January 22, 2019 Last week was all about the 773 million records data breach, nicknamed “Collection #1”. It's a few years old compilation of previous data leaks but it's still interesting to check which Czech websites (and Slovak, too) are present in this and other databases (like “Collection #2” to “Collection #5”, “BigDB”).
The news about “Collection #1” was broken by Troy Hunt, when he's uploaded the data to Have I Been Pwned?, a breach notification service he runs. Almost 90 GB of data, 773 million unique emails and 2.7 billion records total. Quite massive. Seems the data in this collection is a few years old and many some leaks are already known and somehow plugged. Hopefully.
There are other combos, too: “Collection #2” to “Collection #5” – those have almost 850 GB of data total. Seems all of these collections, at least when it comes to Czech and Slovak sites, come from one massive database called “BigDB”, which totals at 595 GB and contains quite a few packed archives so the eventual size is a lot bigger.
These combos are often sorted into categories like “games”, “cryptocurrencies”, by countries etc. and attackers use them for credential stuffing. They try known combinations of usernames and passwords and stuff them into other services. And because users reuse their passwords, bad guys log in successfully in many cases.
Which Czech websites are listed in those databases? All of them are already present in the “BigDB” combo, some sites even multiple times with different number of records. But that doesn't mean the data really comes from those sites. Keep that on your mind until the leak is confirmed. If you manage some of the sites you should investigate, inform your users, and also the local Office for Personal Data Protection. It should be also noted that half of these sites were already added to Have I Been Pwned? a year ago but we didn't know ho much data was in there.
Interested in a list of Slovak sites? It's in the Part 2.
Each site below lists a password storage algorithm from the “BigDB” combo, and number of records. I've also added the number of cracked passwords in the combo in case the site used some password “obfuscation”. It's possible to crack more in a few more hours (and for a few dollars) but I didn't do it this time except in some minor cases. Check my write-up about password cracking if you want to know more about techniques used nowadays and how much does it cost.
A lot of these sites still use (or have used at the time of the breach) wrong and insecure passwords storage. If you're like these sites then please stop. Here's how to upgrade password hashing.
Czech sites in password combos
- abkontakt.cz: 191199 records, MD5, 0 passwords (11564× “katerina”, 1500× “dana”, 171013× “robot”)
- achpak.cz: 690 records, plaintext
- poradna.adiktologie.cz: 14540 records, first 11 characters of MD5, 0 passwords
- almipraha.cz: 2829 records, plaintext
- aloki.cz: 14613 records, MD5, 13634 passwords
- alveus-drezy.cz: 1184 records, MD5, 0 passwords
- asiantitulky.cz: 4063 records, MD5(?), 3038 passwords
- var2.astro.cz: 584 records, plaintext
- eshop.atos.cz: 1501 records, MD5, 474 passwords
- auctions-art.cz: 5091 records, SHA-1, 5444 passwords
- banner-lov.cz: 10751 records, MD5, 6520 passwords
- banner-security.cz: 10746 records, MD5, 6511 passwords
- beers.cz: 1284 records, plaintext
- big-wall.cz: 3401 records, MD5, 0 passwords
- biomonitoring.cz: 5486 records, MD5, 0 passwords
- bonekan.cz: 1372 records, MD5, 363 passwords
- canicross.cz: 887 records, plaintext
- casino-technology.cz: 6758 records, plaintext+bcrypt, 1603 passwords
- chotec.cz: 620 records, MD5, 0 passwords
- comx.cz: 885 records, MD5, 0 passwords (but all accounts have the same password “1X1A”)
- coollight.cz: 2127 records, plaintext
- crew.cz: 3037 records, MD5, 2782 passwords
- projekty.czechnationalteam.cz: 4729 records, MD5+phpBB3(
$H$
)+Drupal7($S$
), 1924 passwords - czshopy.com: 2403 records, MD5, 2225 passwords
- danutiming.cz: 3767 records, MD5, 3270 passwords
- dbsvet.cz: 17565 records, MD5, 3140 passwords
- desky.cz: 5236 records, MD5, 5107 passwords
- 2010.divadelnisvet.cz: 9100 records, MD5, 0 passwords
- pocasi.divoch.cz: 3094 records, MD5, 3018 passwords
- dj-shop.cz: 2040 records, plaintext
- dracidoupe.cz: 12982 records, MD5, 5514 passwords (a different file for the same site has just 5584 accounts)
- forum.drbal.cz: 2017 records, MD5, 0 passwords
- drp.cz: 1112 records, MD5, 0 passwords
- ekopress.cz: 3693 records, plaintext (passwords look randomly generated, their length is 12 characters)
- elektroprinc.cz: 2704 records, MD5, 2587 passwords
- idnes.www.elweb.cz: 585 records, plaintext, 308 passwords (some accounts have no password, and there are other passwords for the same site in a leak called tatoomira.elweb.cz)
- eone.cz: 1650 records, plaintext, 1060 passwords (some accounts have no password)
- eski.cz: 3448 records, MD5, 0 passwords
- urel.feec.vutbr.cz: 999 records, MD5, 363 passwords (20× “h54rsjrF5J46788998”, 13× “I9k7hnv5sR”, 9× “1721k1721”)
- www2.fm.vse.cz: 1745 records, plaintext
- foosball.cz: 1108 records, plaintext
- kss.fp.tul.cz: 941 records, plaintext
- funexplosive.cz: 2646 records, Salted MD5, 0 passwords (many email addresses look generated, e.g. somadrughblhguliwadmin@dendride.ru)
- gastrotrend.cz: 938 records, MD5, 925 passwords
- genomac.cz: 4401 records, MD5, 1648 passwords (partly in genomacinst.cz leak)
- hazena.pb.cz: 5263 records, plaintext (3292 accounts use generated emails, e.g. awuodefs@nmjanodd.com)
- helmetshop.cz: 1190 records, plaintext
- helmy.cz: 1758 records, plaintext
- hvezdarna.cz: 6063 records, MD5, 5431 passwords
- ian.cz: 10073 records, plaintext
- instrumento.cz: 3448 records, plaintext
- isumava.cz: 1559 records, MD5, 1490 passwords
- hry.izde.cz: 583 records, plaintext
- jaj.cz: 1117 records, MD5, 880 passwords
- jince.cz: 1635 records, MD5, 0 passwords
- jseddica.cz: 2995 records, MD5, 2947 passwords
- kaktusy-rysavy.cz: 1602 records, MD5, 0 passwords
- kkkonstruktiva.cz: 1782 records, MD5, 777 passwords
- kuma.cz: 81663 records, plaintext (I tried to report the breach last year to them, but this is a really sad story, I'll blog about it one day)
- legendapraha.cz: 502 records, MD5, 0 passwords
- lezec.cz: 9678 records, plaintext
- libchavy.cz: 6560 records, plaintext (passwords look generated, length 7 characters, some look like a “keyboard walk”, e.g. “fssjsjsf”)
- eshop.ltec.cz: 3592 records, MD5, 0 passwords
- majkluvsvet.cz: 4877 records, MD5, 0 passwords
- mesto-klimkovice.cz: 1920 records, SHA-1, 1712 passwords (just 21 accounts with .cz TLD, others look weird, some password hashes include SQL snippets like
UNION SELECT
) - nesedtedoma.cz: 585 records, plaintext
- nockostelu.cz: 2668 records, bcrypt, 0 passwords
- online-hry.cz: 1907 records, plaintext+MD5, 1390 passwords
- ostyle.cz: 4157 records, Salted MD5, 3845 passwords
- ovocenaraut.cz: 1451 records, MD5, 1125 passwords
- papcel.cz: 11583 records, MD5, 11208 passwords
- pressonline.cz: 5100 records, plaintext+MD5, 5071 passwords
- rallyfan.cz: 75317 records, SHA-1, 0 passwords (74960 users have SHA-1 hash of an empty string)
- regionvalassko.cz: 496 records, plaintext
- roxette.cz: 4215 records, SHA-256, 0 passwords
- expedice.rps.cz: 21655 records, plaintext+MD5, 20596 passwords (plaintext passwords look randomly generated with length 5–6 characters, unlike MD5-hashed passwords)
- saspi.cz: 5579 records, MD5, 4828 passwords
- satelit.cz: 2380 records, DES
crypt()
+md5crypt, 0 passwords (161 records use md5crypt $1$
) - sawan.cz: 7537 records, plaintext
- scandinaviashop.cz: 2249 records, MD5, 1327 passwords
- scena.cz: 2142 records, plaintext
- sexonline.cz: 2832 records, plaintext
- sexyweb.cz: 8871 records, plaintext
- signaturymaliru.cz: 53377 records, MD5, 50852 passwords
- skmseno.cz: 5117 records, plaintext+MD5, 4793 passwords
- softball.cz: 640 records, plaintext
- soural.cz: 93499 records, MD5, 69840 passwords
- spoltex-kravare.cz: 2036 records, MD5+SHA-1, 447 passwords
- stoebich.cz: 1702 records, MD5, 0 passwords
- www1.streetpunk.cz: 1370 records, SHA-1, 1351 passwords
- mks.stribro.cz: 3422 records, MD5, 3379 passwords (also present in infocentrum.stribro.cz and stribro.cz but those have less accounts)
- studiumchemie.cz: 1495 records, MD5, 0 passwords
- foto.sviga.cz: 4236 records, plaintext+MD5, 4190 passwords
- thalie.pilsfree.cz: 3796 records, MySQL5 hash, 2794 passwords
- valtickepodzemi.cz: 1748 records, MD5, 1618 passwords
- w.veteranforum.cz: 9520 records, plaintext
- vysivaniberuska.cz: 537 records, plaintext
- wifi.vscom.cz: 1085 records, plaintext
- windseznam.pb.cz: 2244 records, MD5, 2214 passwords
- wohnout.nen.cz: 4429 records, MD5, 0 passwords
In total, there's almost 450k password in clear. In some cases, it seems that the number of leaked data exceeds the amount of what that particular site might be storing. That's probably due to shared database credentials which allowed to dump databases from multiple sites exploiting just one vulnerability.
The “BigDB” combo also contains a few files named cz.txt
etc. which look like a compilation of even older breaches and they match, at least partly, with a database first spotted in 2017. These files contain 3,295,430 clear passwords.
Analyze all the passwords
Take all those passwords, run Pipal the password analyzer on them, and this is what you'll get:
- Total entries: 3,740,880
- Total unique entries: 2,281,413
- Top passwords:
- 123456 = 19,323 (0.52%)
- password = 13,155 (0.35%)
- 123456789 = 6,436 (0.17%)
- qwerty = 5,521 (0.15%)
- 12345 = 5,197 (0.14%)
- Top base words:
- password = 15,619 (0.42%)
- qwerty = 9,953 (0.27%)
- martin = 4,747 (0.13%)
- heslo = 4,422 (0.12%)
- a838hfid = 4,124 (0.11%)
- Password length (count ordered):
- 8 = 984,760 (26.32%)
- 6 = 734,481 (19.63%)
- 7 = 556,580 (14.88%)
- 9 = 410,853 (10.98%)
- 10 = 324,030 (8.66%)
- Passwords with only lowercase alpha: 1,355,091 (36.22%)
- Only uppercase alpha: 40,970 (1.1%)
- Only alpha: 1,396,061 (37.32%)
- Only numeric: 447,514 (11.96%)
Total number of unique emails
In “BigDB”, there's total of 3,023,494 unique email addresses and clear passwords, which are sourced from Czech sites listed above. There's 2,923,512 unique emails with .cz TLD.
Merge that with the 1.4 billion combo and the result is that the attackers have 6.2 million unique email addresses with .cz TLD including passwords. And that's without breaches like the Mall.cz one and some more which, for some reason, are not present in these massive combos. Not bad for this rather small country with population of 10.5 million.
Good luck if you're reusing your passwords.
Recommended reading