![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Livejournal was hacked in 2014. Someone managed to download a list of all users, and has posted it on the web. (I'm not telling exactly where, for reasons that will become clear.) It contains over 30 million records with email addresses, usernames, and raw passwords.
You know what to do when your password is leaked: You change it to something new, something you haven't used anywhere else, something complicated. Maybe you store it in a password manager so you don't have to remember it. And check to see if you used it anywhere else, especially on Dreamwidth.
But this is worse: Your email address is now linked to the usernames of any accounts you created with that email. Here are some scenarios:
- You created two LJ accounts with public entries, one for everyday stuff and one for your sexploits. Someone who knows the "public" username can see what email it was registered with, search for that email, and find your sex blog.
- You have a well-known but pseudonymous journal. Someone who wants to identify you can now find your email address, from which they can likely find your identity.
- You have a journal that is again pseudonymous, but not necessarily well known, and was registered with your regular email address. Someone who knows your email and is curious can check to see if you had any LJ accounts.
- You used a different email to register your two journals, but the same password. Now someone can determine that those accounts were likely registered by the same person, as long as that password is uncommon enough.
And of course all of that remains true for Dreamwidth, even though DW wasn't breached, as long as you used the same username when you moved from LJ to DW.
(Livejournal has not yet acknowledged the breach, but multiple people, myself included, have identified their own LJ-specific passwords, usernames, and email addresses in this dump.)
So, this sucks. I guess people can go and lock down their old journals if needed, if they still have access. But in some cases the damage is not preventable. People entrusted their privacy and identities to Livejournal, and inevitably that trust was broken; once that information is out there, it's out there. I wish I had something to offer people that were better at preserving privacy, but I don't think the right thing exists yet. (I'm working on something, but it's still pretty early. It's a hard problem!)
Technical notes
It looks like Have I Been Pwned doesn't yet have the emails and passwords, but in the meantime if you're technically inclined I have a few extracts of the data that are safe to share. I'm making a list of SHA-1 hashes of unique email addresses available over IPFS under the address QmYaKzshXTD6g2aMwbhWyYcTTkgi5Qugnjx3mT4xw5r5sk
. It's about 1 gigabyte. Additionally, I've created a list of SHA-1 hashes of passwords under IPFS address QmX4BLvyrQLJapZXw44gQ8DyDKPZmNQpGKEfSrNkZCegim
, again about a gigabyte, and this time with occurrence counts. Here's an example usage showing that the password "qwerty" was used over 27 thousand times:
$ read -p "Enter text to hash: " pw; echo -n "$pw" | sha1sum Enter text to hash: qwerty b1b3773a05c0ed0176787a4f1574ff0075f7521e - $ grep b1b3773a05c0ed0176787a4f1574ff0075f7521e ~/Downloads/lj-password-sha1-uniq-count.txt 27625 b1b3773a05c0ed0176787a4f1574ff0075f7521e
If someone would like to host those as a torrent or create a website for querying the data, that would be cool, but I'm sure HIBP will have it very soon so maybe don't worry about it. :-)
Updates
2020-05-26 22:30: Passwords and emails have now been incorporated into Have I Been Pwned: https://haveibeenpwned.com/PwnedWebsites#LiveJournal. I suppose breach notifications will be rolling out soon.
23:58: Emails are rolling out, but passwords aren't loaded in yet.
2020-05-28 12:30: Firefox is now warning people who visit Livejournal about the breach. There is an update from DW. There is also a very skimpy and vague denial from Livejournal. And (see comments) I think I can narrow the dump date down to May 2012, so the LJ DB would have been compromised before that date.
no subject
Date: 2020-05-26 12:41 am (UTC)no subject
Date: 2020-05-26 12:48 am (UTC)no subject
Date: 2020-05-26 02:08 pm (UTC)no subject
Date: 2020-05-26 02:28 pm (UTC)no subject
Date: 2020-05-26 05:06 pm (UTC)Thanks for putting this out there specifically. I'd worked out the password problems were LJ from
no subject
Date: 2020-05-26 05:09 pm (UTC)I wonder if that explains why I suddenly started getting spam at the addresses for my LJ accounts?
Thank goodness I use Sneakemail; different email address for every site/account, so all I have to do is a couple of clicks to disable them, and generate new ones. (No help for putting the horse back in the barn, but I do highly recommend Sneakemail for folks who want to avoid this sort of problem in future.)
no subject
Date: 2020-05-26 05:16 pm (UTC)So yeah, there have been some spam waves recently (including account takeovers used for posting spam!) and scam emails where the scammer sends you your LJ password and claims to have "hacked your email", but those were probably from people who bought the DB later on.
no subject
Date: 2020-05-26 06:37 pm (UTC)ETA: Fortunately LJ never had my credit card; every time I'd about talked myself into getting a paid account, they did something else stupid. You could almost set your watch by it.
no subject
Date: 2020-05-26 05:28 pm (UTC)My preference is to have my own domain name and configure a catch-all for email, which allows me to make up addresses on the fly. But a lot of services, including GMail, also allow you to use plus-addressing to similar effect.
(Of course, even if I register with different emails, an attacker can still see that I registered with emails on the same *domain*, so if I really wanted to make sure my identities weren't linkable I'd use a different domain or even email provider to register the other account.)
no subject
Date: 2020-05-26 06:43 pm (UTC)no subject
Date: 2020-05-26 07:12 pm (UTC)no subject
Date: 2020-05-26 07:59 pm (UTC)It looks like he's still doing some research on whether to consider this a validated breach: https://twitter.com/troyhunt/status/1265191348581224449
no subject
Date: 2020-05-26 08:29 pm (UTC)no subject
Date: 2020-05-27 01:01 pm (UTC)no subject
Date: 2020-05-27 01:07 pm (UTC)no subject
Date: 2020-05-27 02:55 pm (UTC)https://twitter.com/troyhunt/status/1050391317266620416
The admin here were also told back then.
Given the gap between the date of the data (between 2017 and 2014, depending on how bad you think LJ were at not deleting data for old accounts), my guess is that it was used to target specific Russian accounts until it was sold to people do did mass spamming with it.
no subject
Date: 2020-05-28 04:25 am (UTC)For the record, email address of mine that was got in the breach I – coincidentally! – changed on Jan 25, 2014, so that is the last day on which someone could have stolen it from active use on LJ. See https://siderea.dreamwidth.org/1453052.html for discussion. So if we have some reason to believe it happened in 2014, I gather we can narrow it down to the first 25 days of 2014.
no subject
Date: 2020-05-28 12:36 pm (UTC)That Jan 25 date is interesting, because Denise has seen a claim for June/July 2014.
But I have just now realized a different way to check! The dump doesn't just contain emails, usernames, and passwords. It also appears to contain user IDs, which are sequential numbers, starting with 1 for bradfitz. They are also public information and can be seen on profile pages to verify.
cut -d' ' -f1 ~/tmp/lj-breach-2014.txt | sort -rn | head
gives me the largest IDs. The newest 3 are all purged accounts, but I checked the profile of the 4th newest and it says "Account Created on 31 May 2012".In 2018, I think we narrowed the window to roughly "2011 to 2014", but now I'd bet money on May 2012.
no subject
Date: 2020-05-28 08:31 pm (UTC)In any event, good sleuthing!
no subject
Date: 2022-02-05 04:04 am (UTC)We sliced and diced the information as much as we could and a few people with very good (or very bad) email retention habits just confused us more. My ultimate conclusion is that LJ was correct about one small detail in their giant ball of lies about the whole situation: it was a concatenation of several other files' data. Unfortunately for LJ, that only shows that their servers were, in fact, compromised much longer than they thought.
(Honestly, even two years later, my money is on datacenter employee running a side hustle. I heard a lot of FSB/Russian government theorizing at the time: the Russian government doesn't need to hack LiveJournal, they already own it.)
no subject
Date: 2022-02-05 04:21 am (UTC)Sadface on the side hustle theory.
no subject
Date: 2022-02-06 12:49 am (UTC)no subject
Date: 2022-02-07 05:11 am (UTC)I also keep laughing at the passwords in the first two lines (belonging to bradfitz and eli in my dump).
no subject
Date: 2022-02-08 12:13 pm (UTC)