Encrypted passwords, but not credit card data, likely accessed
LivingSocial, the Washington, D.C.-based daily deals website, sent out an email this morning warning users that the site has â€œrecently experienced a cyber-attackâ€ that potentially exposed some sensitive user data.
The email, which confirms that the database containing customer passwords may have been compromised, stresses that â€œ[t]he database that stores customer credit card information was not affected or accessed.â€ The message also stresses that passwords were stored in â€œencrypted … technically â€˜hashedâ€™ and â€˜saltedâ€™â€ form, and thus â€œwould be difficult to decode.â€
The email confirms reports yesterday by tech siteÂ AllThingsD, which said that it accessed an internal email by LivingSocial CEO Tim O’Shaughnessy to employees of the company stating that a hack had led to â€œunauthorized access to some customer data from our servers.â€
According to AllThingsD, as well as a report fromÂ CNN, over 50 million LivingSocial members may have been affected by the hack.
Email: credit card database not accessed
The email sent by LivingSocial reads in part:
â€œLivingSocial recently experienced a cyber-attack on our computer systems that resulted in unauthorized access to some customer data from our servers. We are actively working with law enforcement to investigate this issue.
The information accessed includes names, email addresses, date of birth for some users, and encryptedÂ passwords — technically â€˜hashedâ€™ and â€˜saltedâ€™ passwords. We never store passwords in plain text.
The database that stores customer credit card information was not affected or accessed.
Although your LivingSocial password would be difficult to decode, we want to take every precaution to ensure that your account is secure, so we are expiring your old password and requesting that you create a new one.â€
The email, signed by O’Shaughnessy, also encourages users â€œto consider changing password(s) on any other sites on which you use the same or similar password(s).â€
Passwords hashed, salted
In a security noticed posted on the companyâ€™sÂ website, the company explained how it secures customer passwords in its database. The passwords, LivingSocial said, â€œwere hashed with SHA1 using a random 40 byte salt,â€ meaning that â€œour system took the passwords entered by customers and used an algorithm to change them into a unique data string (essentially creating a unique data fingerprint) â€“ thatâ€™s the â€˜hashâ€™. To add an additional layer of protection, the â€˜saltâ€™ elongates the password and adds complexity.â€
The page also said that LivingSocial is â€œworking with internal and external forensic security teams to investigate the nature of the incident and to further improve our security systems, and we are working with law enforcement to investigate this incident.â€
(originally published atÂ ConsumerAffairs.com)