| Index | Recent Threads | Unanswered Threads | Who's Active | Guidelines | Search |
| World Community Grid Forums
|
| No member browsing this thread |
|
Thread Status: Active Total posts in this thread: 18
|
|
| Author |
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
From the thread A WCG IOU Idea and the quote "no one has 'hacked' me, until Ripple came along" from Barnsley_Tatts
Anyone else get hacked, and why is no one is talking about a possible hacking problem at WCG. |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Was a past-tense as wcg technicians and admin dealt with this. The case was resolved by wcg, a dictionary password attack, probably limited to those the hacker saw as having larger contribution and low attendance, at wcg forums. It brought to light that weak passwords are not advised, even in volunteer computing once there arose a monetary value.
|
||
|
|
jonnieb-uk
Ace Cruncher England Joined: Nov 30, 2011 Post Count: 6105 Status: Offline Project Badges:
|
The full response from jhindo WCG Chief Admin is here
---------------------------------------- |
||
|
|
twilyth
Master Cruncher US Joined: Mar 30, 2007 Post Count: 2130 Status: Offline Project Badges:
|
The problem is that there seems to be no system limit for the number of invalid passwords someone can enter. This is a gaping security hole that should be plugged by instituting "best industry practices" - to use the words of Jhindo.
----------------------------------------How is it 'best practices' when someone can mount a dictionary attack and the user is never notified of multiple invalid passwords? Rather we have to rely on the staff monitoring such attempts. Well forgive me if I don't have a lot faith in that approach. ![]() ![]() |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
You had your chance to discuss this in the linked thread when this was brought to light by the admin. Ibm wont tell you what detail measures were taken to prevent future reoccurances. If 36 hour repeats of such methodology would still be possible, bad on them.
|
||
|
|
Barnsley_Tatts
Senior Cruncher Joined: Nov 3, 2005 Post Count: 291 Status: Offline Project Badges:
|
Thought my ears were burning.
----------------------------------------The issue/problem is resolved. Curious though I can't find the original thread. Looks like it's been deleted. ![]() |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Search yourself, on author. You posted the "happened to me too'' in thread 36475, the same thread johnnie-uk links to. If you meant an different thread, there were multiple iirc.
|
||
|
|
twilyth
Master Cruncher US Joined: Mar 30, 2007 Post Count: 2130 Status: Offline Project Badges:
|
I don't really consider what jhindo said as constituting a resolution if there are no automated means for protecting accounts such as notifying users after xx number of password attempts. This is a pretty basic security measure so if they can't even manage to implement that, how can you have any faith in whatever other so-called security measures have been implemented?
----------------------------------------This is typical of WCG's response to all of our concerns. If it hadn't been for the survey over a year ago, we never would have seen any changes at all and everyone who frequents this forum knows that. Beyond that fact, we should keep in mind that any number of issues like upgrading the forum software where never even mentioned in the survey and as far as I can recall, we were never asked for input in terms of what the survey should cover. This is also typical of WCG. Rather than trying to engage with the community, being capable of taking and responding to constructive criticism, they would rather make decisions in secret, impose them on us and then expect us to thank them for their lack of consideration. ![]() ![]() |
||
|
|
Barnsley_Tatts
Senior Cruncher Joined: Nov 3, 2005 Post Count: 291 Status: Offline Project Badges:
|
Found it eventually.
----------------------------------------![]() |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Only ONE computer trying to hack and using a dictionary password attack. If a person gets hacked from a DPA they should get hacked for having such a dumb password.
As a Admin I see this hacking and password problem everyday and not just from ONE computer. So please don't say "until Ripple came along" I know I am new to WCG, but everything I was seeing from RippleLabs was good for WCG and research. I see this as a major loss of computing power for research. They were on the move to be #1 on all Team Statistics, and they just started 11/08/2013. They need to be back in a new way. Ok I am done, sorry for the rant. |
||
|
|
|