In July 2015, the password management company revealed that it had been the victim of a cyberattack, compromising email addresses, password reminders, server per user salts and authentication hashes of 7 million users.
According to security commentators, one of the drawbacks of the hashing algorithm PBKDF2-SHA256 employed by the company was that it was not designed to protect passwords. Salts are really not useful for preventing dictionary attacks or brute force attacks.
Want to discuss this case? You can purchase a 30 minute conference call with our analysts to discuss this case and the implications it has for your organisation. Just select the time and date that works for you:
We've done the analysis so you can make the decisions