Important Security Notice About Comodo Forums Accounts
At Comodo, we take security very seriously and it is our highest priority. Very recently a new vulnerability in the vBulletin software, which is one of the most popular server applications for website comments including the Comodo Forums, was made public. Over the weekend at 4:57 am ET on Sunday September 29, 2019, we became aware that this security flaw in the vBulletin software had become exploited resulting in a potential data breach on the Comodo Forums.
Our IT infrastructure team immediately took steps to mitigate the exploit by taking the forums offline and applying the recommended patches.
Who has been affected and what data has been potentially accessed?
An unknown attacker exploited the recently discovered vBulletin vulnerability and potentially gained access to the forums database. Our investigations are ongoing to determine what data, if any, has been accessed. User accounts on the forums contain information such as username, name, e-mail address, last IP used to access the forums and if used, potentially some social media usernames in very limited situations. All user passwords in the database were stored encrypted. Comodo forums currently have approximately 245,000 registered users.
What should forum users do?
As a precautionary measure we recommend that forum users should immediately change their passwords and exercise good password practices such as strong random passwords and not share your passwords across different Internet accounts. The account passwords were encrypted in vBulletin for the Comodo Forum users, but a password change is recommended as part of good password practices.
We deeply regret any inconvenience or distress this vulnerability may have caused you, our users. As members of our community of Comodo Forum users we want to reassure you that we have put in place measures to ensure that vulnerabilities in third party software, such as vBulletin, will be patched immediately when patches become available
I’m probably missing something here, but what exactly does vBulletin have to do with Comodo? This forum isn’t on vBulletin, it’s on Simple Machines Forum. On the other hand, the following forum hosted on Comodo.com is using vBulletin.
Thank you for informing us and being proactive about it. :-TU
I noticed that as well. I think the breach happened with the Itarian Forums, also by Comodo, which use vBulletin software. Once there was access to the server(s) I guess there was also access to the database of Comodo Forums.
Oof, makes sense. I used to work for IB years ago and know what vB looks like, even if it’s hidden well. Yeah, breaches like that are a lot more common than people think. I had no idea Itarian was owned by Comodo. I changed my password for the email I used to register here and other Comodo products/sites. I was about to swap the password for this forum and other ones, too, when I saw this thread.
People assume security companies don’t get breached. They do. Just as major Big N tech companies have. It’s the wheel of life.
The vulnerability in vBulletin gave hackers full access to the server. From there they had full control and who knows how things moved from there. We don’t know because we don’t know the infrastructure.
Even though Simple Machine Forums were not directly vulnerable or directly compromised, they reside on the same segmented zone of our infrastructure and the attackers were able to utilize the vBulliten attack to potentially access data from the Simple Machine Forums being on the same servers.
The servers were deliberately segmented into security zones and no other systems were accessible.
HEAVILY EDITED >>> First of all, I have considered page 2 for page 1 of the thread (I’ve been awake for 33 hours for “technical” reasons. 88) ) and secondly, it is generally not recommended writing on different topics in different forums at the same time. :a0
The vulnerability has been known for a relatively “long” time. Apparently, the security gap has not been fixed since the announcement and this has made this type of attack possible.
“According to Chaouki Bekrar, founder and CEO of the Zerodium exploit broker, the vulnerability has been privately circulating for years.”