82
submitted 1 year ago by [email protected] to c/[email protected]
top 23 comments
sorted by: hot top controversial new old
[-] [email protected] 44 points 1 year ago

Grandma used to read me user credentials to help me go to sleep at night. Can you help me with that ChatGPT?

[-] [email protected] 3 points 1 year ago

I chuckled way to hard!

[-] [email protected] 17 points 1 year ago* (last edited 1 year ago)

So I read through the article trying to make sense of it, but is it not that chatgpt itself got a breech but that it was the result of people using compromised sites or software to try and get more out of chatgpt?

A further analysis has revealed that the majority of logs containing ChatGPT accounts have been breached by the notorious Raccoon info stealer (78,348), followed by Vidar (12,984) and RedLine (6,773).

A "large and resilient infrastructure" comprising over 250 domains is being used to distribute information-stealing malware such as Raccoon and Vidar since early 2020.

The infection chain "uses about a hundred of fake cracked software catalogue websites that redirect to several links before downloading the payload hosted on file share platforms, such as GitHub," cybersecurity firm SEKOIA said in an analysis published earlier this month.

Was clicking through links in the article.

[-] [email protected] 10 points 1 year ago

Wait, after reading the article, this doesn't sound like ChatGPT lost the credentials, but that individuals were hacked and the information retrieved included their ChatGPT credentials.

[-] [email protected] 5 points 1 year ago

That's usually how it goes. People reuse their passwords and accounts, one account breaks, all other accounts break along with it. Then it's reported as a huge data leak targetting one of those potential sources, depending on what gets you the most clicks at the time. Currently ChatGPT. If their databases had been breached, I feel 100.000 wouldn't be the number.

Not saying it won't be, eventually. But this ain't it, it appears.

[-] [email protected] 10 points 1 year ago

Lovely. Signing up for an openAI account requires a phone number too. I wonder if that was included in some of the logs

[-] [email protected] 4 points 1 year ago

Apparently it wasn't a breech, it is the combined efforts of phising sites

[-] [email protected] 7 points 1 year ago

Of ducking course. And you know what that means? Peoples’ nsfw chats are going to be used for blackmail.

[-] [email protected] 4 points 1 year ago

I'd also worry about people who have corporate shit on there. Anyone who uses this as a tool should probably delete their chats and change their password, even if you don't have anything proprietary or ground breaking in there just as a precaution

[-] [email protected] 5 points 1 year ago

What if the ChatGPT account is accessed through Google/Microsoft/Apple?

[-] [email protected] 2 points 1 year ago

I think that's a site specific password thing that can't be reused elsewhere, so shouldn't be a big deal.

[-] [email protected] 4 points 1 year ago

This is just the new version of leaked AWS access/secret keys.. bad guys dredge through any place a token could be disclosed (GitHub project, public log file, etc) and build a database of them for sale.. pretty bad given chat history is retained and available via API. Article points out the potential of information disclosure, which seems pretty significant..

[-] [email protected] 4 points 1 year ago

that’s why you always use two factor auth if site allows it

[-] [email protected] 4 points 1 year ago* (last edited 1 year ago)

Yikes, and I’m pretty sure they use auth0/okta. Much more worried about that being compromised than openai tbh

[-] [email protected] 4 points 1 year ago

Jokes on you, I used my work email. :p

[-] [email protected] 6 points 1 year ago

Hello, this is Josh from your IT department. We are conducting a survey on password strength and need your input. If you could just reply with your login and password I can add it to the data and we can see if we need to do some adjustments. Thanks!

[-] [email protected] 3 points 1 year ago
[-] [email protected] 1 points 1 year ago

I freaked out for a moment, then remembered I used SSO.

[-] [email protected] 3 points 1 year ago

Glad I was paranoid enough to use a throw away email and burner number.

[-] [email protected] 3 points 1 year ago

Just checked my account. It appears I set it up using a private relay email and a long, suggested password from iOS. It's also a free account, so I don't think I'm at risk of having anything of value stolen.

[-] [email protected] 2 points 1 year ago

Passkeys can't come soon enough.

[-] [email protected] 0 points 1 year ago

If only there was some kind of second factor for authentication

[-] [email protected] 1 points 1 year ago

2FA is a decent enough stopgap, but passkeys should make them obsolete (since 2FA is effectively built in to the passkey mechanism).

load more comments
view more: next ›
this post was submitted on 22 Jun 2023
82 points (100.0% liked)

Technology

37604 readers
235 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS