Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

Chat CIMB kena hack?

views
     
OldSchoolJoke
post Dec 17 2018, 09:12 AM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
guys, update me.

so user can login with any password?
i tried randomly typing password, can't login to my account
OldSchoolJoke
post Dec 17 2018, 10:18 AM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
monday blue for CIMB IT department
OldSchoolJoke
post Dec 17 2018, 12:34 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(syaifau @ Dec 17 2018, 12:32 PM)
Anybody knows how to change the CIMB clicks password?
I can only find "forgot userid or password"

I know my ID and password.
I just want to change them.
Didnt see it is mentioned anywhere on the banking site.
*
> login
> left side panel bottom got setting icon (gear icon)

you should be able to navigate from there
OldSchoolJoke
post Dec 17 2018, 12:58 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(se7en @ Dec 17 2018, 12:55 PM)
will just leave this here for now

user posted image
*
CODE
password = password.substring(0, 8)


topkek
OldSchoolJoke
post Dec 17 2018, 01:01 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(G_KeN @ Dec 17 2018, 12:57 PM)
^ what does the code mean? sorry ayam buta coding here
*
if i read correctly,

if password following the new format (have special characters and more or equal to 8 characters) then password will be as it is

else if old password format (8 characters), it will only take first 8 characters. any characters behind don't care..kena chopped
OldSchoolJoke
post Dec 17 2018, 01:06 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(Duckies @ Dec 17 2018, 01:03 PM)
Lu coders ke? You are correcto.

Ini code macam intern buat weh.
*
ya..me programmer.
first time see code password just take first 8 characters..topkek betul.


OldSchoolJoke
post Dec 17 2018, 01:13 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(puchongite @ Dec 17 2018, 01:07 PM)
So why problem ?

Their back end only take 8 characters mah ....
*
like your salary let say RM20k, but your boss pay you only RM20 because behind 0's don't care. boleh ka?
OldSchoolJoke
post Dec 17 2018, 01:22 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(puchongite @ Dec 17 2018, 01:16 PM)
Not the same thing lar.

This is login password.

The backend has been doing 8 characters password all the time mah. Sending extra characters over to back end also useless.
*
once encrypted, it will be different alot.
even you plainly compare the password also different already
OldSchoolJoke
post Dec 17 2018, 02:37 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(rooney723 @ Dec 17 2018, 02:31 PM)
but i checked the code the logic says it will accept the password if its more than 8 characters and if the password is less than 8 characters it will take the first 8 chars, or am i wrong?
*
if got special characters and >= 8 characters, it will pass to server as it is
else it will chop off after 8 characters.

topkek betul. that's why your password + any characters behind still can pass
OldSchoolJoke
post Dec 17 2018, 03:06 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(PhakFuhZai @ Dec 17 2018, 02:54 PM)
dun understand

if password more >= 8 char, then the first condition wont satisfy

if password is <8 char, then it only check up to 8th character

no conflicts what
*
its not about conflict, it about the .substring(0, 8) part.

means if it doesn't satisfy the first condition, it will only take the first 8 characters of the password

e.g:

your password is 123456789
since it doesn't satisfy the first condition, it will take first 8 characters which is 12345678

logically, 123456789 is not the same as 12345678. even if you plainly compare it is not the same.
so those who want to attack the site, just need to guess for 8 characters which lessen the time to guess a correct password

what they should do (IMO) is just send the password to server as it is instead of plainly showing to the world the checking.

OldSchoolJoke
post Dec 17 2018, 03:25 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(rooney723 @ Dec 17 2018, 03:15 PM)
that means if i want to attack the site, i only have to keep spamming 9 chars without special chars and the password will be accepted as a legacy 8 chars no special char password and its much easier to brute force 8 chars without special chars

the devs really damn bodo for putting the substring part, it isnt necessary at all
*
if the user doesn't change the password then yea. just brute force 8 characters and eventually will enter
that's why it now has the captcha thingy to slowdown the brute force

that's why really topkek the code. first time see password taken by substring
and it is a bank! not some cheap blog or what.
OldSchoolJoke
post Dec 17 2018, 03:28 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(RicoT @ Dec 17 2018, 03:23 PM)
This 8 digit cut off been around for sometime no?
*
i think this happened due to the new password format.
should be appear the same time when they implement the new format for password
OldSchoolJoke
post Dec 17 2018, 03:31 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(PeinEVO @ Dec 17 2018, 03:28 PM)
I noob apa jadi if they use substring?
Anyway changed my password already
*
means the let other attackers know old password length is 8 characters only.
ease attacker's work just guess got 8 characters.
OldSchoolJoke
post Dec 17 2018, 03:32 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(heinlein @ Dec 17 2018, 03:29 PM)
Because of the news, I login check, lose RM49.04. No missing card, no TAC, no MSOS. The transfer can be made. Call paypal support found out both of my CIMB cards is linked to unknown paypal account holder. Requested permanent freeze at paypal and wait the missing money to be refunded from paypal. Waiting....

ps: cimb is not helping much, robot copy and paste to me only.
*
is the transaction listed at transaction history?
just now i check mine got nothing suspicious
OldSchoolJoke
post Dec 17 2018, 03:46 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(heinlein @ Dec 17 2018, 03:37 PM)
The transaction is listed in my cimb account on 6 dec 2018. I received suspicious sms my debit card was charged RM 52.32 in paypal on 4 dec 2018 but that day when i check, nothing is deducted in my account. As on today, I only login check and found RM49.04 was deducted on 6 dec 2018
*
Oh. I didn't receive anything suspicious message from cimb. Hope nothing happen to me
OldSchoolJoke
post Dec 17 2018, 03:56 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(heinlein @ Dec 17 2018, 03:49 PM)
After received my refund, gonna close cimb acc. No confident already. Imagine my card being used by random people in paypal. I thought is some nigga scammer from other country but the customer support tell me is malaysian account holder
*
My sister also kena from cimb last few weeks.
Few transactions of steam games

OldSchoolJoke
post Dec 17 2018, 08:15 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(okuribito @ Dec 17 2018, 07:54 PM)
I guess this code snippet was lifted off the net today? ie current code, right?

Haven't read all posts here, but remember reading something about a recent change by CIMB to allow longer pw & with special characters?

And because some incompetent coder wrote the above snippet, hence the exploit was created?

Help me understand the logic...

if PW is at least 8char long, and includes special chars, then the entire pw string is passed to encryption function

if PW is at least 8char long, and dun include special chars, then the long pw is truncated & the front 8char string is passed to encryption function

if PW is < 8char long eg 7char or less, irrespective got special characters or not, then what happens? Won't password = password.substring(0, 8) evaluate to #error? Previously, wasn't there a minimum # of characters for passwords ie 8?

PS: i dunno coding. only trying to make sense of the if-then-else which is also used in excel tongue.gif
*
the problem here is the
CODE
password = password.substring(0, 8)


this means as long as the first 8 characters are correct, the hacker can enter.

but by logic, "123456789" is not the same as "12345678". even with plain comparison, it is not the same.

secondly, this shows the hacker only need to focus on accounts with 8 alphanumeric characters.
OldSchoolJoke
post Dec 18 2018, 01:54 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(okuribito @ Dec 18 2018, 01:44 PM)
so let's say your old pw was  12345678H%&*GGhklp    ...

1. before 18 nov, were you able to get in with just 12345678?  with 12345678H? or only with 12345678H%&*GGhklp?

2. After 18 nov, were you able to get in with just 12345678?  with 12345678H? or only with 12345678H%&*GGhklp?

curious to figure out what cimb is doing  tongue.gif
*
yesterday se7en got post the code script.
the checking is:-

if got no special characters and >= 8 characters (means new format of password), you will require to type exactly your password
else (old password password), you only need to be correct on the first 8 characters.

meaning if old format of password, any characters behind after 8th characters, if user type in wrongly, user will still be logged in
OldSchoolJoke
post Dec 18 2018, 03:36 PM

Getting Started
**
Junior Member
285 posts

Joined: Mar 2010
QUOTE(okuribito @ Dec 18 2018, 02:13 PM)
Thx bro, saw that & thinking thru the implications. How does CIMB store passwords? As Is? or after hashing?

If after hashing, old passwords longer than 8char should not be able to get in if just key in first 8 chars. Why? becos the hash would be diff. No? Only way can get in is IF the old password was stored As Is. Wonder if that makes sense  hmm.gif
*
hashed/salted or not i no idea.

good question you asked.
but probably, with old format of password, CIMB also only takes in 8 character.

e.g:
you create account with password abc1234567890,
before inserting into database, it only takes in abc12345 and hash/salt it.

this is to my assumption only. i got no idea how they work on the password.
if it stored as plain text then doh.gif .

 

Change to:
| Lo-Fi Version
0.0641sec    0.63    7 queries    GZIP Disabled
Time is now: 12th December 2025 - 10:22 AM