Fortunately passwords appear to have been strongly hashed
We did this in response to suspicious activity and immediately began an investigation. We apologize that our continuing investigation is taking this long. Know that we are working around the clock to ensure that secure operations can be restored.
Our investigation has identified that unauthorized third parties gained access to some user information, including:
- email address
- hashed passwords with random salt value
- public-facing “About Me” profile information
NVIDIA is continuing to investigate this matter and is working to restore the Forums as soon as possible. We are employing additional security measures to minimize the impact of future attacks.
All user passwords for our Forums will be reset when the system comes back online. At that time, an email with a temporary password, along with instructions on how to change it, will be sent to the user’s registered email address.
As a precautionary measure, we strongly recommend that you change any identical passwords that you may be using elsewhere.
NVIDIA does not request sensitive information by email. Do not provide personal, financial or sensitive information (including new passwords) in response to any email purporting to be sent by an NVIDIA employee or representative.
NVIDIA, like Sony Corp. (TYO:6758), Nokia Oyj. (HEX:NOK1V), and others likely fell victim to an SQL injection attack. SQL injection attacks exploit the fact that internet user databases are publicly hosted and send them malformed request strings designed to execute disallowed commands. They can be defeated by careful programming, but implementing protections is a time intensive and expensive process, hence many companies have vulnerable databases.
[Image Source: NVIDIA Wallpapers]
NVIDIA Forums is a popular stomping ground both for gaming enthusiasts and for programmers developing GPU applications using NVIDIA’s proprietary CUDA API.
The first of two major concerns arising from the NVIDIA attack is the possibility of phishing. Now that an unknown party has users emails, it could send them messages (as the NVIDIA post alludes to), trying to trick them into providing their password in plaintext or other personal details.
The second danger is the possibility that the hashed passwords could be cracked. NVIDIA did not reveal what hashing algorithm it used, but the fact that it used a random salt value indicates that its passwords were likely relatively strongly hashed.
The announcement was actually the second major announcement of a SQL injection breach on Thursday. Earlier, Yahoo! Inc. (YHOO) announced that hackers had found 453,000 of its user passwords. Yahoo! was less fortunate than NVIDIA — baffingly it decided to store its user passwords in plaintext, greatly increasing the potential damage to its users.
Source: NVIDIA Forums