Hacker Shows How Cloud Could Wash Out Wireless Security
That attack was launched against the SHA-1 hash algorithm.
Roth's conclusions are that the SHA-1 algorithm is not fit for password hashing, and the compute power offered by cloud services makes it cheap and easy to launch brute-force attacks on passwords.
However, it's been known since 2005 that the SHA-1 algorithm has flaws, and the National Institute of Standards and Technology is seeking to replace it.
The link for this article located at Tech News World is no longer available.