This article is more than 1 year old
Spotify breach creates password hack risk
Radio ga-ga
Popular online music service Spotify has warned of a security breach that may have exposed user passwords and other sensitive data.
A notice - posted on Wednesday - explains that a bug in Spotify's protocols that was recognised and resolved in December was more serious than first suspected. Last week Spotify learned that a group of hackers had managed to compromise its protocols as a result of this (now resolved) vulnerability.
This, in turn, meant that password hashes of individual users was exposed, though not in an easy to decrypt form. Even so if particular users had used weak passwords then the breach meant these password could be extracted using a brute-force attack, Spotify explains.
The hashes are salted, making attacks using rainbow tables unfeasible. Short or otherwise bad passwords could still be vulnerable to offline targeted brute-force or dictionary attacks on individual users, but you could not run attacks in parallel. Also, there has been no known breach of our internal systems. A complete user database has not been leaked, but until 19 December, 2008 it was possible to access the password hashes of individual users had you reverse-engineered the Spotify protocol and knew the username.
Although credit card details were not exposed a lot of sensitive information was, Spotify adds.
Along with passwords, registration information such as your email address, birth date, gender, postal code and billing receipt details were potentially exposed. Credit card numbers are not stored by us and were not at risk. All payment data is handled by a secure third party provider.
The common habit of using the same password and username combo on many sites means the effects of the breach extend beyond Spotify. The site advises users to change their password across the board, where accounts were registered prior to 19 December and the same password was used on multiple sites. ®