That was part of our old database.
I have no idea why that information was there and I plan on figuring out which idiot from my team did that.
I am in the process of emailing all the affected users to let them know.
Very bad security practice to leave the accounts passwords unencrypted, i hope your not the coder for that site!
Would advise all users to get their miners away from there ASAP
A. We had to keep the WORKER passwords unencrypted so that users could see them and edit them more easily.
B. This is our OLD database on the OLD site. We have since completely rewritten the site's code and it doesn't even use mysql anymore.
C. This happened because one of the guys on the team was doing some debugging and like an idiot did not secure his testing site.
Even so, why have them saved as plain text at all? you can still encyrpt with base64 and a salt code that is kept hidden
They probably thought worker passwords wasn't "important" enough.
They aren't "important", they are a mere formality.
And yet several people already had their email account compromised.
The lesson here is that every password
the user types is important, because when you have a million users there is at least one dumb-ass who use his PIN number as his password everywhere.
I'm pretty sure that responsibility lies with the user themselves. After all, if you use the same key for your car, house, boat, storage unit, etc. who's fault is it really? Maybe it's time to start a business doing compromised password insurance...
Yes, of course it's the user's responsibility. That's why I called those one-in-a-million users "dumb-asses".
But if the coder is too lazy to spare one line of code to encrypt a useless password then I wouldn't trust that same coder to process my transactions.
By the end of the day, this is yet another security breach and another blow to the credibility of Bitcoins. Whether you used nofeemining or not, whether you chose strong passwords or not doesn't matter, because you were still hurt by this security breach.