Looking at the page network traffic it's all going to either cimb server or google (for captcha most probably)
But I don't dare login with a real id
Chat CIMB kena hack?
Chat CIMB kena hack?
|
|
Dec 16 2018, 10:40 PM
Return to original view | Post
#1
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
Looking at the page network traffic it's all going to either cimb server or google (for captcha most probably)
But I don't dare login with a real id |
|
|
|
|
|
Dec 16 2018, 10:48 PM
Return to original view | Post
#2
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
|
|
|
Dec 16 2018, 10:53 PM
Return to original view | Post
#3
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
|
|
|
Dec 16 2018, 11:44 PM
Return to original view | Post
#4
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
|
|
|
Dec 16 2018, 11:48 PM
Return to original view | Post
#5
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
QUOTE(ahhann @ Dec 16 2018, 11:39 PM) Tried app login. Put in correct username and correct image and correct password. Immediately prompt alert ask me go to their website to change password. De fuck? I just successfully login last week. Been getting the same past few weeks, called their rep and all I got was "you probably put in the wrong password" response. I checked my account and there was no out of the ordinary transactions, changed the password to something I never used before. cimb is not my main account so I didn't think too much about it. |
|
|
Dec 17 2018, 12:15 AM
Return to original view | Post
#6
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
QUOTE(briantwj @ Dec 17 2018, 12:05 AM) Probably they notice weird IP hitting their front end. Even after blocking still weird IP appearing and the hits pattern are similar. Which is why they implement this captcha. So dictionary or bruteforce attack? They still have to bypass TAC or they got card numbers to transfer to paypal.Just saying. Looks like Se7en got something judging by the update |
|
|
|
|
|
Dec 17 2018, 12:26 AM
Return to original view | Post
#7
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
Reading around, apparently http without the s (no ssl) on cimb sure works
Really roasted whoever is handling the network |
|
|
Dec 17 2018, 12:49 AM
Return to original view | Post
#8
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
|
|
|
Dec 17 2018, 12:55 AM
Return to original view | Post
#9
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
QUOTE(briantwj @ Dec 17 2018, 12:53 AM) This. Ppl can just bruteforce ur password now. As long as it hits the first 8 or the number or char u use on ur password. Then gg. Nothing short of freezing online transaction can helpSo.... No point changing password now. Lol. The change need to come from CIMB. |
|
|
Dec 17 2018, 01:02 AM
Return to original view | Post
#10
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
So if kena what else can you do besides calling cimb and PayPal? Can report to bnm and claim some sort of damages from cimb?
|
|
|
Dec 17 2018, 01:50 AM
Return to original view | Post
#11
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
QUOTE(blacktubi @ Dec 17 2018, 01:47 AM) “The standard DES-based crypt() returns the salt as the first two characters of the output. It also only uses the first eight characters of str, so longer strings that start with the same eight characters will generate the same result (when the same salt is used).” Thought of the same thing, but if true cimb really cheapskate to dedicate resources for hashingNot sure if this is actually the case. My 2 cents. http://php.net/manual/en/function.crypt.php |
|
|
Dec 17 2018, 08:23 AM
Return to original view | Post
#12
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
QUOTE(hirano @ Dec 17 2018, 08:21 AM) Security is part of IT dept. I didn't catch anything on bfm news either, seems like there are still people who aren't aware of this case yetI browsed cimb's twitter and fb, still they wont mention any shit about the issue. If 1st world country, they would have made press release and apologize. |
|
|
Dec 17 2018, 08:44 AM
Return to original view | Post
#13
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
|
|
|
|
|
|
Dec 17 2018, 09:42 AM
Return to original view | Post
#14
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
QUOTE(veron4best @ Dec 17 2018, 09:36 AM) so in simple currently CIMB being attached hacker by:- most probably old passwords are hashed with DES which takes the first 8 char and ignores the rest. In this day and age bruteforcing 8 chars isn't that hard, no need for buffer overflow1. Brute Force 2. Buffer overflow Correct? And does changing password would solve this issue? Or have to change all debit card, credit card number? Due to if hacker manage to get our card number, they can linked to Paypal? |
|
|
Dec 17 2018, 10:49 AM
Return to original view | Post
#15
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
QUOTE(eltaria @ Dec 17 2018, 10:47 AM) Yeah, I think ppl just confused with everything it's probably a hold out from an old system, by right they should have forced all users to reset their passwordThe 8 password can login is probably not a bug, but a feature, maybe a bad 'user friendly' feature la. Let's say you now have a mixture of users on 8 chareacter password and 8+ passwords, in their DB, they probably have a column, Over8Chars as true or false, they will know if u have updated ur password or not, in login, they may read this field if it's still 8 characters, to trim off excess characters.... from your password entry... (Maybe too smart, and too user friendly until cause panic) and this is reported as a hack. Remember, if they already bruteforce until ur 8 character pass is known, they don't need to add in additional digits anyway. |
|
|
Dec 17 2018, 12:54 PM
Return to original view | Post
#16
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
QUOTE(lagista @ Dec 17 2018, 12:27 PM) this one issit ?? if that was the source, ggCIMB loses data backups 13 Nov 2017 https://forum.lowyat.net/topic/4455779 "The tape data does not contain any authentication data such as PINs, passwords or credit card CVV numbers," CIMB said in a statement today. |
|
|
Dec 17 2018, 01:01 PM
Return to original view | Post
#17
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
|
|
|
Dec 17 2018, 01:23 PM
Return to original view | Post
#18
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
|
|
|
Dec 17 2018, 01:41 PM
Return to original view | Post
#19
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
QUOTE(puchongite @ Dec 17 2018, 01:38 PM) So the problem is historical and backend issue. People should quickly change to new format. Nothing to do with front end. If you throw old password with longer than 8 characters, the backend will be confused. actually it checks if there are special characters and 8 characters or more;if this is true use the new method if this is false take just the first 8 characters and use the old method This post has been edited by Quantum Geist: Dec 17 2018, 01:44 PM |
|
|
Dec 17 2018, 01:59 PM
Return to original view | Post
#20
|
![]() ![]()
Junior Member
109 posts Joined: May 2013 |
|
| Change to: | 0.0572sec
0.70
7 queries
GZIP Disabled
Time is now: 9th December 2025 - 09:47 AM |