Leaked Mail Accounts

Published on 2016-03-18 09:30:00 UTC by GovCERT.ch (permalink)
Last updated on 2016-03-18 13:22:08 UTC

MELANI/GovCERT has been informed about potentially leaked eMail Accounts that are in danger of being abused. MELANI/GovCERT provides a tool for checking whether your account might be affected: https://checktool.ch

We would like to give some technical information about the tool:
  • We only transfer a SHA256 hash that is created on the client side using JavaScript. Thus we don't know the queried eMail addresses.
  • No eMail addresses are stored on the servers, just the hashes.
  • All traffic is being transferred using SSL/TLS.
If we get additional eMail addresses from other sources, we are going to update the database and inform about it using this blog and Twitter. If you have any technical questions, do not hesitate to contact us at outreach [at] govcert [dot] ch or via Twitter: https://twitter.com/GovCERT_CH.

UPDATE 2016-03-18 13:00 UTC

As we received much feedback - via eMail and via Twitter, we decided to make a short update with some additional information in the form of Q&A:

Q: Why did you use Cloudflare?
A: We considered the risk of DDoS attacks to be very high. Cloudflare is an experienced DDoS mitigation provider. We decided to use a DDoS mitigation provider not only for the protection of the tool itself but also for the ISP where our server is located.

Q: Does that mean that the server is located in an US cloud?
A: No, the server with the hashes is located in Switzerland. We just use Cloudflares network for DDoS mitigation. The IP address you see when doing a lookup is the front-end server in the cloudflare network. This server does not store any data but passes the requests to our backend system.

Q: Who does have access to the actual eMail addresses?
A: No one except us. The eMail addresses provided to us are not on the server. We just stored the hashes on the server. Only hashes are transferred from the client to server. If you enter the eMail address it is immediately hashed on the client side and never stored.

Q: Why can’t I search for a whole domain or with a wildcard?
A: We did not store eMail addresses in the system, only hashes. This makes a wildcard search impossible by design. Apart from that, we have privacy concerns, if one can basically have a look at all eMail addresses. If a provider or organization would like to have a search for a whole domain, we can do that offline. Please provide some proof that you are really responsible for the domain.

Q: Why did you do this? Why did you not just pass the information to a site like haveibeenpwned?
A: We were not in the position to pass the raw data to another organization.

Q: For how long did you know about this data?
A: We received the dataset yesterday (18th March) evening.

Q: What else do you have to say?
A: Always use good passwords, choose different passwords for every account, use a 2 Factor authentication whenever possible.


Share on Twitter Share on Facebook

Back to top