Skip to main content

Attacker stole user data from Reddit through employee accounts

GongTo/Shutterstock

An official update posted by Reddit reveals that an attacker broke into a few systems on the company’s network and stole user data. The theft consisted of a 2007 database backup containing salted hashed passwords along with “some” current email addresses. Reddit is currently working with law enforcement as they investigate the breach.

According to Reddit, the leaked database backup includes usernames and salted hashed passwords used between the site’s launch in 2005 through May 2007. It also includes email addresses, public content and private messages. Reddit users with data contained in this backup will be notified to reset their passwords. Those who created a Reddit account after May 2007 are not affected in this specific portion of the breach.

Recommended Videos

If you’re not familiar with the “hash” term, hashing converts a password into a value with a fixed length that cannot be reversed without lots of computing power. “Salting” means throwing an additional, random secret value into a password so that hackers can’t use dictionary attacks. Servers create a new randomly-generated salt for each password and hashes them together using cryptography.

Image used with permission by copyright holder

Reddit also said the attacker gained access to email digests from noreply@redditmail.com sent between June 3 and June 17, 2018. As shown above, the digests connect usernames to email addresses and also highlights subscribed subreddits. Those who don’t associate their email address to their Reddit account and/or unchecked the “email digests” option in their account are not affected.

Please enable Javascript to view this content

Still, that’s not all. Because the hacker had read access to Reddit’s storage systems, the attacker obtained source code, internal logs, configuration files and employee workspace files. On the end-user side, the 2007 database and email digests were the source of the attacker’s treasure trove.

How did the attacker infiltrate Reddit? Through “a few” compromised employee accounts tied to Reddit’s cloud and source code hosting providers. These accounts were protected by two-factor authentication through SMS messaging, which isn’t the most secure form of credential verification. Reddit suggests everyone move to token-based two-factor authentication like facial recognition, fingerprint scanning, and USB-based keys.

“Although this was a serious attack, the attacker did not gain write access to Reddit systems; they gained read-only access to some systems that contained backup data, source code and other logs,” the company reports. “They were not able to alter Reddit information, and we have taken steps since the event to further lock down and rotate all production secrets and API keys, and to enhance our logging and monitoring systems.”

Reddit discovered the breach on June 19, which took place between June 14 and June 18. After discovering the breach, Reddit worked with its cloud and source code hosting partners to understand what the attacker accessed. The company also reported the hack to law enforcement and began messaging user accounts. Reddit took additional steps to better secure its network as well.

Reddit suggests that users reconsider their passwords if they’ve been in use for years on the site and/or elsewhere. Reddit also suggests using strong, unique passwords and authenticator apps to take advantage of the site’s two-factor authentication feature.

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
Intel releases XeSS 2.0 developer tools, but keeps code under lock and key
Three main components of Intel's XeSS 2 upscaling

Intel has finally released the XeSS 2.0 Software Development Kit (SDK) to aid game development through upscaling, frame generation, and latency reduction technologies. The SDK is now accessible via Intel's GitHub repository, providing developers with pre-built tools for integrating XeSS into their projects.

Intel expanded its suite of XeSS technologies last year when it unveiled its budget segment GPUs, the Arc B580 and B570. The XeSS 2.0 SDK introduces three main components: XeSS-SR for AI-driven super resolution, XeSS-FG for frame generation, and XeLL for low-latency improvements. These advancements position XeSS 2.0 as a competitor to Nvidia’s DLSS (Deep Learning Super Sampling) and AMD’s FSR (FidelityFX Super Resolution), offering similar AI-powered enhancements to image quality and performance. Intel has also updated the XeSS inspector tool to support Vulkan and DirectX 11, making it easier for developers to optimize game performance across multiple rendering APIs.

Read more
Research suggests the VR headset heyday could be behind us
A man wears an Apple Vision Pro headset.

The latest market research has not been kind to VR headsets, and the Apple Vision Pro is the headset that suffered the biggest drop in market share. According to a new market update, the global VR market declined by 12% year-over-year in 2024, showing that the adoption of these headsets is slowing instead of picking up pace.

The updates come from Counterpoint, a research firm. According to its latest findings, people just aren't that into VR headsets anymore. Despite the way the tech has evolved in the last few years, shipments of VR headsets are dropping instead of rising.

Read more
You can now have secret chats with Google’s Gemini in incognito mode
Launching Gemini Deep Research query on Chrome desktop.

You can now have a quick chat with Gemini on your web browser without having to sign in first. And, to speed up the process, the Gemini website even takes you directly to the chat window instead of showing you a landing page first.

This move, spotted by 9To5Google, is pretty smart as it allows unconvinced users to try out the product with no strings attached. With any luck, they'll enjoy the experience and decide to sign up to get access to more of the features.

Read more