New Security Measures For GitHub After Hack Attempt

Source hosting service GitHub recently made users aware of a concerted attempt to compromise user accounts via brute-forcing of passwords. While GitHub managed to handle the attack without the world exploding, it has since implemented new measures to prevent future incidents.

Image: Brian Rowe / Flickr, licensed under Creative Commons 2.0

GitHub already has two-factor authentication, rate-limiting (which forces a user to wait a short period of time before entering their password after a failed attempt) and a security log feature to help users keep their accounts safe. Unfortunately, without two-factor authentication enabled, it’s possible to brute force a password, given enough time.

In this case, 40,000 unique IP addresses were used to conduct the attack, bypassing any rate-limiting protection and making it very difficult to simply block the source. As a result, those accounts with “weak passwords” quickly fell victim to the assault.

GitHub has since reset passwords, authorisation tokens and SSH keys of the affected accounts. Perhaps the biggest change is preventing users from using “commonly-used weak passwords” to log into their account.

GitHub also plans to work on “additional rate-limiting measures”, though it doesn’t go into specifics.

Weak passwords brute forced [GitHub via ZDNet]


The Cheapest NBN 50 Plans

Here are the cheapest plans available for Australia’s most popular NBN speed tier.

At Lifehacker, we independently select and write about stuff we love and think you'll like too. We have affiliate and advertising partnerships, which means we may collect a share of sales or other compensation from the links on this page. BTW – prices are accurate and items in stock at the time of posting.

Comments