Breached accounts have been raining down like confetti lately.
Maybe you practice good security hygiene. Your passwords are difficult to guess, and you never, ever reuse them on different sites.
But even that’s not enough to save us every time.
Some sites force us into making stupid-short passwords, and, to add insult to injured password entropy, they won’t let us use special characters.
Now, there’s a tool to comb through that enormous cache to sniff out reused passwords.
It’s called Shard, and it comes to us (or is inflicted upon us, depending on who does what with this command-line tool) courtesy of creator Philip O’Keefe.
O’Keefe told Ars Technica that Shard is designed to let people test whether a password they use for one site is also in use on Facebook, LinkedIn, Reddit, Twitter, or Instagram.
O’Keefe developed the tool after he himself found that one of his randomly generated, 8-character passwords was among more than 177 million LinkedIn passwords leaked in May.
Randomly generated it well might have been, but it was also regrettably and thoroughly reused, he told Ars:
I used that password as a general password for many services. It was a pain to remember which sites it was shared and to change them all. I use a password manager now.
If he’d asked us, we’d have told him why password reuse is such a bad idea.
We know that cybercrooks use breached credentials to see if they work on a variety of third-party sites, be it Facebook, Netflix or many others – including online banking sites.
If they do find customer credentials that match breached logins, they force users to change those reused passwords.
Be that as it may, O’Keefe’s tool is designed to do good, as in, helping end users to find out where else their passwords have been used.
But oh, it could do so much bad. As Ars’ Dan Goodin notes, you can see how easily it could be turned into a legitimate-credential sniffer by crooks. As it is, the tool will check an unlimited number of leaked credentials to see if they’re used on other sites.
For example, it would be a cinch to tweak Shard’s code to have it check for credentials that might work to log into financial sites, such as online banking.
With a bit more tweaking, the tool could be programmed to swap in leet speak, or to come up with variations of passwords that users increment in easily guessable ways: say, “p@$$w0rd11” on one site and “p@$$w0rd22” on another, to borrow Goodin’s example.
It could well be that crooks already have tools that automatically try the locks on sites, using botnets, and inserting all the keys that have turned up in data breaches, one after another, until they find a fit.
At any rate, maybe it’s not such a good idea to enter your passwords into some tool.
To quote Ars reader Lyme:
I ran all my passwords through the tool, and none of them … ?were? in it.. oh snap.
Another Ars reader, lewax00, noted that we have other tools to check whether our passwords are in the cache of stolen logins. One such is have I been pwned.
The nice thing about that look-up list? You don’t have to enter your precious passwords. Rather, you enter your account name/email.
Oh, snap, indeed!