In July 2015, the password management company revealed that it had been the victim of a cyberattack, compromising email addresses, password reminders, server per user salts and authentication hashes of 7 million users.
According to security commentators, one of the drawbacks of the hashing algorithm PBKDF2-SHA256 employed by the company was that it was not designed to protect passwords. Salts are really not useful for preventing dictionary attacks or brute force attacks.
Want to discuss this case? We're offering a FREE 20 minute phone consultation to discuss this case and the implications it has for your organisation. Just select the time and date that works for you:
If you'd rather we did the heavy lifting in developing a cyber incident response plan or lessons learnt training for your organisation underpined by our unique insight into the challenges faced and strategies implemented by organisations countering today's cyber security threats then please contact us here.