Adobe Data Breach: How to Protect Yourself

Adobe's massive data breach, first revealed a month ago, just keeps getting worse. It now appears that the passwords in 150 million stolen account credentials — affecting at least 38 million individual accounts — were protected using an embarrassingly weak type of encryption.

That's in addition to 2.9 million separate Adobe account records that included individuals' full names, addresses and credit card information. This theft, which is part of the same overall data breach, was first reported on Oct. 3.

Since then, much more stolen Adobe data has appeared online in the form of a 3.8-gigabyte file that can easily be found online.   

For example, one of the most frequently occurring encrypted passwords is  "L8qbAD3jl3jioxG6CatHBw==," which repeatedly appears alongside hints such as "password" and "the password is password." Because of this, one can assume that "L8qbAD3jl3jioxG6CatHBw==" corresponds to the password "password."

Similar patterns arise for other common passwords, such as "123456," "letmein" and "qwerty."

As of this posting, no one has come forward claiming to have reverse-engineered the Adobe decryption key. But it's probably just a matter of time.

Using this method, users don't store the passwords themselves. Rather, users store a one-way hash, a string of seemingly random data that both masks the length of the password to which it corresponds, and, more importantly, cannot be reversed (hence the "one-way" name).

The poor encryption that Adobe used to store customer data is even worse than the fact that the breach happened in the first place. It's a lesson in the everyday importance of strong encryption. Unfortunately, that lesson comes at the expense of more than 38 million Adobe users.

So what if you think you're among the 38 million affected Adobe customers?

While you're creating those new passwords, make sure they're long and strong. Passwords should be 10 or more characters in length and contain numbers and punctuation marks as well as upper- and lowercase letters.

The more random the assortment of characters, the better; if you base the password on a word or name, cybercriminals can use what's called a "dictionary attack" by systematically guessing all words and combinations of words found in a dictionary.

You also should use different passwords for every single one of your online accounts. That way, should a data breach compromise one of your accounts, the criminals won't be able to compromise other accounts as well.

It doesn't appear that any credit card data was compromised beyond those on the initial 2.9 million records, but to be sure, you'll want to detect any unauthorized credit card use. Register for credit alerts with your credit card companies, and also with the three major credit-reporting agencies, Equifax, Experian and TransUnion.

TOPICS

Jill Scharr is a creative writer and narrative designer in the videogame industry. She's currently Project Lead Writer at the games studio Harebrained Schemes, and has also worked at Bungie. Prior to that she worked as a Staff Writer for Tom's Guide, covering video games, online security, 3D printing and tech innovation among many subjects.