Due to a bug in Cloudflare proxy, data from random people accessing the pages behind Cloudflare proxies could randomly be accessed by other users/crawlers and cached by search engines. This means that passwords, tokens and basically all the secure info might have been made public if the site was using Cloudflare.

I've briefly checked the list of potentially compromised sites here: https://github.com/pirate/sites-using-cloudflare
and HumbleBundle is on it. It's recommended that if you have an account on HB, you change it or the least enable 2 factor auth.

It's NOT CERTAIN that HumbleBundle is compromised, as we don't know if it was using the Cloudfront proxy service. The only way to know that is to get a response from HB people if Cloudfront proxy service was used by them.

Then again, it's probably safest to change the password until it's known for sure. There could be more gaming related sites compromised, but I haven't had time to go through the whole list, yet.

Other notable possibly compromised sites:

  • random.org
  • pastebin.com
  • minecraftforum.net
  • dota2lounge.com
  • discordapp.com
  • 4chan.org
  • bundlestars.com
  • cdkeys.com
  • coinplay.io
  • dailyindiegame.com
  • funstockdigital.co.uk
  • gk4.me
  • greenmangaming.com
  • indiegamestand.com
  • instant-gaming.com
  • mmoga.de
  • opiumpulses.com
  • onlinekeystore.com
  • primagames.com
  • tremorgames.com
  • qwertee.com
  • mozilla.org
  • change.org
  • curse.com
  • destructoid.com
  • patreon.com
  • funnyjunk.com
  • gamefront.com
  • mmo-champion.com/content
  • moddb.com
  • movieweb.com
  • newgrounds.com
  • nexusmods.com/games
7 years ago*

Comment has been collapsed.

Deleted

This comment was deleted 1 month ago.

7 years ago
Permalink

Comment has been collapsed.

Oh, Discord too, good catch.

7 years ago
Permalink

Comment has been collapsed.

additionally, to emphasize common sites including potential payment methods or active balances in the list:above

bundlestars.com
greenmangaming.com
tremorgames.com
instant-gaming.com
cdkeys.com
dailyindiegame.com
coinplay.io
patreon.com
funstockdigital

7 years ago
Permalink

Comment has been collapsed.

I changed it yesterday, wow

7 years ago
Permalink

Comment has been collapsed.

You should be safe then, the leak was patched after 18th February.

7 years ago
Permalink

Comment has been collapsed.

i hate the modern internet. all was better around 2000-05 ;P
heard it first in the morning from reddit.

7 years ago
Permalink

Comment has been collapsed.

Ehmmm back in 2000 most webs didn't even use https lol

7 years ago
Permalink

Comment has been collapsed.

(Changed reddit initially cause of OW discord message) Nevermind.. was not on the list, thanks overwatch discord for bugging me.

7 years ago
Permalink

Comment has been collapsed.

Thanks, added to the list.

7 years ago
Permalink

Comment has been collapsed.

I updated the posting, please have a look

7 years ago
Permalink

Comment has been collapsed.

Updated again, thanks

7 years ago*
Permalink

Comment has been collapsed.

It's cus of stuff like this I started to make unique passwords for everything and use Lastpass.

7 years ago
Permalink

Comment has been collapsed.

wait for a lastpass breach 8)

7 years ago
Permalink

Comment has been collapsed.

Noooo!! Actually Lastpass did get leaked a bit before but everything's encrypted with your own unique key so it was impossible to have been taken advantage of before everyone changed their passwords or unique key within their lifetime.

7 years ago
Permalink

Comment has been collapsed.

yeah I vaguely remember reading about Lastpast breach, I remember it was very well documented by them, which was impressive.
I wont' go as far as saying it's "impossible", but I'm sure it's infeasibly difficult.

7 years ago
Permalink

Comment has been collapsed.

Brute forcing a 128-bit AES currently takes 13 billion years (Last pass is using 256-bit AES). Unless there are some significant technological advances( I wish!) it does seem slightly impossible :D And they have to reverse hash everything first so you must be a specific target worth all that time and effort!

7 years ago*
Permalink

Comment has been collapsed.

Impossible by definition means there is no way to do solve given infinite amount of time and resource. I'm gonna sound like a smartass jerk but technically speaking it still count as infeasibly difficult but not impossible :P practically impossible, sure. Not theoretically so. :PP

7 years ago
Permalink

Comment has been collapsed.

let's call it impractical then

7 years ago
Permalink

Comment has been collapsed.

Oh well crap. Thanks for the heads up!

7 years ago
Permalink

Comment has been collapsed.

Thanks for the psa

7 years ago
Permalink

Comment has been collapsed.

Thanks for the heads up

7 years ago
Permalink

Comment has been collapsed.

What the fuck? This looks like some serious shit.

7 years ago
Permalink

Comment has been collapsed.

Updated, thanks.

7 years ago
Permalink

Comment has been collapsed.

Thanks for the heads up, changed my password immediately. Good thing I'm using long, complicated one-time passwords for everything important.

7 years ago
Permalink

Comment has been collapsed.

For the most important stuff maybe setting up two-factor authentication would be better nowadays.

7 years ago
Permalink

Comment has been collapsed.

That would require me spreading my phone number all over the internet and I consider this a sensitive private information which is none of anyone's business.
Seriously, we're all providing our data way too freely anyways as if it was nothing. I'm concerned about that.

7 years ago
Permalink

Comment has been collapsed.

Must be nice living in the EU were countries actually give a fuck about those issues.
In some countries like mine getting personal info about other people is so easy than trying to protect your privacy by limiting the spread of things like your phone number is pointless. Here, if you're over the age of 18 that means that you are forced to vote, and that means that your personal info is automatically added to a database that tends to be massively leaked every time that the elections are happening. All you need to do is ask one of the persons in charge of a voting table (most are random volunteers) to lend you the CD with the database for a few minutes and make a copy, its copy protection is laughable.
I learned about this because my family is full of lawyers and they tend to have a bunch of these databases even tho they're not supposed to.

7 years ago
Permalink

Comment has been collapsed.

That's why you only set up 2-factor auth for just the most important stuff, so your phone isn't everywhere over the internet, but just stored on the important ones...

7 years ago
Permalink

Comment has been collapsed.

Deleted

This comment was deleted 3 years ago.

7 years ago
Permalink

Comment has been collapsed.

If you want just something to worry, you can slightly start here: :P

7 years ago
Permalink

Comment has been collapsed.

sure, sleep well...when the session tokens were exposed, and not every website with 2FA use session/location fingerprinting... or when humble key site were exposed (but they have 2fa! ..oh wait....)
risk in this case is minimal, but it is not 0

7 years ago
Permalink

Comment has been collapsed.

Is Humble Bundle indeed using CloudFlare service? It looks to me they are hosting their server on Google Hosts.

www.humblebundle.com

A Records
74.125.34.32

Canonical Names
ghs-svc-https-c32.ghs-ssl.googlehosted.com

7 years ago
Permalink

Comment has been collapsed.

I'm more worried about mozilla.org getting leaked, my mozilla account knows all my passwords. Good think that I activate two steps verification in everything I can. I hope I never lose my phone.

7 years ago
Permalink

Comment has been collapsed.

Thanks for the PSA. I was already using 2-factor authentication with the Authy app they use.

7 years ago*
Permalink

Comment has been collapsed.

Gah, Authy app is incomprehensible... seriously, could they make it more complicated?

7 years ago
Permalink

Comment has been collapsed.

Well I had no problem setting it up.

7 years ago
Permalink

Comment has been collapsed.

to be fair, it was late last night - and I got confused at the bar code scanner piece and just gave up...

7 years ago
Permalink

Comment has been collapsed.

I have no bloody idea what should I do after allowing it on HB's side then installing the app. Like bar code scanner, QR code? Where, from what? What code should I enter that weren't mentioned anywhere before? o.O
edit: apparently...nothing needed? same phone number in the app and HB seems to do the job. Or having more than an hour internet dowtime helped it to collect itself :D

7 years ago
Permalink

Comment has been collapsed.

I got a text message with the code to enter but couldn't find where to actually enter the code- just that QR code piece which confused the heck out of me...

7 years ago
Permalink

Comment has been collapsed.

Not a single link about what happened?
https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/
It seems the sensible data has been filtering for months

EDIT: Oh the web with the list also had info about what happened. My bad, I didn't check it before posting >_<

7 years ago*
Permalink

Comment has been collapsed.

4,287,625 possibly affected domains.....

Well, my next few days are shot trying to figure out which sites I use aren't compromised.

7 years ago
Permalink

Comment has been collapsed.

Looks like I may have to change my password on a few things... Too lazy to do so atm though.

7 years ago
Permalink

Comment has been collapsed.

Does this mean that some of the giftlinks might be leaked along with the passwords on Humble Bundle, also all unclaimed keys from Bundle Stars / Indiegala? >.O

7 years ago
Permalink

Comment has been collapsed.

That's unlikely, but someone could get access to your account and then steal your keys.

7 years ago
Permalink

Comment has been collapsed.

They can't access my account on Humble Bundle nor Indiegala, since it's 2-way-authentication but Bundle Stars... That's vulnerable as hell. Oh well, lets just hope that the Google researcher was the only guy who managed to find out about this thing before they started fixing it. ^_^

7 years ago
Permalink

Comment has been collapsed.

If they picked up session tokens, 2FA is worthless. Don't be so confident.

7 years ago
Permalink

Comment has been collapsed.

Well, I guess it doesn't concern me since this leakage has been going on for five months already, and just yesterday came into the light. And I think average Steam/bundle site user won't know how to or be able to find any certain information from these websites ;)

Edit: Just to add, it's not worth the risk of stealing the confidential information of someone for Steam keys, since I can easily ask the support on bundle sites to contact developers and revoke the used keys. If so said thief would sell them on G2A in large numbers from multiple people I imagine his Paypal / bank account being investigated after multiple fraud declarations from users. Not worth it just for Steam keys.

But some information like emails and drawings for certain eyes only would be bigger leak. This way one could invest his money into some company because he knew something that others didn't and make legit profit out of it. And since some people use same password on multiple websites / emails it'd mean that same user could use same password on his / hers email = even more information about that person. I guess that's why it's a biggy. >.<

7 years ago*
Permalink

Comment has been collapsed.

You fully underestimate what people will do with leaked login information. If it were just access to Humble, then you'd have to worry about purchases using stored payment information. But being that it leaked plaintext login credentials, now they have something to test against other services in case you use recurring information. Let me give an example - since the Yahoo leak of December (yes, ANOTHER), I have had the following accounts attempted by thieves:

  • Perfect World
  • Battle.net
  • eBay (compromised - secret questions used, reclaimed)
  • Playstation Network (compromised - secret questions used, reclaimed)
  • Gamestop.com
  • Armor Games
  • Target.com
  • Humble Bundle
  • BundleStars
  • PayPal
  • Facebook
  • Steam
  • Xbox Live
  • Kongregate
  • Amazon.com
  • DMV California
  • Netflix (compromised - secret questions used, reclaimed)
  • Hulu

All of this happened within the span of approximately one month, from January 15th (Perfect World) to February 22nd (Armor Games). Thankfully my passes don't match and MOST of the services demand e-mail link verification (eBay, PSN, and Netflix DO NOT if secret questions are validated).

All because they got one e-mail/pass set, plus secret questions which most people match up across services unintentionally as the secret question pool tends to match between services (mother's maiden name, first school, etc.) and don't trigger reset e-mails. It doesn't mater how insignificant an account is - if it can be compromised, it can be sold to someone unable to open an account for whatever reason. Any security leak, no matter how small, is a "biggie".

7 years ago
Permalink

Comment has been collapsed.

Yeah well, Yahoo leak would be comparable with my gmail. If my gmail somehow got hacked, I'd lose literally everything: Paypal, Netflix, Steam, every social media account, some online MMOs, every online store I'm signed up to. So that would be biggie, but something like Humble Bundle, password saving website that I don't use, some other unknown (to me) websites. I don't think it's as important to me as maybe to someone. Not gonna lose my sleep because of it. And as I said, this has been going on for 5 months already so most likely my credentials are safe.

Usually when hackers post huge lists of 100.000 or 200.000 logins with passwords and other information it's fast and furious who will get the most of the information, in this case no one even knew about it before Google researcher let us knew. :p

These cyber loop holes will always be there and it's just good that Google goodguys find them first, that way any cheating date site and Yahoos can keep their coolness. ^_^

7 years ago
Permalink

Comment has been collapsed.

Cloudflare incident report

TL:DR Certain conditions would cause broken webpages from servers using Cloudflare's services to trigger a buffer overflow in Cloudflare's internal parsing code resulting in a memory leak potentially containing sensitive data from any other random website also using Cloudflare's service.
How worried should you be? Most likely, not more worried than usual as the probability of both having your credentials leaked and someone actually noticing is on par with your odds of winning 50 public giveaways on the same day, give or take a few..

7 years ago
Permalink

Comment has been collapsed.

Closed 4 years ago by Slowacki.