| Recurring |
one_organization, multiple_organization |
(a) The software failure incident having happened again at one_organization:
Jeremi Gosney, the founder and CEO of Stricture Consulting Group, conducted an experiment where he managed to crack a large number of hashed passwords using various techniques including brute-force attacks and hybrid attacks. This incident showcases the vulnerability of passwords and the potential risks associated with weak password security measures [18962].
(b) The software failure incident having happened again at multiple_organization:
The article mentions that the hackers used a wordlist created from the 2009 breach of the online games service RockYou to crack passwords. This indicates that similar password security vulnerabilities have been exploited in different organizations, as the same list of passwords was used to crack passwords in this incident as well [18962]. |
| Phase (Design/Operation) |
design, operation |
(a) The software failure incident related to the development phase of design can be seen in the article. The incident involved a team of hackers successfully cracking more than 14,800 supposedly random passwords out of a list of 16,449 as part of a hacking experiment for a technology website [18962]. This failure highlights a vulnerability in the design of the password hashing and storage system, allowing hackers to exploit weaknesses in the system's development.
(b) The software failure incident related to the development phase of operation is evident in the article as well. The hackers used various techniques such as brute-force attacks, hybrid attacks, and Markov chains to crack hashed passwords, showcasing the failure introduced by the operation or misuse of the password system [18962]. This failure emphasizes the importance of secure operational practices to prevent unauthorized access to sensitive information. |
| Boundary (Internal/External) |
within_system |
(a) within_system: The software failure incident in the article is primarily due to weaknesses within the system itself. The incident involved hackers successfully cracking a large number of supposedly random and hashed passwords from a list of 16,449 passwords. The hackers used various techniques such as brute-force attacks, hybrid attacks, and Markov chains to crack the passwords stored within the system [18962].
(b) outside_system: The software failure incident does not seem to be primarily caused by factors originating from outside the system. The incident of hackers cracking the passwords was a result of vulnerabilities and weaknesses within the system's password hashing and storage mechanisms, rather than external factors beyond the system's control [18962]. |
| Nature (Human/Non-human) |
human_actions |
(a) The software failure incident occurring due to non-human actions:
- The software failure incident in this case was not due to non-human actions but rather due to the successful hacking attempts by a team of hackers who managed to crack a large number of supposedly random passwords [18962].
(b) The software failure incident occurring due to human actions:
- The software failure incident in this case was primarily due to human actions, specifically the actions of the hackers who used various techniques such as brute-force attacks, hybrid attacks, and Markov chains to crack the hashed passwords [18962]. |
| Dimension (Hardware/Software) |
software |
(a) The software failure incident occurring due to hardware:
- The articles do not mention any software failure incident occurring due to contributing factors originating in hardware. Hence, there is no information available regarding a software failure incident caused by hardware issues.
(b) The software failure incident occurring due to software:
- The software failure incident discussed in the articles is related to the compromise of passwords by hackers. This incident is a result of vulnerabilities in the software systems used for hashing and storing passwords. The hackers were able to exploit weaknesses in the hashing algorithms and password storage methods to crack a significant number of passwords [18962]. |
| Objective (Malicious/Non-malicious) |
malicious |
(a) The software failure incident reported in the articles is malicious in nature. The incident involved a team of hackers who managed to crack more than 14,800 supposedly random passwords out of a list of 16,449 as part of a hacking experiment for a technology website [18962]. The hackers used various techniques such as brute-force attacks, hybrid attacks, wordlists, rainbow tables, and Markov chains to crack the hashed passwords and obtain plain-text passwords. The hackers' objective was to demonstrate the vulnerability of hashed passwords and the ease with which they could be cracked, highlighting the security risks associated with weak password practices.
Additionally, the hackers' success rate ranged from 62% to 90%, with one hacker managing to crack 90% of the hashed passwords in less than an hour using a computer cluster [18962]. This deliberate and targeted effort to crack passwords demonstrates a malicious intent to breach security measures and gain unauthorized access to user accounts.
Therefore, the software failure incident described in the articles is primarily malicious in nature, involving intentional actions by hackers to compromise the security of the system and access sensitive information. |
| Intent (Poor/Accidental Decisions) |
poor_decisions |
The intent of the software failure incident related to poor_decisions can be inferred from the articles. The incident of hackers cracking 16-character passwords in less than an hour ([18962]) highlights a failure due to poor decisions. The use of weak passwords by users and potentially inadequate password security measures implemented by the website or service contributed to the success of the hacking experiment. This failure can be attributed to the poor decision-making regarding password strength requirements and security protocols. |
| Capability (Incompetence/Accidental) |
development_incompetence |
(a) The software failure incident occurring due to development incompetence:
- The incident of hackers cracking 14,800 supposedly random passwords out of a list of 16,449 was a result of a hacking experiment conducted by a team of hackers for a technology website [18962].
- The success rate for each hacker ranged from 62% to 90%, indicating a significant breach in the security of the hashed passwords [18962].
- The hackers used various techniques such as brute-force attacks, hybrid attacks, and Markov chains to crack the hashed passwords, showcasing the vulnerabilities in the password security system [18962].
(b) The software failure incident occurring accidentally:
- The incident of hackers successfully cracking a large number of hashed passwords was not accidental but a deliberate hacking experiment conducted by a team of hackers for a technology website [18962].
- The hackers employed sophisticated techniques and tools to crack the passwords, indicating a deliberate and targeted effort to exploit the security vulnerabilities [18962].
- The use of a 25-computer cluster capable of making 350 billion guesses per second to crack passwords further highlights the intentional nature of the hacking activity [18962]. |
| Duration |
unknown |
The articles do not provide information about a software failure incident being either permanent or temporary. |
| Behaviour |
value, other |
(a) crash: The articles do not mention any software failure incident related to a crash.
(b) omission: The software failure incident related to omission is not explicitly mentioned in the articles.
(c) timing: The software failure incident related to timing is not explicitly mentioned in the articles.
(d) value: The software failure incident related to the system performing its intended functions incorrectly is evident in the article where hackers managed to crack more than 14,800 supposedly random passwords out of a list of 16,449, showcasing a failure in the system's ability to securely store and protect passwords [18962].
(e) byzantine: The articles do not mention any software failure incident related to a byzantine behavior.
(f) other: The software failure incident related to the system's inability to prevent hackers from cracking a significant number of passwords, despite using hashing and cryptographic salt techniques, could be categorized as a failure in security measures and protection mechanisms [18962]. |