Login details of more than 36 million Poshmark accounts are available for sale in the cybercrime underground .

Earlier in August, Poshmark, a social commerce marketplace where people in the United States can buy and sell new or used clothing, shoes, and accessories, disclosed a data breach that took place in May 2018.

The company discovered unauthorized access to its servers, the intruders stole personal information of the users, including usernames , hashed passwords, first and last names, gender information, and city of residenc.

Now login details for customers of Poshmark are circulating in clear text online. Data breach platform Have I Been Pwned, revealed that login details of more than 36 million Poshmark customers were acquired by an unauthorized party.

“In mid-2018, social commerce marketplace Poshmark suffered a data breach that exposed 36M user accounts. The compromised data included email addresses, names, usernames , genders, locations and passwords stored as bcrypt hashes. The data was provided to HIBP by a source who requested it be attributed to “JimScott.Sec@protonmail.com”.” reported HIBP.

Jim Scott, the person who provided the Poshmark data to Have I Been Pwned, revealed that the information was available for sale on the dark web $750.

The data include email addresses, names, usernames , genders, locations and passwords stored as bcrypt hashes.

When the company disclosed the incident on August 1, it revealed that the passwords were hashed using the bcrypt algorithm that is considered secure.

“We do not believe user passwords were compromised during this incident because we use one-way encrypted passwords salted uniquely per user, making it nearly impossible to use these passwords to access an account.” declared the company.

Anyway, password hashed with the bcrypt algorithm can still be cracked, though, even if each string is scrambled with unique salt data.

Now Scott told BleepingComputer that a set of one million cracked Poshmark accounts is circulating online.

The price should be higher than the initial one because passwords have been decrypted and could be immediately used in credential stuffing attacks.

Users should change the passwords for affected accounts and for any other service that shares the same login credentials.

Pierluigi Paganini

(SecurityAffairs – SORM, surveillance)

Share this...

Linkedin Reddit Pinterest

Share On