Jump to content
Brian Enos's Forums... Maku mozo!

USPSA passwords database has been hacked


Recommended Posts

  • Replies 157
  • Created
  • Last Reply

Top Posters In This Topic

I use pwnedlist. I actually got an alert on the USPSA hack from pwnedlist BEFORE USPSA decided to alert users.

I signed up on pwnedlist yesterday and it reported 2 data leaks on my email from the USPSA database one on 11/26 and better yet one YESTERDAY 12/1/2014

Edited by rk272
Link to comment
Share on other sites

When I requested a password reset they just told me to use the default pin when I signed up that is located on your frontsite magazine. That being said I have yet to be able to actually change my password on the site, it says my profile is updated but the only thing I can use to login is my PIN.

Link to comment
Share on other sites

This kind of crap is expected when USPSA HQ is leveraging "Volunteers" to do this stuff. Just like anything else in this world, you get what you pay for. If someones head does not roll for this blatant screw up then we really know how screwed up USPSA HQ is.

Link to comment
Share on other sites

Its not like the website is an integral part of USPSA or anything.

Back when it was setup it probably wasn't an integral part but now it is and it should be handled by professionals who can support it 24x7. The design and support of the web-site should be outsourced to a credible web-design company.

Link to comment
Share on other sites

Sorry Paul I forgot to use the sarcasm font. :devil:

Don't forget to add regular security testing as well, their notion that the payments were impacted because they were handled by a third party is also probably bullshit, but it is quite obvious by the SQL error messages that users have received since the site was "fixed" that they didn't fix anything.

A breach is one thing but to store passwords in the clear is just plain incompetence.

Link to comment
Share on other sites

We do security audits every 3 months at work, its a pain but it has to be done. Every organization makes mistakes, and every mistake should be cause to re-examine everything related to that mistake.

USPSA needs to undergo some analysis of everything that is being done and identify all problems and all potential problems and fix them. I think there is too much "if its not broken don't fix it" attitude; Stuff may not necessarily be broken but everything can be improved and I think that determination should be based on risk/reward/cost factors.

Link to comment
Share on other sites

I like how I am still getting deals on steel targets shared on their facebook. I can't believe they are still posting pictures and stuff like everything is normal. I would think they would want to be in the dark for a little while. At least until everything is fixed, classifiers from early November are entered, etc...

Link to comment
Share on other sites

bruce-

even though no other info was compromised, once the id and passwords were available, one could access confidential info such as home address, etc by merely logging in. has your IT guru looked at how many records and which ones were accessed after the breach?

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now



×
×
  • Create New...