Why you can't afford to ignore latest big data breach

The number of affected users keeps growing, and it's hard to know precisely how much potential damage there is. But the risks of digital carelessness could not be higher.

By Money Staff Nov 15, 2013 4:11PM

This post comes from Adam Levin at partner site Credit.com.

Credit.com on MSN MoneyIf you’re one of those folks who believed that "it will never happen to me," when it comes to identity theft, the hack of Adobe’s internal database isn’t just bad news -- it’s scary. It is increasingly inevitable that every business will suffer some kind of data breach -- and that each of us will be a victim of identity theft, possibly as a result of one of those breaches. Suddenly, just being careful about your own information is no longer enough to keep yourself safe.

User name field on computer screen © William Andrew, PhotographerIf there is one universal truth about identity theft, it’s that you’ll never know how bad it is until long after you’ve been put in danger (if you ever really know). The Adobe hacking situation illustrates the growing problem with identity theft and how ordinary people are often the real targets of hackers who target big companies.

It all started when Adobe reported the breach of more than 3 million customers’ information (including password-identifying information), then upped the number to 38 million. Last week, it got a whole lot worse when an outside company found the data of some 152 million Adobe customers on a site frequented by cybercriminals. That could mean that the Adobe hack is the largest in history.

But if that wasn’t bad enough -- and make no mistake, it’s bad enough, given how many people commonly reuse passwords across accounts and choose to use unsafe passwords like "password" -- Adobe spokeswoman Heather Edell confirmed to Reuters that "source code to several software titles" was stolen in the breach. So far, Adobe has disclosed only that the hackers took source code for its Cold Fusion (a Web development application) and Acrobat (the program that builds .pdf documents), though it’s been reported that at least Photoshop and Reader were similarly accessed.

Why you should care about stolen source code

The obvious issue for Adobe with the theft of its source code is that their expensive products can now more easily be pirated. But beyond that, as previous hacks have shown, the cybercriminals who slithered away with their source code and their user database can use it to make much more than mere mischief -- especially as almost anyone who uses the Internet likely uses at least one Adobe product.

To understand how this kind source code theft could affect a company’s customers, one need look no further than the challenges faced by RSA, a cybersecurity company whose database was breached in 2011. That breach resulted in the theft of source code related to its SecurID product -- the little electronic tokens that cough up a new passcode every time you try to log into an account. Though RSA announced they caught the cyberintruders in April 2011, it wasn’t until June that they publicly admitted the hackers compromised its source code and replaced millions of tokens for its 25,000 customers.

In the meantime, at least one of RSA’s customers, Lockheed Martin, experienced a breach made possible with the hacked tokens.

It’s worth pointing out that the RSA hack reportedly originated from a problem with Adobe Flash that the hackers exploited after getting an RSA employee to open an infected Microsoft Excel file, and the Adobe hack reportedly used an exploit in its own Cold Fusion program. Finding more exploits like these is just one way that hackers could use the source code to commit even larger crimes and wreak even greater havoc. In the Adobe hack, the bad guys know which programs specific users have, making it even easier to engage in phishing to get people to download malware disguised as updates.

The scope of the attack is still unknown

And despite the risks, Adobe is still being circumspect about what exactly was taken and what problems customers could face from the damage inflicted on the company --  not that Adobe is unique in its circumspect disclosures. Compared with many other companies, Adobe is being enormously transparent. A new ThreatTrack Security survey indicates that as many of six in 10 data breaches that are discovered are not publicly reported.

In this case, Adobe is sending snail mail to users like me (and emails to others) warning that my data might, or might not, have been compromised weeks ago. But, in the meantime, even Facebook has used the hackers’ database to determine which email and password combos apply to their users’ accounts and locked those accounts down until they can be verified.

The truth is that we don’t know exactly what the hackers spirited out of Adobe and what they can do with that data -- and it’s possible that Adobe doesn’t know, either. It’s likely we won’t know much of it for a while, if ever.

Actions to take going forward

So what should you do? Be really careful with what files you open right now, with what links you click and even with what emails you read (if you don’t have pictures blocked). Make sure you have and are running the most up-to-date antivirus software that also scans for malware.

Also, change your passwords -- right now. Don’t use the same password for different accounts, especially for your financial and email accounts. Never use the word "password" or any other word found in the dictionary; those are really easy for hackers’ programs to guess. Instead, in addition to letters, use numbers, symbols and punctuation marks to make your password harder to decipher. For financial accounts and email accounts (which can be used to reset passwords on other accounts), insist on two-factor authentication (a password and another form of identification determined by your email provider).

A data breach like this one can lead to identity theft, which takes a huge toll on your credit. And, obviously, look twice at any email purportedly from Adobe encouraging you to download updates or new versions of the software.

This is an op/ed contribution to Credit.com and does not necessarily represent the views of the company.

More from Credit.com:

Nov 15, 2013 4:50PM
The healthcare websites are a huge risk for identity theft since they are being patched up when they need to be shut down. If you think you can avoid this problem by signing up in person, you are deceived since all your information has to be entered into the same database.
Nov 15, 2013 5:27PM
The truth of the matter is, there are NO 100% guarantees that your informatmio will not be compromised at some point.  And, as "Joe Public", we probably don't have the wherewithal to know and understand the inticracies of internet and system security.  When you ask advice from IT specialists, as to what is the right and best thing to do, you will probably get a somewhat different answer from each one.  We have to face the undeniable fact that we are vulnerable to breaches.  It seems all these articles do is stir up anxiety in the readers.  My advice?  Do the best you can in keeping your antivirus and malware software up to date; monitor your sensitive accounts/information; and, don't give any personal/confidential information over the phone. Good luck!!!
Nov 15, 2013 6:21PM
The correct term is actually "Crackers", or at least use the correct term if you're going to use the word "Hackers", there are White Hats, Grey Hats, and Black Hats...The black hat hackers are the ones you need to worry about.

This article kind of labels all hackers bad, by using the term in a general fashion. Anyways, I think they should catch all the black hats they can and lock them up for life.

Nov 15, 2013 8:47PM
be careful when signing up for Obamma care, you will be typing in to the Gov your whole life, drivers license, social security numbers, etc, plus your name, your  age, your address, plus what is your job and how much do you earn, identity thieves are drooling over this, dont do it
Nov 18, 2013 5:25PM
There are only 2 types of servers on the internet.
1) Those that have been hacked and admit it.
2) Those that have been hacked and do not know it yet.

Never forget. never forgive.
Adobe was warned, just as everyone else was.
They should have expected this!
No sympathy, take no prisoners.
Release, release, release!

People have no idea how big this is!

Please help us to maintain a healthy and vibrant community by reporting any illegal or inappropriate behavior. If you believe a message violates theCode of Conductplease use this form to notify the moderators. They will investigate your report and take appropriate action. If necessary, they report all illegal activity to the proper authorities.
100 character limit
Are you sure you want to delete this comment?


Copyright © 2014 Microsoft. All rights reserved.

Fundamental company data and historical chart data provided by Morningstar Inc. Real-time index quotes and delayed quotes supplied by Morningstar Inc. Quotes delayed by up to 15 minutes, except where indicated otherwise. Fund summary, fund performance and dividend data provided by Morningstar Inc. Analyst recommendations provided by Zacks Investment Research. StockScouter data provided by Verus Analytics. IPO data provided by Hoover's Inc. Index membership data provided by Morningstar Inc.



Quotes delayed at least 15 min


There’s a problem getting this information right now. Please try again later.
There’s a problem getting this information right now. Please try again later.
Market index data delayed by 15 minutes

[BRIEFING.COM] The major averages ended the midweek session with slim gains after showing some intraday volatility in reaction to the release of the latest policy directive from the Federal Open Market Committee. The S&P 500 added 0.1%, while the relative strength among small caps sent the Russell 2000 higher by 0.3%.

Equities spent the first half of the session near their flat lines as participants stuck to the sidelines ahead of the FOMC statement, which conveyed no changes to the ... More


There’s a problem getting this information right now. Please try again later.