top | item 11664732

UserVoice Security Incident Notification

8 points| RossP | 9 years ago |community.uservoice.com | reply

13 comments

order
[+] tempestn|9 years ago|reply
Another thread on the incident report here: https://news.ycombinator.com/item?id=11664713 https://status.uservoice.com/incidents/fb7ml8b3nphf

There's a bit more info in this one about exactly what was compromised though. While I can understand the abundance of caution in resetting passwords despite only hashes and salts being lost, it is odd that they would "[presume] the attackers may be able to decrypt the passwords," assuming they're using strong encryption.

[+] RossP|9 years ago|reply
"In late April, the UserVoice security team learned that an unauthorized party illegally accessed one of UserVoice’s backend reporting systems and was able to view user data on a small subset of users. The user data includes name, email, and a hashed password and salt. Unfortunately, the passwords were hashed with the SHA1 hashing algorithm, which by today’s standards is considered weak. As such, we’re resetting the passwords for all users in our database."

Further information: https://status.uservoice.com/incidents/fb7ml8b3nphf

[+] nacs|9 years ago|reply
Just got an email from Uservoice about this.

Apparently I'm part of the "0.001%" that was affected in the breach.

[+] tempestn|9 years ago|reply
It seems likely that they're estimating that percentage, but don't know specifically which accounts were compromised.
[+] nsgf|9 years ago|reply
Me too. Maybe 0.001% is not accurate.