This Throwback Thursday, we revisit the 2013 Adobe Data Breach — a landmark incident that exposed the sensitive information of millions of users and highlighted the catastrophic risks of intellectual property theft. The breach served as a sobering reminder of the vulnerabilities facing major software companies and the cascading consequences of compromised source code. It also became a major driver for adopting modern security practices like Zero Trust and Software Bill of Materials (SBOM) to protect against similar threats.
A decade later, the ripple effects of this breach are still felt today, mainly due to the inclusion of breached data in subsequent aggregate data dumps. Let’s explore the details of the breach, its lasting impact, and the lessons it continues to teach the cybersecurity world.
In October 2013, Adobe announced that they were victim of a massive data breach. The company initially estimated that 2.9 million customers' information had been stolen. A couple of days later, Adobe and the world came to learn that the breach had impacted a staggering 38 million users. The original 2.9 million users impacted were those with both their credentials and payment information stolen; the remaining 35 million users had only been impacted by losing their username and hashed password; still not great, but not as bad.
User data impacted include:
Usernames (email addresses)
Hashed passwords
Credit card information including encrypted details
As if that wasn't bad enough, Adobe included in their reports that source code for Photoshop, Acrobat, Reader and Cold Fusion has also been stolen.
Exposure of Source Code
The theft of Adobe’s source code was a critical blow. Source code is the blueprint for software, and when it falls into the wrong hands, attackers can analyze it for vulnerabilities and develop targeted exploits. This raised concerns that cybercriminals could craft more effective malware or find zero-day vulnerabilities in Adobe’s widely-used products.
Customer Data Compromised
The breach exposed encrypted passwords and customer payment data. While the passwords were encrypted, Adobe's encryption method was unsalted, making it easier for attackers to crack weak passwords through brute-force techniques. As a result, millions of Adobe customers were urged to change their passwords immediately.
Widespread Impact
The potential for further attacks leveraging the stolen data was significant given the ubiquity of Adobe products in creative, business, and government sectors. Organizations relying on Adobe software had to brace for possible supply chain attacks and prepare for exploits targeting Adobe’s compromised applications.
The effects of the 2013 Adobe breach continue to linger due to the compromised data appearing in subsequent massive data dumps. These dumps, often referred to as "combo lists," aggregate stolen credentials from multiple breaches, providing attackers with a goldmine of information for credential stuffing attacks and identity theft.
In the years following the breach, email addresses and passwords stolen from Adobe users have been included in large-scale leaks such as "Collection #1" and other dark web databases. These dumps are frequently used by cybercriminals to:
If you’ve used Adobe products and haven’t changed your password since the breach, you could still be at risk.
Check If You Were Affected
You can find out if your email or password was part of this breach using services like Have I Been Pwned. This website allows you to enter your email and check if it appears in known data breaches. If your information was part of the Adobe or any other major breach, change your passwords immediately and consider enabling multi-factor authentication (MFA) for added security.
Implement Strict Access Controls: Limit who can access sensitive source code and customer data. Use role-based access controls (RBAC) and monitor for unauthorized activity.
Strengthen Password Policies: Enforce the use of complex passwords and ensure they are stored with salting and hashing to make decryption more difficult.
Secure Your Supply Chain: Regularly assess third-party software and vendors for vulnerabilities. Ensure updates and patches are applied promptly to mitigate potential risks.
Adopt Zero Trust Architecture: Embrace a Zero Trust approach to minimize the risk of lateral movement within your network, verifying each access request continuously.
The Adobe data breach remains a cautionary tale for software companies and organizations everywhere. Protect your data, secure your code, adopt Zero Trust and SBOMs, and secure the advantage.
KrebsOnSecurity. (2013, October 3). Adobe to Announce Source Code, Customer Data Breach. krebsonsecurity.com
The Verge. (2013, October 29). Adobe hack much worse than reported, hits 38 million passwords and Photoshop source code. theverge.com
The BBC. (2013, October 30). Adobe hack: At least 38 million accounts breached. bbc.com
Have I Been Pwned. Check if Your Email or Password Has Been Compromised. haveibeenpwned.com
Address:
44 Monticello Ave St 1802
PMB 585923
Norfolk, VA 23510-2670 USA