Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 12-22-2007, 02:15 PM   #301
RazorSharpe
Confirmed User
 
RazorSharpe's Avatar
 
Industry Role:
Join Date: Aug 2001
Location: Scotland
Posts: 2,238
Quote:
Originally Posted by ladida View Post
Yea, then wait and see people coming here annoyed that this is like this or that, or they can't do this or that. People in this business lack the understanding of security soooo much, and value it even less.
it is totally possible to take the concept of security way too far and thus make normal workings of any software totally unusable. Where do you stop? I'm sure you've patched plenty of apache or mysql installs after hearing of vulnerabilities via security newsgroups or mailinglists or are you the type that finds all of them on your own? Don't treat your mind to illusions of its own grandeur ladida, it is making you seem rather foolish.
__________________
Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning.
RazorSharpe is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 02:15 PM   #302
RP Fade
Confirmed User
 
Join Date: Sep 2003
Location: Los Angeles
Posts: 3,343
Quote:
Originally Posted by baddog View Post
So, how many people's holiday weekend has been effected by this latest revelation?
I think quite a few are saying 'what holiday' right about now
__________________
HomemadeCash.com - Homemade & GF sites powered by NScash.com
HomemadeVideoPass.com - The only all homemade mega site
OurHomemadePorno.com - Real couples fucking on camera
Contact ICQ: 400-786-531 Email: fade AT nscash.com
RP Fade is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 02:17 PM   #303
RazorSharpe
Confirmed User
 
RazorSharpe's Avatar
 
Industry Role:
Join Date: Aug 2001
Location: Scotland
Posts: 2,238
Quote:
Originally Posted by RP Fade View Post
I think quite a few are saying 'what holiday' right about now
what holiday?
__________________
Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning.
RazorSharpe is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 02:19 PM   #304
jcsike
Confirmed User
 
Industry Role:
Join Date: Jan 2006
Posts: 689
Quote:
Originally Posted by milan View Post
After many MANY emails and VM's I will post what OC3 Networks discovered back in October after routine audit of 2 of our clients security.

We know this issue exist since mid Aug 2007, secured our customers and blocked the intruder IP’s from any access to our network.

We posted the thread {url]http://www.gfy.com/showthread.php?t=779742[/url] and got some lawsuit treat to sue us that we could have care less… BUT when our customers that we tracked the breach on their servers got treats as well and requested us to NOT come out public with it, we honored their request.


I've been involved with a high number of NATS clients and have found the following to be true:
*) Changing all admin level account passwords stops the intruder. He still attempts to login, but in vain.
*) As soon as TMM has admin access to NATS the intruder is back. Sometimes the same day.
*) Intruder is using an automation script that dumps the NATS members list. In some cases he is doing this every hour on the hour.

*) NATS was vulnerable to SQL injection attacks. I haven't investigated whether it still is.


P.S. Im hearing that there is a backdoor that TMM can use to get into your NATS, but I havent investigated so its speculation. Only reason I even mention this is because NATS is encrypted and you dont know. Im not interested in decrypting NATS just to find out. There are other ways. I hope this isn’t true.
of course there is a backdoor with nats. how else do they know what their customers plan levels are to bill them? the question is what other information gets passed
__________________
jcsike is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 02:20 PM   #305
RazorSharpe
Confirmed User
 
RazorSharpe's Avatar
 
Industry Role:
Join Date: Aug 2001
Location: Scotland
Posts: 2,238
Quote:
Originally Posted by RazorSharpe View Post
I am no false impressions about software but I do expect that when I am pay to buy a software such as NATS and the developers of the software are aware of an issue that they will make it a priority to investigate the issue and make their clients aware of it and what they intend to do about it. I'm sure you can understand how i don't feel like this is too much to ask for.

This vulnerability specificaly targetted the NATS staff admin account and no others as far as i can tell which leads me to assume that it wasn't a brute force attack and if it were it was done because the nats staff account used the same username across multiple nats installations which is a total no-no in security 101 in and of itself.

...
maybe i shouldn't drink and post ... corrections to my post follow:

I have no false impressions about software but I do expect that when I pay for a software such as NATS and the developers of the software are aware of an issue that they will make it a priority to investigate the issue and make their clients aware of it and what they intend to do about it. I'm sure you can understand how i don't feel like this is too much to ask for.

This vulnerability specifically targetted the NATS staff admin account and no others, as far as i can tell, which leads me to assume that it wasn't a brute force attack and if it were it was done because the nats staff account used the same username across multiple nats installations which is a total no-no in security 101 in and of itself.
__________________
Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning.
RazorSharpe is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 02:34 PM   #306
Dirty D
Confirmed User
 
Dirty D's Avatar
 
Join Date: May 2002
Location: Paying Webmasters Millions Since 1999
Posts: 4,044
People, keep in mind that the only admin account that has been compromised is the TMM admin account. For god's sake, delete this account immediately.

This breach would also explain the multiple waves of compromised user passwords that we have seen. User passwords are easy to see in NATS, affiliate passwords are not.

My members area security software has reported dozens of compromised passwords logging in within less than 5 minutes. This only happens when there is a compiled list of valid passwords, not from passwords obtained by brute force.

After over 20 hours, I finally got a response to my trouble ticket:

TMM ‎(3:55 PM):
I'm sorry and it look like I have to get you an full upgrade to have this new feature
TMM ‎(3:56 PM):
and we are currently develope on better security system on NATS and there will be release on Monday hopfully
TMM ‎(3:58 PM):
can we do the update on Monday instead?

Dirty D ‎(3:59 PM):
Keep in mind we are one of the MANY programs that the TMM admin login was compromised. Before I get pissed off, let me get this straight and make sure I understand.

#1. The IP Log feature won't work until the next release comes out... maybe monday

#2. NATS will not log the admin login info to a log file and the ONLY way to get admin login information is for me to WRITE A SCRIPT to accept a POST with info from NATS using these undocumented variables xxxxxx , xxxxxxx, xxxxxxxx, xxxxxxxx, xxxxxxx

#3. Nothing has been accomplished to resolve this Trouble Ticket

TMM ‎(4:05 PM):
#1 yes, we are currently develope on the security script on will try to get relase as soon as possble.
#2 Currently no, but I will add this to the feature request.
#3 I'm sorry about this, we are wokring on the relase, and will let you know as soon as it is ready.
TMM ‎(4:11 PM):
I'm sorry for any inconvenience that cause on this issue, please change the ssh password and disable the nats admin login, one of us will contact you as soon as the new release is ready.
Dirty D is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 02:46 PM   #307
AlienQ - BANNED FOR LIFE
best designer on GFY
 
AlienQ - BANNED FOR LIFE's Avatar
 
Join Date: Mar 2003
Location: IALIEN.COM - High Definition Video and Photographic Productions -ICQ 78943384
Posts: 30,307
WTF? They outsourcing to Russian programmers or something?
Thats some serious broken english.

And certainly not the brightest of decisions.

Last edited by AlienQ - BANNED FOR LIFE; 12-22-2007 at 02:48 PM..
AlienQ - BANNED FOR LIFE is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 02:46 PM   #308
hateman
So Fucking Banned
 
Join Date: Jul 2003
Posts: 1,623
Holy shit, this is huge

Imagine how much data was stolen through this NATS fuck up

hateman is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 03:01 PM   #309
hateman
So Fucking Banned
 
Join Date: Jul 2003
Posts: 1,623
Quote:
Originally Posted by milan
After many MANY emails and VM's I will post what OC3 Networks discovered back in October after routine audit of 2 of our clients security.

We know this issue exist since mid Aug 2007, secured our customers and blocked the intruder IP?s from any access to our network.

We posted the thread http://www.gfy.com/fucking-around-and-business-discussion/779742-oc3-networks-customers-urgent.html and got some lawsuit treat to sue us that we could have care less? BUT when our customers that we tracked the breach on their servers got treats as well and requested us to NOT come out public with it, we honored their request.


I've been involved with a high number of NATS clients and have found the following to be true:
*) Changing all admin level account passwords stops the intruder. He still attempts to login, but in vain.
*) As soon as TMM has admin access to NATS the intruder is back. Sometimes the same day.
*) Intruder is using an automation script that dumps the NATS members list. In some cases he is doing this every hour on the hour.[/color]

*) NATS was vulnerable to SQL injection attacks. I haven't investigated whether it still is.


P.S. Im hearing that there is a backdoor that TMM can use to get into your NATS, but I havent investigated so its speculation. Only reason I even mention this is because NATS is encrypted and you dont know. Im not interested in decrypting NATS just to find out. There are other ways. I hope this isn?t true.
This is crazy!

hateman is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 03:03 PM   #310
baddog
So Fucking Banned
 
Industry Role:
Join Date: Apr 2001
Location: the beach, SoCal
Posts: 107,089
Quote:
Originally Posted by AlienQ View Post
WTF? They outsourcing to Russian programmers or something?
Thats some serious broken english.

And certainly not the brightest of decisions.
Are you kidding me? You invented broken English.
baddog is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 03:20 PM   #311
crockett
in a van by the river
 
crockett's Avatar
 
Industry Role:
Join Date: May 2003
Posts: 76,806
Quote:
Originally Posted by PBucksJohn View Post
The amount of wrong information, assumptions, and completely wrong accusations here is astounding.

This will be my last post in this thread and possibly on this board. I am tired of people running around saying whatever they want and there being no repercussions for it. It is ridiculous and I'm not going to sit here and argue with them.

This fully appears to be a compromised password list. It is not an "exploit" in the software. It is not Fred spamming your members, etc. We have changed our policy so that we no longer maintain ANY passwords to ensure this does not happen via us ever in the future. We are also continuing to implement other protective measures.

Those of you who have actual valid feedback and comments I appreciate them. Anyone is welcome to contact us regarding this with their questions or concerns and we will be further communicating directly with our clients about it.

However as to dealing with the people who make their living making things up about other people, I'm done here.
Every webmaster on this board whom has signed up as an affiliate of a NATS program, has a very good chance that their personal info has been compromised. You have done nothing but blame everyone else in this thread trying to make it seem like it's everyone else's bad security. Yet the finger keeps pointing back at one central point.

Real good choice you are taking there, ignoring not only the companies whom use your product, but also the affiliates whom promote those companies.

So first we had pornograph fiasco and now this.. What was that old saying? Fool me once shame on me... Fool me twice???

Last edited by crockett; 12-22-2007 at 03:22 PM..
crockett is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 03:51 PM   #312
RazorSharpe
Confirmed User
 
RazorSharpe's Avatar
 
Industry Role:
Join Date: Aug 2001
Location: Scotland
Posts: 2,238
Quote:
Originally Posted by baddog View Post
Are you kidding me? You invented broken English.
Actually the first time I have laughed at anything you've said.
__________________
Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning.
RazorSharpe is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 03:53 PM   #313
Gordon G
So Fucking Banned
 
Join Date: May 2006
Location: Seems To Be Here Now
Posts: 646
Quote:
Originally Posted by crockett View Post
Every webmaster on this board whom has signed up as an affiliate of a NATS program, has a very good chance that their personal info has been compromised. You have done nothing but blame everyone else in this thread trying to make it seem like it's everyone else's bad security. Yet the finger keeps pointing back at one central point.

Real good choice you are taking there, ignoring not only the companies whom use your product, but also the affiliates whom promote those companies.

So first we had pornograph fiasco and now this.. What was that old saying? Fool me once shame on me... Fool me twice???
he wont do jack shit about it. John thinks he is better than everyone else.
Gordon G is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 03:54 PM   #314
Gordon G
So Fucking Banned
 
Join Date: May 2006
Location: Seems To Be Here Now
Posts: 646
this thread should be a sticky.
Gordon G is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 03:56 PM   #315
TMM_John
Confirmed User
 
TMM_John's Avatar
 
Industry Role:
Join Date: May 2004
Posts: 6,659
Quote:
Originally Posted by Gordon G View Post
he wont do jack shit about it. John thinks he is better than everyone else.
http://www.gofuckyourself.com/showthread.php?t=794219
TMM_John is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 04:09 PM   #316
hateman
So Fucking Banned
 
Join Date: Jul 2003
Posts: 1,623
Quote:
Originally Posted by PBucksJohn View Post
This fully appears to be a compromised password list. It is not an "exploit" in the software. It is not Fred spamming your members, etc. We have changed our policy so that we no longer maintain ANY passwords to ensure this does not happen via us ever in the future. We are also continuing to implement other protective measures.
hateman is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 04:21 PM   #317
Gordon G
So Fucking Banned
 
Join Date: May 2006
Location: Seems To Be Here Now
Posts: 646
Quote:
Originally Posted by PBucksJohn View Post
Oh wow, you have typed a bullshit statement, sorry yes you have done something about it.
Gordon G is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 04:22 PM   #318
Gordon G
So Fucking Banned
 
Join Date: May 2006
Location: Seems To Be Here Now
Posts: 646
Quote:
Originally Posted by hateman View Post
Gordon G is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 04:40 PM   #319
tom3k
Confirmed User
 
Industry Role:
Join Date: Nov 2007
Posts: 105
heres a band aid solution for those who have dynamic ips and absolutely cant 'lock down' their admins to a specific ip... at least until the problem is resolved fully.

have your coder code up a small script:

w w w . d o m a i n . c o m /somesecretfile.php?key=somesecretkey

if the key is correct have it make the changes to allow the ip accessing the script to log into admin.

should take him about 15 minutes to code.

and security wise, even if someone found this file AND your key it wouldn't be a major compromise... all it would do is allow his ip to enter admin, nothing more... they would still need the password of course.

ciao.
tom3k is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 04:41 PM   #320
Rui
web
 
Join Date: Dec 2001
Location: On icq: 85-483-060
Posts: 9,533
Quote:
Originally Posted by baddog View Post
So, how many people's holiday weekend has been effected by this latest revelation?
So, can you please clue us in regarding what seems to be your real agenda regarding this?
Rui is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 04:44 PM   #321
baddog
So Fucking Banned
 
Industry Role:
Join Date: Apr 2001
Location: the beach, SoCal
Posts: 107,089
Quote:
Originally Posted by Rui View Post
So, can you please clue us in regarding what seems to be your real agenda regarding this?
My agenda?
baddog is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 04:45 PM   #322
DamageX
Marketing & Strategy
 
DamageX's Avatar
 
Industry Role:
Join Date: Jun 2001
Location: Former nomad
Posts: 14,293
Quote:
Originally Posted by hateman View Post
Wow, took this guy a full seven pages to make an appearance...
__________________
Whitehat is for chumps

If you don't do it, somebody else will - true story!
DamageX is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 05:18 PM   #323
quantum-x
Confirmed User
 
quantum-x's Avatar
 
Join Date: Feb 2002
Location: ICQ: 251425 Fr/Au/Ca
Posts: 6,863
Here's the important question. Literally hundreds of people have evidence that they have had data stolen electronically.

When are the authorities contacted? When does the cyber crime unit step into this? If this is as big as it seems, action needs to be taken. There's no shortage of cash or backing to get this solved.
quantum-x is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 05:23 PM   #324
AlienQ - BANNED FOR LIFE
best designer on GFY
 
AlienQ - BANNED FOR LIFE's Avatar
 
Join Date: Mar 2003
Location: IALIEN.COM - High Definition Video and Photographic Productions -ICQ 78943384
Posts: 30,307
Quote:
Originally Posted by quantum-x View Post
Here's the important question. Literally hundreds of people have evidence that they have had data stolen electronically.

When are the authorities contacted? When does the cyber crime unit step into this? If this is as big as it seems, action needs to be taken. There's no shortage of cash or backing to get this solved.
Nothing will be done.
The Bro squad is on the way to spin it, and this chapter will be swept under the carpet just like all the other dirty secrets in online adult.

Merry Xmas Chumps you all got robbed.
AlienQ - BANNED FOR LIFE is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 05:25 PM   #325
Axeman
Confirmed User
 
Join Date: Feb 2004
Location: Swamp
Posts: 5,201
This was definitely a breach on the NATS side as far as I can tell. All the programs I have talked to have had Fred's usernames be completely different from one another. This leads me to believe they kept a log/record of all user/passes on their side of things that got hacked/exploited/leaked/shared you take your pick of what happened.

If everyone getting exploited was being used by the same user/pass of an admin that would be one thing, but having them be so random and different from program to program shows quite clearly where the first issue started.

We are lucky we host at swiftwill and have ip protection in place. Though Fred was able to login, we show zero evidence he was able to log into the actual admin since he was not allowed via ip protection. The only parts he was able to access was like an affiliate could, the ad tools and link codes. So for hosts like Swiftwill and others like it that demand IP protection on Nats, that is a positive. For others that don't require it, this is a major issue of all the data that could have been collected over the min 6 months this has been an issue based on the various evidence in this thread.
__________________
XXXRewards - Karups - Boyfun - Jawked. Paying on time since 1997. Contact me at brent [at] xxxrewards.com
Axeman is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 06:36 PM   #326
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,405
Quote:
Originally Posted by ThePornBrain View Post
and here's my input, not accusing anyone, just something to look into for all NATS users:

splitfinity posted this in 2006:

http://www.gfy.com/11184768-post26.html



on gfy theres user "k0nr4d" http://www.gfy.com/members/k0nr4d/ with the signature



The only similarity here is that they both use hacker speak...

Move along novice.
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 06:48 PM   #327
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,405
IP RESTRICTION...

But my IP address changes....

Bullshit. You make enough money to call your provider and request a PERMANENT one. But they don't provide one. What the fuck? Are you on Dialup because most Cable, DSL, Broadband providers WILL give you a permanent IP if you pay monthly for leasing. Usually $20. Consider it a cost of doing business and a tax write off.

OK... But I AM ON DIALUP! So pay an admin here to setup a proxy on a dedicated server with a NON-ADULT hosting company picked at random. Have that proxy password protected.

Case closed...

The fact that a village idiot can get into this industry if he has $100,000 in inheritance money frightens me. It frightens me because when it comes to security you are all village idiots! Every last one of you!

90% of you have hackers on your boxes because they hacked your forum, your support system, your webcam software or by some other means. You don't know because all the hacker wants is your password DB and not the Emails.

They trade those DB's like Pokemon cards. They give 1 account away to each person who asks for them on newsgroups and IRC channels. It NEVER trips your strongbox, pennywize, proxy pass, etc, because they give each requester a different account. So even if the real user and the fake one use it at the same time they fall with in the AOL threshold (5 IP's in 15 minutes).

You all think.. Impossible because those previously mentioned programs shut this kinda shit down! No... They don't... Because each request gets a different account. This isn't password boards where 15,000 people get the same account. This is the designer version where everyone gets their own unique, free account.

But bandwidth is so cheap I don't give a fuck!... I know.. But in one channel on the IRC alone you will have up to 1000 people receive a password in a day. You are pissing away $35,000 a day! Smaller programs a few thousand...

Industry wide? About $800,000,000 a year is just pissed away...

OK.. Back to your original programming where you just bury your heads in the sand.
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 08:07 PM   #328
the indigo
Confirmed User
 
the indigo's Avatar
 
Industry Role:
Join Date: Sep 2001
Location: North America
Posts: 2,016
Quote:
Originally Posted by V_RocKs View Post
IP RESTRICTION...

But my IP address changes....

Bullshit. You make enough money to call your provider and request a PERMANENT one. But they don't provide one. What the fuck? Are you on Dialup because most Cable, DSL, Broadband providers WILL give you a permanent IP if you pay monthly for leasing. Usually $20. Consider it a cost of doing business and a tax write off.

OK... But I AM ON DIALUP! So pay an admin here to setup a proxy on a dedicated server with a NON-ADULT hosting company picked at random. Have that proxy password protected.

Case closed...
No needs for all that crap... you can easily edit that IP (in case it changes every few days) via SSH/FTP. The problem is that NATS only notified the change via the admin area, which make things worse.

Oh, and yes... you are the king. Whatever. I clicked your sig.
__________________
"There he goes. One of God's own prototypes. A high-powered mutant of some kind never even considered for mass production. Too weird to live, and too rare to die." -Hunter S. Thompson
the indigo is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-22-2007, 10:55 PM   #329
Tempest
Too lazy to set a custom title
 
Industry Role:
Join Date: May 2004
Location: West Coast, Canada.
Posts: 10,217
Quote:
Originally Posted by Mike33 View Post
What sites/products were being spammed?
The usual... meds (i.e. viagra)... and porn sites..
Tempest is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-23-2007, 12:57 AM   #330
Paul Markham
Too old to care
 
Paul Markham's Avatar
 
Industry Role:
Join Date: Jun 2001
Location: On the sofa, watching TV or doing my jigsaws.
Posts: 52,943
Quote:
Originally Posted by Rui View Post
So, can you please clue us in regarding what seems to be your real agenda regarding this?
Excuse me for not understanding this, can you explain what it means. Please.

http://www.alexa.com/data/details/tr...3y&size=Medium

Saw it posted on another board.
Paul Markham is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-23-2007, 01:20 AM   #331
Paul Markham
Too old to care
 
Paul Markham's Avatar
 
Industry Role:
Join Date: Jun 2001
Location: On the sofa, watching TV or doing my jigsaws.
Posts: 52,943
This was sent to me last night and I was asked to post it without naming the source. I have no time to investigate it as I'm off out after checking the site.

Please draw your own conclusions from it.

Quote:
07/17: We don't maintain any user/pass info for clients in our office let alone on servers

http://www.gfy.com/12774034-post15.html

12/22: We have changed our policy so that we no longer maintain ANY passwords to ensure this does not happen via us ever in the future.

http://www.gfy.com/showpost.php?p=13...&postcount=246
Seems to me that changed a policy they never had.
Paul Markham is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-23-2007, 01:25 AM   #332
TMM_John
Confirmed User
 
TMM_John's Avatar
 
Industry Role:
Join Date: May 2004
Posts: 6,659
Quote:
Originally Posted by Paul Markham View Post
This was sent to me last night and I was asked to post it without naming the source. I have no time to investigate it as I'm off out after checking the site.

Please draw your own conclusions from it.


Seems to me that changed a policy they never had.
The original post was in reference to SSH passwords. I should have been more clear and it may be more clear in context rather than quoted as you did.

You're on my do not argue list and I'm heading to sleep anyway. Think as you wish, you always do.
TMM_John is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-23-2007, 01:35 AM   #333
ladida
Confirmed User
 
ladida's Avatar
 
Join Date: Nov 2005
Posts: 2,167
Quote:
Originally Posted by V_RocKs View Post
90% of you have hackers on your boxes because they hacked your forum, your support system, your webcam software or by some other means. You don't know because all the hacker wants is your password DB and not the Emails.
Prepare to be called an idiot by people living in bubbles in 3-2-1...


Guess some people do realise how it is, but those are the same people that have either worked in security, or have had their boxes used as toys by hackers and have been awaken by the sad truth that their box is banned by google, listed on every blacklist known to man for spamming, their members sending 100 complaints, their databases beeing erased and indexes overwritten by kids etc etc. Then they realise that if it's at the point that your database is erased, the person that erased is not the hacker, hacker got in a long time ago. It's now to the point that he sold the access to turkish or who knows wannabes.

Still long till time comes when people here take security seriously since so few understand it.
__________________
agentGFY *at* gmail.com
ladida is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-23-2007, 06:19 AM   #334
justsexxx
Too lazy to set a custom title
 
Join Date: Aug 2001
Location: The Netherlands
Posts: 13,723
Just curious. Did you have the SAME user/pass for EVERY program?

I mean, that would be REALLY bad.....

Also, if the 'hacker' had/had full admin access. He might have created a 2nd user with access to the affiliate info...Better check out ALL users with more access than a normal affiliate
__________________
Questions?

ICQ: 125184542
justsexxx is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-23-2007, 06:44 AM   #335
chupacabra
Confirmed User
 
Join Date: Sep 2002
Posts: 3,626
Quote:
Originally Posted by dustman View Post
People, keep in mind that the only admin account that has been compromised is the TMM admin account. For god's sake, delete this account immediately.

This breach would also explain the multiple waves of compromised user passwords that we have seen. User passwords are easy to see in NATS, affiliate passwords are not.

My members area security software has reported dozens of compromised passwords logging in within less than 5 minutes. This only happens when there is a compiled list of valid passwords, not from passwords obtained by brute force.

After over 20 hours, I finally got a response to my trouble ticket:

TMM ‎(3:55 PM):
I'm sorry and it look like I have to get you an full upgrade to have this new feature
TMM ‎(3:56 PM):
and we are currently develope on better security system on NATS and there will be release on Monday hopfully
TMM ‎(3:58 PM):
can we do the update on Monday instead?

Dirty D ‎(3:59 PM):
Keep in mind we are one of the MANY programs that the TMM admin login was compromised. Before I get pissed off, let me get this straight and make sure I understand.

#1. The IP Log feature won't work until the next release comes out... maybe monday

#2. NATS will not log the admin login info to a log file and the ONLY way to get admin login information is for me to WRITE A SCRIPT to accept a POST with info from NATS using these undocumented variables xxxxxx , xxxxxxx, xxxxxxxx, xxxxxxxx, xxxxxxx

#3. Nothing has been accomplished to resolve this Trouble Ticket

TMM ‎(4:05 PM):
#1 yes, we are currently develope on the security script on will try to get relase as soon as possble.
#2 Currently no, but I will add this to the feature request.
#3 I'm sorry about this, we are wokring on the relase, and will let you know as soon as it is ready.
TMM ‎(4:11 PM):
I'm sorry for any inconvenience that cause on this issue, please change the ssh password and disable the nats admin login, one of us will contact you as soon as the new release is ready.
you know, reading what you typed above really struck a nerve w/ me... i don't even use NATS for my small sites, but i do use SegPay as a processor. a few months back i started seeing the exact same you describe above. waves of locked/banned user accounts one after another, like 50 in a row all caught by PWSentry due to multiple logins from too many geo locales... this would be all at once, and then stop once all the compromised accounts got caught. a week or two later, boom, same thing. lots of wasted time for me changing passwords for everyone and pissed off/canceling customers, and as you said, obviously not brute-force here...

i'm going to go dig back and see when this trend started, but i cant help but wonder if this is tied to when NATS and Segpay started their incestuous relationship, as i had never seen this kind if account compromising over the past 8 years, not so many simultaneously and then suddenly stoppping in a single wave.

sounds way too close to what you describe above, *way* too close to me..
__________________
...promise her a defamation, tell her where the rain will fall..
chupacabra is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-23-2007, 05:01 PM   #336
TeenCat
Too lazy to set a koala
 
TeenCat's Avatar
 
Industry Role:
Join Date: Jan 2007
Location: CZ/EU forever!
Posts: 16,139
it is not only nats there are public dumps of generated passwords from other programs and systems also, adult security experts are step behind hackers
__________________

6bot
/ Coming again very soon!
Svit Zlin Radio 24/7!
TeenCat is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-26-2007, 03:36 PM   #337
chri$tian
Confirmed User
 
Industry Role:
Join Date: Aug 2003
Location: Charleston, SC
Posts: 2,468
WOW this post got BIG fast.. Left it on Saturday on the first page, just read the rest now..
__________________
http://www.3dsex.com
chri$tian is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 01-09-2008, 10:33 AM   #338
RomaCash
Confirmed User
 
Join Date: Dec 2007
Location: Earth Planet
Posts: 213
popular topic, what you want.

we want to switch, so now we this twicely.
__________________
PORNUPLOAD.COM Free Traffic &
Easy $$$money$$$ making service!
RomaCash is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.