full of different threads asking similar questions

Report
DavidTech · 19/08/2015 13:07

@MaudGonneMad

Sorry DavidTech, I don't understand.

Have I logged in securely or not? Why the notice to log in via https if we are redirected to http?


You are redirected to HTTP after you've logged in, or if you put HTTPS in a URL which isn't a login one.
Report
shadowfax07 · 19/08/2015 13:07

Cake and Brew for the Tech people dealing with this. As a fellow IT support person who's pulled all-nighters to keep systems running, you have my sympathies and gratitude.

People who are complaining about being asked to provide information to Tech, it may help to narrow down the search and therefore security gets tightened quicker. If Tech didn't think it would help, they wouldn't be asking for it. They have enough on their plate at the moment, don't you think?

BTW, Tech, I still haven't received the email about the password reset, you may want to look into that once everything's calmed down.

Report
BertieBotts · 19/08/2015 13:08

Maud you only need HTTPS on the log in page. The other pages don't need to be secure hence no S and just HTTP.

Report
MeetMeInTheMorning · 19/08/2015 13:08

Just to add, the names I posted are on the list

Report
ItsAllGoingToBeFine · 19/08/2015 13:09

There should be a live blog style post. Would save having all these confusing threads and save email being clogged up with the same questions.

Agree. If you haven't been following to this since the beginning, and aren't following the several threads you miss information and people are asking stuff over and over again.

Can MNHQ sticky one thread to the top of all pages, lock the thread so it can't be posted in, and C&P all MNHQ posts on the issues into one post, and keep editing and updating the one post, newest information at the top.

Report
Skullyton · 19/08/2015 13:09

Can i bring this to peoples attention again!

""To be honest this sounds very unlikely, given the number of people complaining about constantly being logged out."

But were they actually being logged out?

I can name at least one occasion in the last week or two where in the middle of a thread i refreshed and suddenly got 'logged out' i clicked the log in page, and then changed my mind and just refreshed MN altogether, and lo and behold, was still logged in."

This has to have been a phishing redirect, right?

Report
TrionicLettuce · 19/08/2015 13:09

MeetMeInTheMorning Just because they've not posted either for a long time or ever doesn't mean they're not logging in.

I had an account (so I could watch threads etc.) and was active on it pretty much every day for ages before I ever posted.

Report
BertieBotts · 19/08/2015 13:11

ItsAll Good idea.

Report
MaudGonneMad · 19/08/2015 13:13

I still don't really understand Blush but hope it's ok.

Report
PlayingSolitaire · 19/08/2015 13:13

On the log in page now, in the address bar, I have a green padlock with a yellow triangle. But the address is given as etc.

Does the yellow triangle on the green padlock mean the site isn't safe? When I click on it, it tells me the page includes other resources which are not secure, they can be "modified by an attacker" apparently. Which doesn't sound safe to me.

Is this still a phishing page?

When I logged in earlier, I only had the green padlock and everything was secure when I clicked on it.

Report
MeetMeInTheMorning · 19/08/2015 13:14

"MeetMeInTheMorning Just because they've not posted either for a long time or ever doesn't mean they're not logging in."



You don't say...

I am aware of this and did say so in my post below.

"I am checking some and the furthest back one I have found so far (For posting) is Potatoqueen who posted in June but not in August. of course she may have logged in after that but not posted."


this does, however, highlight the fact that Tech asking us to provide details of accounts that have not been used in some time is a bit silly - how are any of us supposed to know that? Surely it should be something that Tech can do?

requesting this info by saying "That's why I've suggested that if you do have something that you think might be useful, like finding account details for an account that hasn't been used for a long time, it would be really kind of you to let us know. Thanks." is just an impossible request.

However, maybe Tech can now check those accounts I have provided from the list and see when they last logged in and maybe deduce some info from them about when the Phishing took place.

Report

Don’t want to miss threads like this?

Weekly

Sign up to our weekly round up and get all the best threads sent straight to your inbox!

Log in to update your newsletter preferences.

You've subscribed!

PlayingSolitaire · 19/08/2015 13:17

Also, not sure if it's connected, the face pictures aren't appearing in my posts at the moment and didn't at random times yesterday either. So instead of a face, I get the word "blush" in a box. Is this connected?

I would also like to know if the site changes- the irritating change to default emails from the watched list and the coloured posts for OP being removed - has affected, caused or is/was otherwise connected to this hack.

Report
JustineMumsnet · 19/08/2015 13:18

@ItsAllGoingToBeFine

There should be a live blog style post. Would save having all these confusing threads and save email being clogged up with the same questions.

Agree. If you haven't been following to this since the beginning, and aren't following the several threads you miss information and people are asking stuff over and over again.

Can MNHQ sticky one thread to the top of all pages, lock the thread so it can't be posted in, and C&P all MNHQ posts on the issues into one post, and keep editing and updating the one post, newest information at the top.


Yes we'll get on this.
OP posts:
Report
Altinkum · 19/08/2015 13:20

This reply has been deleted

Message withdrawn at poster's request.

Please create an account

To comment on this thread you need to create a Mumsnet account.