Categories: Technology

ETH graduates are worried about a serious security breach – that’s what’s behind it

Personal data and hashed passwords were accessible to third parties via the website of the ETH Alumni Association. Reassure those responsible.
Author: Daniel Schurter

“Big mail” for tens of thousands of former students of the Swiss Federal Institute of Technology (ETH): Your personal information could fall into the wrong hands – and this was due to a serious security flaw in the ETH Alumni Association website.

Research shows that those responsible reacted quickly to fix the vulnerability discovered by a computer scientist, but those potentially affected were not informed for months.

What happened?

The background of the special story can be found on the website of ETH alumnus Andreas Kuster. There, the computer scientist provides information about a serious vulnerability in the ETH alumni website, which he accidentally discovered last November. His blog post is dated February 10, 2023.

It involves a now-defunct search feature called “Who’s Who” that allowed former students to find and connect with other alumni members online.

The problem: According to Kuster’s clarifications, access control for the search function was not working, allowing user data to be requested without authentication.

“Without any authorization over the internet, at least 35418 member profiles could be extracted, including full name, postal address, nationality, title, field of education, start of studies, gender, profile picture and hashed passwords.”

Criminals could use such personal data to carry out targeted phishing email attacks (“spearfishing”). In addition, the “hashed passwords” stored on the server can lead to later problems.

What are “hashed passwords”?
Password hashing is a common security technique implemented by online services to authenticate users without storing passwords on the server. This is also to ensure that attackers who gain access to a system only get their hands on unusable strings.

When someone registers online, the password entered is hashed, meaning that an algorithm converts it into a fixed-length string (a “string”) and stores it on the server. If the same user wants to log in again later and enters their password, the hash is recalculated and compared with the value stored on the server.

However, many users still use a (too) simple password, such as a first name or another common word. If attackers steal hashed passwords, they can try to crack them with a brute force or dictionary attack. This means that with powerful hardware, they generate millions of hashed passwords and compare them to the recorded hash values. If two match, they have identified a password.

In addition, criminals sell tables with already generated or stolen hash values. These “rainbow tables” allow a structured and therefore fast search for the password that matches the hash.

In his blog post, computer scientist Kuster recalls the problem of some users using the same password more than once. If hackers manage to crack a hashed password, they can also use it to compromise other online services.

In addition, those responsible at ETH do not know exactly whether and how much data was extracted before the “Who’s who” search function was taken offline.

what went wrong

At this point it is important to emphasize that the ETH computer scientist acted responsibly and correctly. He describes his approach in the aforementioned blog post.

Kuster documented the IT weaknesses and initially only informed those responsible within the Swiss Federal Institute of Technology.

He decided to send the “first report” to the ETH Alumni office as the primary recipient, as well as the technical contact (ETH IT Services) and their data protection contact (ETH Legal Services). Finally, he also reported the vulnerability to the National Center for Cybersecurity, NCSC for short.

Kuster notes that the ETH Alumni Headquarters responded very quickly and foresightedly. The affected search function was immediately deactivated and the IT departments corrected further deficiencies.

At the same time, we know that a third-party cybersecurity firm has been engaged and a report has been sent to the Federal Data Protection Commissioner (FDPIC).

In a “timeline”, the computer scientist lists what did not happen after the vulnerability was closed: Those responsible for the ETH Alumni Association have failed to promptly notify their members and ensure that their passwords are changed immediately. The problem was also not mentioned in the monthly newsletter.

Kuster would also like to see the university and the Alumni Association ETH unite a bug bounty program connects. So that there would be an incentive for honest hackers and security researchers to report discovered vulnerabilities.

The computer scientist points out that it would otherwise be much more financially worthwhile “to sell a huge data set, including addresses, degrees and password hashes, on the dark web or elsewhere”.

Kuster also addresses his blog post the relatively lax Swiss data protection regulations and the much stricter EU regulations (GDPR).

Finally, the computer scientist points out:

“Stricter data protection regulations, including mandatory notification and a process to ensure compliance, would significantly improve data protection and resilience against the ever-evolving threats on the Internet and would therefore be in the public interest.”

What do those responsible say?

Watson asked the ETH Alumni Association.

Anita Kendzia, responsible for communications, confirms that a security vulnerability has been identified and is said to have been “immediately patched”.

The spokeswoman for the ETH alumni emphasizes:

“We found no evidence of data leaks to unauthorized persons in the short time the vulnerability existed. There are potentially about 35,000 member data records in the database.”

All alumni were informed in a separate email last Tuesday (February 14).

“Because we could not find any signs of a data breach in a short time, we decided not to report it in November 2022.”

According to the spokeswoman for the ETH alumni, this statement refers to the evaluation of server log files. Tuesday also started resetting the passwords.

When asked, she indicates that an automatic password reset has not been performed for all alumni members. They were asked to “reset their password individually”.

Sources

  • andreaskuster.ch: A personally accountable disclosure experience of a data breach in the Swiss cyber landscape in 2022/23
  • alumni.ethz.ch: Website of the ETH Alumni Association
  • datenschutzexperte.de: Password hashing and salted password hashing
  • expert.de: Password hashing: high protection against password theft

Author: Daniel Schurter

Source: Watson

Share
Published by
Ella

Recent Posts

Terror suspect Chechen ‘hanged himself’ in Russian custody Egyptian President al-Sisi has been sworn in for a third term

On the same day of the terrorist attack on the Krokus City Hall in Moscow,…

1 year ago

Locals demand tourist tax for Tenerife: “Like a cancer consuming the island”

class="sc-cffd1e67-0 iQNQmc">1/4Residents of Tenerife have had enough of noisy and dirty tourists.It's too loud, the…

1 year ago

Agreement reached: this is how much Tuchel will receive for his departure from Bayern

class="sc-cffd1e67-0 iQNQmc">1/7Packing his things in Munich in the summer: Thomas Tuchel.After just over a year,…

1 year ago

Worst earthquake in 25 years in Taiwan +++ Number of deaths increased Is Russia running out of tanks? Now ‘Chinese coffins’ are used

At least seven people have been killed and 57 injured in severe earthquakes in the…

1 year ago

Now the moon should also have its own time (and its own clocks). These 11 photos and videos show just how intense the Taiwan earthquake was

The American space agency NASA would establish a uniform lunar time on behalf of the…

1 year ago

This is how the Swiss experienced the earthquake in Taiwan: “I saw a crack in the wall”

class="sc-cffd1e67-0 iQNQmc">1/8Bode Obwegeser was surprised by the earthquake while he was sleeping. “It was a…

1 year ago