• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 35,000 monthly views (unique) and 208,000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

Why Password Hashing Alone Can’t Protect You: Key Lessons from the Plex Password Leak

johny899

New Member
Content Writer
Messages
687
Reaction score
3
Points
23
Balance
$850.8USD
I used to assume that if I hashed a password, it was essentially bulletproof. This was great — a one-way programming language that hackers couldn't even read. Then, Plex was hacked, and I learned that hashing wasn't good enough.

So what happened? And what can we take away? Let's not over-complicate matters.

The Plex Incident​

Plex was a well-known media streaming platform that got hacked and was left compromised. The hackers were able to access the database of hashed passwords — and Plex made the assumption that hashed passwords were safe due to being hashed with bcrypt despite the fact they hacked their organization.

However, the hackers were not required to crack every hash. They were able to find other weaknesses in the Plex system to cause pain for customers, and the hashing was insufficient. Hashing will protect the passwords stored on the site or application, but it does not protect you possibly from everything else.

Why Hashes Alone Can Fail​

Consider hashes the same way you would treat your password to a shredder. Once you put your password through a shredder, you know that reconstructing the hashed shreds would be challenging, but not impossible if you know how the shredder pattern.

Below are the reasons hashes by themselves can fail:

Weak passwords – It can still be easily guessed, even if the hashing method is strong.

Poor setup — If the salts (additional random data attached to the password) are not used, or reused, it makes it easier for a hacker.

Password reuse — If you are using the same password on other sites, if there is a leak at one site, it will expose everything you use the same password for.

Device leaks — Hackers can also pilfer login tokens, emails, or hints that aid them in bypassing passwords.

In short: hashing is good—but it is not everything.

Advancing Default Security​

Want more security? Hash that password and add a few more steps:

  • Use a different salt for each password — which either way makes it a lot harder to guess.
  • Use rate limiting — don't allow too many failed access attempts.
  • Use Two-Factor authentication (2FA) — to add another layer of security.
  • Use a strong unique password (stay with it, and not a short or common password).
And make sure you are checking your environment for unusual activity. Most hacks had nothing to do with whether you hashed correctly, but rather because a person ignored the indicators.

The Real Lesson​

For people who write their own programs, or use online services, hashing is just one piece to the password security puzzle. As the breach of Plex has shown, even with a good hash and overall security, one small mistake can lead to total compromise. So the next time you say to yourself, "my password is secure, it is hashed" ask yourself, is it secure or hidden?
 
Top