2023-05-06, 15:03
Hi, after the data breach I have a few questions. I ask these questions not for criticism, but for future improvements. I appreciate the actions of all volunteers in the follow up of this incident.
- Were users directly (by email) notified about the breach? I don't believe I personally received such a mail. In case this was not done, why not?
- EU/UK regulations mandate such communications when the "data breach poses a high risk to those individuals affected". In your public statement you admit that you "must assume all passwords are compromised ". So from that aspect this is certainly a high risk situation.
- Even though there is still room for interpretation here (for example; can a Kodi account ever be considered high risk?), I think you should err on the side of caution and responsibility and notify each user individually via mail.
- EU/UK regulations mandate such communications when the "data breach poses a high risk to those individuals affected". In your public statement you admit that you "must assume all passwords are compromised ". So from that aspect this is certainly a high risk situation.
- I was notified through Have I Been Pwned, but this should not be the primary communication method, because this applies only for users who explicitly register there.
- When resetting my password I receive a new password via insecure plain-text email. This is generally considered bad security design:
- Passwords should never be sent via unencrypted mail/communications. This increases the chance for interception, passwords ending up in logging and various issues like that.
- A better design would be to provide a password reset link to an HTTPS URL where the user can input a new password.
- A website should never store an unhashed and/or unsalted password. I don't think this is the case right now, but this is often what happened in the past with websites that sent plain-text passwords via mail, so this is still a red flag and causes doubts about security in general.
- I am not forced to change the pre-generated password. This increases the risk that the password that was previously communicated insecurely, somehow leaks but is still valid.
- Passwords should never be sent via unencrypted mail/communications. This increases the chance for interception, passwords ending up in logging and various issues like that.
- Can you provide more info about the planned penetration testing? Has this been done already, or can you at least confirm this will be communicated when it's done?
- Penetration testing does not look at design flaws (like sending plain text passwords via mail). A general security audit might be good as well.