Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Someone was breaking into Orange Spain RIPE account (and break their /12)
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Someone was breaking into Orange Spain RIPE account (and break their /12)

Comments

  • zGatozGato Member
    edited January 3

    Lucky enough I didn't get affected :)

    Common Orange Spain subsidiary screwing shit up
    They also apologied on twitter

  • remyremy Member

    I hope it's possible to enable 2FA on something so critical. Isn't it?

  • @remy said:
    I hope it's possible to enable 2FA on something so critical. Isn't it?

    It is

    Thanked by 1remy
  • PixelsPixels Member

    Seems they were not very original when choosing a password... Apparently it had been compromised previously and nobody cared to change it. Mad.

  • Bella Ciao 🎶

  • @Pixels said:
    Seems they were not very original when choosing a password... Apparently it had been compromised previously and nobody cared to change it. Mad.

    It's only a /12. Who would waste their time on that?

  • NeoonNeoon Community Contributor, Veteran

    @totally_not_banned said:

    @Pixels said:
    Seems they were not very original when choosing a password... Apparently it had been compromised previously and nobody cared to change it. Mad.

    It's only a /12. Who would waste their time on that?

    Exactly, a /24 is much bigger than a /12, double the size.

  • @Neoon said:

    Exactly, a /24 is much bigger than a /12, double the size.

    You won't get double because blackfriday already passed

  • NeoonNeoon Community Contributor, Veteran

    @blackhiden said:

    @Neoon said:

    Exactly, a /24 is much bigger than a /12, double the size.

    You won't get double because blackfriday already passed

    Sure someone would like to double the /12 into a /24, probably even for free.

  • @tubehosting interesting...

  • tubehostingtubehosting Member, Host Rep

    @sillycat said:
    @tubehosting interesting...

    We have nothing to do with it - I don't know why someone chose our ASN for this kind of "fun"

  • Rumor is that their password was "ripeadmin"

    Imagine protecting an entire /12 with the password "ripeadmin"

    Thanked by 2yoursunny tentor
  • host_chost_c Member, Patron Provider

    @ehhthing said: Rumor is that their password was "ripeadmin"

    :o :D

    I have no words for this, if it is true.

  • PixelsPixels Member
    edited January 4

    @host_c said:

    @ehhthing said: Rumor is that their password was "ripeadmin"

    :o :D

    I have no words for this, if it is true.

    Not only that, but they also didn't seem to have activated 2FA.

  • host_chost_c Member, Patron Provider

    At this point it is a fail, either-way they want to sugarcoated it .

  • oh fek. better change it: ripeadmin2

    seriously, how was that password valid in the first place. This is funny for a /12 but what else is out there

    Thanked by 1host_c
  • host_chost_c Member, Patron Provider
    edited January 4

    OK, I can confirm the breach, just got a mail from RIPE

    Dear colleagues,

    In light of the recent incident where a RIPE NCC Access account was compromised, we urge you to review your own account security.


    Two-Factor Authentication

    If you have not already done so, enable two-factor authentication on your RIPE NCC Access account. Using two-factor authentication across all of your accounts can reduce your exposure to attacks like these.

    The guide for setting up two-factor authentication on your Access account can be found at:..........

    THX @tentor for the heads up!

  • mgcAnamgcAna Member, Host Rep

    @ehhthing said:

    Imagine protecting an entire /12 with the password "ripeadmin"

    This is more common than one can image, there are lots of critical services over internet with such passwords waiting to be exploited.

  • kaitkait Member

    @lowenduser1 said: seriously, how was that password valid in the first place. This is funny for a /12 but what else is out there

    I think it was chosen in 2002 and never changed, I can only speculate but I think people in 2002 didn't know how complex a password should be.

    For the developer side of things, you could check if the password complexity on every login but that is not worth it I think.

    Thanked by 1sillycat
  • @kait said:

    @lowenduser1 said: seriously, how was that password valid in the first place. This is funny for a /12 but what else is out there

    I think it was chosen in 2002 and never changed, I can only speculate but I think people in 2002 didn't know how complex a password should be.

    For the developer side of things, you could check if the password complexity on every login but that is not worth it I think.

    Yeah if that password is true, one could deduce it's hopefully a policy from the past. I think one can safely agree that it's super sensitive information or with great impact and a proper policy is demanded

  • @lowenduser1 said:

    @kait said:

    @lowenduser1 said: seriously, how was that password valid in the first place. This is funny for a /12 but what else is out there

    I think it was chosen in 2002 and never changed, I can only speculate but I think people in 2002 didn't know how complex a password should be.

    For the developer side of things, you could check if the password complexity on every login but that is not worth it I think.

    Yeah if that password is true, one could deduce it's hopefully a policy from the past. I think one can safely agree that it's super sensitive information or with great impact and a proper policy is demanded

    Hmmm I'm not entirely sure of this, surely to activate RPKI in the first place someone had to login to the RIPE panel and at that point they would've noticed how weak the password is right. It was very negligent of them to not change it at that point in time, imo.

  • kaitkait Member

    @ehhthing said: Hmmm I'm not entirely sure of this, surely to activate RPKI in the first place someone had to login to the RIPE panel and at that point they would've noticed how weak the password is right. It was very negligent of them to not change it at that point in time, imo.

    If you use a password manager I guess you don't check the complexity. Or they have automated it via their own software.

  • CalinCalin Member, Patron Provider

    Good for know , Orange spain have lot of stupid employers , but still in first place it's Orange Romania , stupid employers , corruption , birocracy

    Regards

    Thanked by 2sh97 shruub
  • zGatozGato Member

    @Calin said:
    Good for know , Orange spain have lot of stupid employers , but still in first place it's Orange Romania , stupid employers , corruption , birocracy

    Regards

    Cybersecurity in Spain as a whole is ridiculous. Most companies barely try to secure their shit in general.

    There was a recent attack against the official workers comissions in Spain and got all documented by the hacker itself lmao.

    Thanked by 1Calin
Sign In or Register to comment.