Hacker News new | past | comments | ask | show | jobs | submit login

That's a wide impact. While any hijacked account is bad, some of these are really bad.

For example, https://coinbase.com is on that list! If they haven't immediately invalidated every single HTTP session after hearing this news this is going to be bad. Ditto for forcing password resets.

A hijacked account that can irrevocably send digital currency to an anonymous bad guy's account would be target number one for using data like this.




coinbase is certainly one of the most concerning on that list- however they also support 2 factor authentication.


If you captured the right cookies though, you wouldn't need to log in with a password and be subject to OTP. That's why this is so problematic. Caveat: I haven't actually checked the details of Coinbase's session/security tokens.


This is true- but I'd assume all of these sites have flushed their session/cookie data by now.


I also noticed the domain waveapps.com, which is for Wave Accounting.


Cloudfare has advised that Wave data has not been affected/leaked. We've got engineering and security teams investigating, and we'll keep on it until we're ultra confident in the conclusion. Nonetheless, good practice for everyone to rotate all passwords today, for any services. Good security hygiene any time, and especially now.


How can they know that?

A broken web page could have been queried many, many times the last weeks and couldn't one of the responses contain Wave data?


Not 100% sure what their methodology is yet, and we're taking a cautious approach. At minimum, in the data that they've found in the wild, no Wave data was among it.


We're investigating




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: