Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The mystery list #8

Open
oleyka opened this issue Jul 4, 2020 · 8 comments
Open

The mystery list #8

oleyka opened this issue Jul 4, 2020 · 8 comments

Comments

@oleyka
Copy link

oleyka commented Jul 4, 2020

The list is, indeed, mysterious. Interestingly, even though you had a huge dataset to start with, it is missing several passwords that match the pattern, and appear in a ton of records in HIBP, which means the 763K password list is hardly exhaustive.

"tgPw53j3kG" shows up 4354 times in HIBP
"odz1w1rB9T" appears 3769 times
"ZZ8807zpl" appears 7508 times

Any chance you could match the passwords to emails they were used with, to see if there's a pattern? E.g., in the case of the passowrds above the first one shows up primarily next to gmail.com addresses in my (very limited) dataset, whereas the other two belong to hotmail users with very similar usernames (but not always! there are exceptions, too). It hints me that these could be either mass account takeovers where the attackers woudl reset all passowrds to a single password, or auto-generated email accounts used for botfarms.

@oleyka
Copy link
Author

oleyka commented Jul 5, 2020

Looking at the top passwords in Troy Hunt's database, published by @roycewilliams here: https://gist.github.com/roycewilliams/eef06c1148707ce8c8a1dea85768b207 , here's 20 most frequently occurring passwords there with similar characteristics:

  • 175470:f6b454db4925d7b96a2ea7b090618e2edb3653e7:VQsaBLPzLa
  • 162393:122981a669db09b979bc0d795fbeea06647bb8d8:3rJs1la7qE
  • 79465:bb111a0f69716b555377c52331f06d40dd779229:uQA9Ebw445
  • 77831:ba12d316d8af9666e0e7538ccb9f7834e37fa794:1v7Upjw3nT
  • 77772:7b4b4c89090d2f2854140f3b5e352d4b7b10f87e:YAgjecc826
  • 73692:1ed347bad64c4a0e3de68fa6253ea48cd75d3572:SZ9kQcCTwY
  • 67513:085c5830b6f0016a02507b65d945de70e525b0d0:P3Rat54797
  • 60388:baf4e41f37a625ee84963c1fc8c0effdc1f458bb:3d8Cubaj2E
  • 50529:e7b28838df93c6c11bcc4babe673301c999d0658:qti7Zxh18U
  • 47207:0062bbcc70c94b46276dafa49f33418b2d3f3c4b:g9l2d1fzPY
  • 46384:397ea05aa99ade2e46439292ef6b0537da3fe1ff:dIWtgm8492
  • 41475:6b54f874068b0df158b96ea1f6e6c8040e5547aa:vRbGQnS997
  • 38900:9179469229dbc0188e1446a233a52ef67a92adc4:Tnk0Mk16VX
  • 37641:633a233c8575f954f7e09f48bae91ef51d1ddc5f:x4ivygA51F
  • 31518:144f85475807286f08ce67f2fd2e217c95b238c0:6hBf28W791
  • 29851:630cd499a7464a9db136741795444388c2c4e71e:5hsU75kpoT
  • 23762:6cfb2c9667b0625dd1bbdb146dc3fb15856e5475:1Fr2rfq7xL
  • 23485:cb6576a91d86a8d9c7d692ca264e4d5c82807e45:UvGX8f8232
  • 23223:984ecf081fff7aa39684586257ba0960e4a6b5ea:y6p67FtrqJ
  • 23133:3f4875046104cbe8f11ace57b3bbfac77d6db7a4:d71lWz9zjS

7 are present in your mystery list, 13 aren't. Considering that they all appear on the list above such fashionable hits as "jellybean1" and "iloveyou11", I am even more convinced these are bulk password resets and/or botnet passwords.

@ignis-sec
Copy link
Owner

Hello!

"tgPw53j3kG" shows up 4354 times in HIBP
"odz1w1rB9T" appears 3769 times
"ZZ8807zpl" appears 7508 times

Those amounts are way, way higher than what i was anticipating :)
I'm currently running a quick scan checking:

  • emails and which leak those credentials containing those 3 passwords from.

    • This will let us see if there is a recognizable pattern to the email addresses, which would imply them being a spam farm and such.
    • We'll also see if this was from a single dump, which could imply these were test accounts in someone's database.
  • Another query showing how many times those email addresses were found in the leaks, along with other passwords those emails were using.

    • If those were bulk password resets, im expecting to find some results where an email address person@example.com was using some reasonable password in some of the dumps, and in the later dumps they changed to tgPw53j3kG

I'll let you know about the results as soon as i can.

Cheers!

@ignis-sec
Copy link
Owner

  • emails and which leak those credentials containing those 3 passwords from.

    • This will let us see if there is a recognizable pattern to the email addresses, which would imply them being a spam farm and such.
    • We'll also see if this was from a single dump, which could imply these were test accounts in someone's database.

So first query is over. I'll add a small sample of it below, but i've redacted the email addresses because there are no predictable patterns implying they were auto-generated spam, and may contain personal information.

They are also from a wide variety of dumps, telling us its not a single database filled with those.

E.g., in the case of the passowrds above the first one shows up primarily next to gmail.com addresses in my (very limited) dataset

I've found 2135 credentials in my dataset with the password tgPw53j3kG. 1895 of those were @gmail.com.
image

@ignis-sec
Copy link
Owner

It looks like you are absolutely right!

These accounts DID HAVE normal passwords at once.

Here is a small sample of all passwords used by accounts, which at some point appeared in dumps with password tgPw53j3kG

image

It looks like you are absolutely correct about the mass account takeovers. Someone claimed all these accounts and set a single password for all of them.

@oleyka
Copy link
Author

oleyka commented Jul 5, 2020

My rough understanding is as follows: Multiple passwords for the same email could simply indicate that the collection contains records from different Internet services, not that the passwords were reset. People do not necessarily reuse their passwords everywhere. However, if all the other passwords of the corresponding email follow a different pattern, that is likely an indication that the password was not set by the original owner, but was a takeover. And that is what you saw with your analysis. Some of the occurences of these 10-characted passwords that I've seen were supposedly from a PayPal credential dump...

I am wondering if those 10-character passwords are set to match the corresponding botnet customers' credentials... ;) That would make sense, right? A customer purchases a set of N accounts, the bot farmer (not sure what the right term is, this is not quite my field) sets the customer's password on all of them, and then they can start abusing the accounts. Once the customer is done with their scam project, they forget about those accounts and eventually the credentials get leaked in yet another data dump.

@oleyka
Copy link
Author

oleyka commented Jul 5, 2020

Haha, you know what I have also noticed? Sometimes the same gmail address is used to create multiple accounts on some services, sharing the same password. E.g. these would all be different accounts, linked to the same email:

That would artificially increase the occurence of a particular password in the various password dumps.

In the very small dataset that I could find, this password "3rJs1la7qE" (#256 on TroyHunt's list) gave some eye-opening results. Check it out with yours!

@ignis-sec
Copy link
Owner

Haha, you know what I have also noticed? Sometimes the same gmail address is used to create multiple accounts on some services, sharing the same password. E.g. these would all be different accounts, linked to the same email:

my.email.address@gmail.com
myemailaddress@gmail.com
m.y.e.m.a.i.l.a.d.d.r.e.s.s@gmail.com

Yup, i've noticed that and filtered out email addresses using multiple dots to create multiple accounts earlier.
Relevant tweet: https://twitter.com/ahakcil/status/1277170571944628225

I've checked out 3rJs1la7qE, and in my dataset it doesn't have examples m.y.e.m.a.i.l.a.d.d.r.e.s.s@gmail.com - just because those got cleaned up earlier. However, accounts using this password seem to be auto-generated, spam accounts without an actual owner.

I've checked a few of them and these email addresses are not registered.

Some examples using 3rJs1la7qE:

bgbjktk@gmail.com
bgbtekq@gmail.com
bgbtzyc@gmail.com
bgbxefo@gmail.com
bgbxzgu@gmail.com
bgcbfxj@gmail.com
bgcbfxj@gmail.com
bgcdxyf@gmail.com
bgcdxyf@gmail.com
bgcfyxz@gmail.com
bgcqjzi@gmail.com
bgdiqcw@interia.pl
bgdiqcw@yahoo.com
bgdtxdr@gmail.com
bgdtxdr@gmail.com
bgeattr@gmail.com
bgeattr@gmail.com
bgedgkc@gmail.com
bgedgkc@gmail.com
bgedgkc@gmail.com

@JulianVolodia
Copy link

JulianVolodia commented Jul 6, 2020

Haha, you know what I have also noticed? Sometimes the same gmail address is used to create multiple accounts on some services, sharing the same password. E.g. these would all be different accounts, linked to the same email:
my.email.address@gmail.com
myemailaddress@gmail.com
m.y.e.m.a.i.l.a.d.d.r.e.s.s@gmail.com

Yup, i've noticed that and filtered out email addresses using multiple dots to create multiple accounts earlier.

Yes. It's done because many ppl used to make phishing addresses in Gmail afaik. More over - this is not RFC compilant to remove that dots. So why add them? The feature is to have less tracing on how you filter out your message boxes/see from where your creds blushed away their smile to anybody seeing db drops... and many services remove comment from our beloved content of mailto URIs so myaddr+newsletter@would be rather removed always. Actually haven't seen any spamming bots including dots to spam the gmail addresses tbh.

Shoutout: Nice set, thanks! :)))

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants