Page MenuHomePhabricator

Thousands of failed login attempts (wrong password)
Closed, ResolvedPublic

Description

The number of failed login attempts due to a wrong password has increased abnormally.

The authentication metrics suggests that bots are trying to brute-force passwords. Several contributors receive the following notification: "There has been a failed attempt to log in to your account from a new device. Please make sure your account has a strong password".

Public version of private dupe T193762

Longer explanation for community members below - also on Wikimedia-l
Sysops and other users with advanced user rights can enable two-factor authentication.

Event Timeline

There are a very large number of changes, so older changes are hidden. Show Older Changes

On Marathi Wikipedia too we have got users complaining that there are notification of Failed Login attempts.

Users affected list can be found at https://mr.wikipedia.org/wiki/विकिपीडिया:मे_२०१८_सजगता_संदेश

Is there any matters to worry?.

Regards
Tiven2240
Admin MrWp

On Marathi Wikipedia too we have got users complaining that there are notification of Failed Login attempts.

Users affected list can be found at https://mr.wikipedia.org/wiki/विकिपीडिया:मे_२०१८_सजगता_संदेश

Is there any matters to worry?.

Regards
Tiven2240
Admin MrWp

See https://lists.wikimedia.org/pipermail/wikimedia-l/2018-May/090145.html . You may recommend that all users with advanced user rights at your wiki enable further security steps such as https://meta.wikimedia.org/wiki/Help:Two-factor_authentication .

Is there any matters to worry?.

You should generally not worry about the current situation. We are monitoring closely. As always please ensure you are using a strong password.

Since the crack started, the CAPTCHA error rate was high.
However, at about 5/3 18:30 UTC, the CAPTCHA error rate suddenly falls (from almost 100% to a normal rate).
Guess: the cracker find a way to bypass the CAPTCHA check (e.g. proxies, fake IP's).

We have a pretty good idea why that happened. Rest assured, the attacker did not find a way to bypass captchas.

Since the crack started, the CAPTCHA error rate was high.
However, at about 5/3 18:30 UTC, the CAPTCHA error rate suddenly falls (from almost 100% to a normal rate).
Guess: the cracker find a way to bypass the CAPTCHA check (e.g. proxies, fake IP's).

Or they gave up (temporarily)? Don't jump to conclusions so quickly :)

For the record: also report on fawiki (and apparently, the attack was not through fawiki itself, but through enwiki).

Since the crack started, the CAPTCHA error rate was high.
However, at about 5/3 18:30 UTC, the CAPTCHA error rate suddenly falls (from almost 100% to a normal rate).
Guess: the cracker find a way to bypass the CAPTCHA check (e.g. proxies, fake IP's).

Or they gave up (temporarily)? Don't jump to conclusions so quickly :)

No, it was something I specifically did at about 18:20 that would result in a change to the stats. (Nothing to see here, move along ;)

This comment was removed by Dvorapa.
Pine subscribed.

In addition to technical security mitigation and investigation, I hope that WMF Legal is involved in this matter, perhaps on one or more restricted Phab task(s). Feel free to revert my tagging of WMF-Legal on this task if someone with relevant knowledge thinks that the tag is unnecessary.

Can I please be added to T193762 ? Thanks.

You carnt be added unless you have signed the nda.

Can I please be added to T193762 ? Thanks.

Sorry, but for the duration of the incident we are limiting the bug to people in the security group, and won't be adding others unless they have a "need to know"

Hi everyone. While the attacker continues to try and login, we are currently blocking his/her login attempts. At this time, there is no need to panic or do anything. We of course encourage all users to always use a strong password.

2FA is currently available for "Edit filter manager" but not "Edit filter helper" (which can view the filters on enwiki). Would it be prudent to enable access to 2FA for that group? What about "Account Creator"?

Established users that are not in user groups that would let them use 2FA by default can request at https://meta.wikimedia.org/wiki/Steward_requests/Global_permissions#Requests_for_other_global_permissions to be added to the global oathauth-tester group so they can enable the feature on their accounts; provided that they've read and understood https://meta.wikimedia.org/wiki/Help:Two-factor_authentication specially with regards to the recovery tokens (scratch codes).

Arkanosis renamed this task from uodaaaaaaa to Thousands of failed login attempts (wrong password).Jul 1 2018, 10:03 AM
Arkanosis updated the task description. (Show Details)
Arkanosis added subscribers: MarcoAurelio, Huji, Aklapper.

Is there anything actionable in this task? If not, it can probably should be closed and the generic suggestions about login hardening moved to a generic tracking task.

@JBennett: No updates for ten months. What is left to do in this task? Should it be closed or have a lower priority nowadays? Same question for the subtask...

sbassett closed subtask Restricted Task as Resolved.Aug 13 2019, 10:21 PM
Jcross claimed this task.
Jcross subscribed.

As nothing additional is required on this task, the Security Team is resolving. Please feel free to submit a new ticket should additional / further action be required.