Security Experts:

Connect with us

Hi, what are you looking for?



Reddit Counters Account Takeover Surge with Password Resets

In the light of several recent data breaches and account compromises, Reddit has decided to kick off a service-wide hunt for account takeovers and is prompting users to reset their passwords when such an issue is detected.

In the light of several recent data breaches and account compromises, Reddit has decided to kick off a service-wide hunt for account takeovers and is prompting users to reset their passwords when such an issue is detected.

In a Thursday post, Reddit co-founder Christopher Slowe explains that the platform has improved its takeover detection capabilities and that it has recently prompted roughly 100,000 users to reset their passwords, with more to follow. This isn’t the result of reddit being exploited, but is aimed at countering the fact that users tend to reuse their passwords on multiple sites, Slowe says.

Numerous data breaches that resulted in account exposure created headlines over the past few months, the largest of which was the LinkedIn breach of 2012, which was revealed earlier this month to have resulted in the compromise of 167 million accounts, 117 million of which included passwords. The data has been already published online.

As if the large number of affected users wasn’t enough, the leaked passwords were hashed but not salted, meaning that they could be easily decrypted. What’s more, the dumped data revealed that people continue to use weak, easy-to-guess passwords for their accounts, with “123456” being the most used, occurring 753,305 times among the leaked passwords.

Just days ago, Microsoft revealed that it is now dynamically banning common passwords from its services, in an attempt to force users to improve the security of their accounts. Cybercriminals, Microsoft explained, analyze the leaked passwords and use them to brute-force accounts. The use of common passwords increases attackers’ chances of success.

Now, Christopher Slowe is saying the same: attackers are leveraging their access to likely username and password combinations to compromise reddit accounts. Recently, the platform experienced a surge in account takeovers by third parties, and Reddit is now taking the necessary steps to ensure that only the rightful owners log into their accounts.

Slowe also notes that affected users will be greeted with a request to reset their password when next logging into their accounts, and that they should “choose a strong, unique password,” because “password reuse is really bad.” To increase security, users should also set and verify an email address, and should check their account’s activity page to verify the IPs the account is accessed from.

Reddit’s co-founder also explains that the service is dealing with a large number of abandoned accounts that haven’t logged in for years, which represent a large possible surface area for takeovers. Thus, after issuing password reset warnings to them, the platform will disable these accounts within one month, should there be no reaction from the account owners.

To increase security, reddit is considering two-factor authentication (2FA). While the feature is already required for administrators, the full rollout isn’t as simple because of the large ecosystem of apps. “We’re definitely considering it,” but it “will require a lot of coordination,” Slowe said.

Related: 7 Million Impacted by Lifeboat Minecraft Community Breach

Related: Study Analyzes Passwords Used in Opportunistic, Criminal Attacks

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...