Advertisement
  1. Bizarre News

1,464 Western Australian government officials used 'Password123' as their password. But don't smirk.

(Tero Vesalainen/Dreamstime/TNS)
Published Aug. 23, 2018

Somewhere in Western Australia, a government IT employee is probably laughing or crying or pulling their hair out, or maybe all of the above. A security audit of the Western Australian government released this week by the state's auditor general found that 26 percent of its officials had weak, common passwords — including more than 5,000 including the word "password" out of 234,000 in 17 government agencies.

The legions of lazy passwords were exactly what you — or a thrilled hacker — would expect: 1,464 people went for "Password123" and 813 used "password1." Nearly 200 individuals simply used "password," perhaps never changing it to begin with. Almost 13,000 used variations of the date and season, and almost 7,000 included versions of "123."

The laxness might be amusing, but the potential consequences definitely aren't. Many of these accounts are used to access important information and vital government systems, according to the report — and several can do so remotely, with no additional vetting or credentials. Auditors were able to access one agency's network, with full system-administrator privileges, by guessing the password: "Summer123." Overall, the report found that most agencies didn't help users store their information safely and securely; this meant some employees were storing their passwords in Word documents or spreadsheets.

"After repeatedly raising password risks with agencies, it is unacceptable that people are still using password123 and abcd1234 to access critical agency systems and information," Auditor General Caroline Spencer said, according to reporting from Western Australia Today.

In the wake of the report, the government has agreed to step up its security game. It's developing practices to help employees store their password information more securely. The new Office of Digital government will house a cybersecurity team dedicated to improving security practices governmentwide.

Recent years have seen several huge data breaches at major companies. In 2013, an email account breach at Yahoo exposed the data of 3 billion users. In a 2016 breach at the FriendFinder Network - which included adult content and casual hookup sites like FriendFinder, Penthouse.com and Stripshow.com — hackers accessed 20 years of data, including passwords and personal information. In 2017, a breach at major U.S. credit bureau Equifax exposed the personal information, including Social Security Numbers, birth dates, addresses and drivers' license numbers, of 143 million consumers.

Weak passwords are easy target for hackers. Last year, Verizon's annual Data Breach Investigations Report, which looked at hacking incidents at 65 companies, found that "81 percent of hacking-related breaches leveraged stolen and/or weak passwords." This number has gone up from 50 percent in the past three years.

This isn't a problem specific to the Western Australian government. In 2014, a U.S. Senate cybersecurity report found that several major breaches in important government agencies, including the Department of Homeland Security, the Internal Revenue Service and the Nuclear Regulatory Commission.

"Data on the nation's weakest dams, including those which could kill Americans if they failed, were stolen by a malicious intruder," the report said. "Nuclear plants' confidential cybersecurity plans have been left unprotected. Blueprints for the technology undergirding the New York Stock Exchange were exposed to hackers."

An analysis of these agencies' cybersecurity practices found tendencies mirroring the Western Australian practices: use of "password" was common for sensitive accounts and databases, as was poorly stored and guarded credential information.

Even unskilled hackers can use resources like lists of common passwords or publicly available personal information to break into accounts. The Romanian hacker Marcel Lehel Lazar, known online as "Guccifer," who first revealed Hillary Clinton was using a private email address as secretary of state, was far from a hacking expert. He told the New York Times he broke into more than 100 accounts, including several high-profile figures like Clinton's adviser Sidney Blumenthal and former Secretary of State Colin Powell, merely by guessing based on their personal information from their Wikipedia pages. (A fun fact: Guccifer was also responsible for leaking former President George W. Bush's paintings.)

The traditional guidelines for strong passwords — making them long and complicated, including symbols and a mix of upper and lowercase letters, changing them regularly — were actually making it easier for hackers, Paul Grassi of the National Institute of Standards and Technology told NPR last June. The organization's current guidelines for good passwords dovetails sharply with past wisdom: Passwords should be simple, long and easy to remember. It suggests using normal English words and phrases that are easy for users, but tougher on hackers.

To keep accounts secure, pick something that's lengthy and memorable; if you change it, switch more than a single letter or digit. And for heaven's sake, don't use the word "password."

ALSO IN THIS SECTION

  1. Tom Rice, a 98-year-old American WWII veteran, front left, approaches the landing zone during a tandem parachute jump near Groesbeek, Netherlands, Thursday, Sept. 19, 2019, as part of commemorations marking the 75th anniversary of Operation Market Garden. Rice jumped with the U.S. Army's 101st Airborne Division in Normandy, landing safely despite catching himself on the exit and a bullet striking his parachute. PETER DEJONG  |  AP
    The American who caused a sensation in June by parachuting into Normandy for the 75th anniversary of the 1944 D-Day landings was at it again on Thursday.
  2. William Mendenhall, 43, is facing charges of aggravated battery and aggravated assault against a pregnant woman. Pasco County Sheriff's Office
    William Mendenhall, 43, faces charges of aggravated domestic battery and assault against a pregnant woman.
  3. Two pedestrians in the lobby of the 40-story luxury residence in Westchester County were also hurt. [Photo from video/Associated Press]
    The driver was injured and was being questioned by police.
  4. A still image from Vice's "WTFlorida?!" episode on Paul Flart. Courtesy of Vice
    Short documentaries on Floridians like hurricane headbanger Lane Pittman and Polk security guard “Paul Flart” expand their stories.
  5. This photo of Patti Baumgartner, a Montana grandmother who wanted to slow down speeding drivers, went viral. Noah Pesola
    The photo of her sitting on the side of a road went viral.
  6. No owner came forward, so the plan was to bring it to an animal sanctuary. Orange County NC Gov/Twitter
    The emu was dubbed Eno and became a social media star, with people posting “Where’s Eno?” updates as the bird kept getting away.
  7. Robert Lee “Bo” Benac III, now 30, is the last man sentenced in the infamous 2017 case of the boaters dragging a shark that went viral. The video shows a shark being dragged behind a boat on a rope as men laugh each time its body slams the water. [Hillsborough County Sheriff's Office]
    The 2017 video of men dragging a shark using a boat went viral. Now a second man will spend 10 days in jail because of it.
  8. Alyssa Hatcher. Lake County Sheriff's Office
    Alyssa Hatcher, 17, was arrested in Lake County Tuesday.
  9. The student said they brought Jango to school because they didn’t want him to be sad home alone all day. Bay District Schools/Facebook
    The student said they brought Jango to school because they didn’t want him to be sad home alone all day.
  10. Gavin Crim was arrested after deputies said he broke into a Safety Harbor home, cooked food and told the home's owner to go back to bed. Facebook/Pinellas County Sheriff's Office
    The 19-year-old Marine was drunk at the time, deputies said.
Advertisement
Advertisement
Advertisement