GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   when did this NATs Hack happen? (https://gfy.com/showthread.php?t=882641)

Si 01-19-2009 08:24 PM

when did this NATs Hack happen?
 
Was just reading this:

http://www.affiliatecheaters.com/miscellaneous/nats

When did it happen?

Probably very old news but i was just browsing through it was quite an interesting read.

Ethersync 01-19-2009 08:48 PM

Here are a few threads I found....

http://www.gfy.com/it/794219-statement-regarding-nats-security-issue.html
http://www.gfy.com/fucking-around-and-business-discussion/794328-lot-epassporte-account-hacks-result-nats-security-holes.html

fris 01-19-2009 08:50 PM

pussy lips

dial 01-19-2009 08:51 PM

there was never actually a "hack"

just a hundred chickens with their heads cut off running around acting like they knew what they were talking about

in reality it was a totally small deal that wasn't even all that newsworthy

crockett 01-19-2009 08:51 PM

Just search "NATs Hack" and I'm sure you will come across the thread.. Might wanna do a search for "pornograph" as well, because the owner of NATs also owned pornograph before it was also used by a "rogue" mystry someone to do mass installs on many sites.. including my own..

But hey it's all top notch bro's so it's all cool.

hypedough 01-19-2009 08:52 PM

Quote:

Originally Posted by crockett (Post 15357609)
Just search "NATs Hack" and I'm sure you will come across the thread.. Might wanna do a search for "pornograph" as well, because the owner of NATs also owned pornograph before it was also used by a "rogue" mystry someone to do mass installs on many sites.. including my own..

But hey it's all top notch bro's so it's all cool.

Whoa f'ed up story there :2 cents:

dial 01-19-2009 08:54 PM

Quote:

Originally Posted by hypedough (Post 15357612)
Whoa f'ed up story there :2 cents:

not all that fucked up really

someone owned a site
they didn't want it anymore
they sold it
the new owners got malicious with it
the old owners are blamed
gfy is full of idiots

crockett 01-19-2009 09:07 PM

Quote:

Originally Posted by dial (Post 15357617)
not all that fucked up really

someone owned a site
they didn't want it anymore
they sold it
the new owners got malicious with it
the old owners are blamed
gfy is full of idiots


Maybe you should look into what the owner of the company whom took the installs said.. He claimed there was no "mysterious buyer" of that site and that it was JA himself whom did it. I'd assume the guy whom took the installs would know whom sent them and has publicly stated on another forum is was JA whom did it..

Think for 2 seconds.. you really think if he sold that counter and the buyer used it to fuck us all like he did, that he would have any reason to keep quiet about who bought it.

dav3 01-19-2009 09:07 PM

I got a weird email this morning from change AT toomuchmedia.com

Hello,

Since we have been very bad with the girls lately we are going to stop the activity for a few months to rethink the strategy .
We have a plan but this might involve lower payouts.You will be notified though.

Thanks for understanding


I was like, uhh what?

Perhaps this would be a decent place to see if it makes sense to anyone.

munki 01-19-2009 09:10 PM

Quote:

Originally Posted by dav3 (Post 15357644)
I got a weird email this morning from change AT toomuchmedia.com

Hello,

Since we have been very bad with the girls lately we are going to stop the activity for a few months to rethink the strategy .
We have a plan but this might involve lower payouts.You will be notified though.

Thanks for understanding


I was like, uhh what?

Perhaps this would be a decent place to see if it makes sense to anyone.

:error:error

Manowar 01-19-2009 09:30 PM

Quote:

Originally Posted by dav3 (Post 15357644)
I got a weird email this morning from change AT toomuchmedia.com

Hello,

Since we have been very bad with the girls lately we are going to stop the activity for a few months to rethink the strategy .
We have a plan but this might involve lower payouts.You will be notified though.

Thanks for understanding


I was like, uhh what?

Perhaps this would be a decent place to see if it makes sense to anyone.

Teen dolls?

dav3 01-19-2009 09:54 PM

Quote:

Originally Posted by Manowar (Post 15357708)
Teen dolls?

No, I'm not signed up with that one. I'm only signed up with a few that are not cams or dating. STFU Cash, Traffic Cash Gold, Incredible Dollars, HD Pays, Evil Angel, Score Cash, Perfect Gonzo, and Sex and Cash. Not sure which ones use NATS and which do not. I'm also not sure why I would get an email from toomuchmedia.com either.

I don't know, no biggie. Just seemed like an odd email and I figured some one else probably received the same one and had no clue about it either.

Ethersync 01-19-2009 10:30 PM

Quote:

Originally Posted by dav3 (Post 15357644)
I got a weird email this morning from change AT toomuchmedia.com

Hello,

Since we have been very bad with the girls lately we are going to stop the activity for a few months to rethink the strategy .
We have a plan but this might involve lower payouts.You will be notified though.

Thanks for understanding


I was like, uhh what?

Perhaps this would be a decent place to see if it makes sense to anyone.

I wonder what site they are talking about.

SmokeyTheBear 01-19-2009 10:34 PM

Quote:

Originally Posted by dial (Post 15357607)
there was never actually a "hack"

just a hundred chickens with their heads cut off running around acting like they knew what they were talking about

in reality it was a totally small deal that wasn't even all that newsworthy

huh , their main admin password was exposed and used to steal data from thousands of users, across many nats sponsors i would call that a hack

dav3 01-19-2009 10:41 PM

Quote:

Originally Posted by Ethersync (Post 15357918)
I wonder what site they are talking about.

idk

The subject line said "activity stopped till further notice".

:helpme

Ethersync 01-19-2009 10:45 PM

Quote:

Originally Posted by dav3 (Post 15357958)
idk

The subject line said "activity stopped till further notice".

:helpme

weird...

TMM_John 01-20-2009 12:19 AM

Quote:

Originally Posted by SmokeyTheBear (Post 15357934)
huh , their main admin password was exposed and used to steal data from thousands of users, across many nats sponsors i would call that a hack

Please don't spread misinformation.

Iron Fist 01-20-2009 12:25 AM

Oh man, not this shit again.

TeenCat 01-20-2009 03:58 AM

Quote:

Originally Posted by PBucksJohn (Post 15358157)
Please don't spread misinformation.

please tell the truth ... smokey is absolutelly right ... russians hackers wanted to hack one of thousands porn sites ... they got passfile, and ooops, there was nats admins pass ... it was working almost everywhere, but i cannot tell you more as i only read about it also ... doesnt matter what ttm says, this was the "hack" :winkwink:

borked 01-20-2009 06:08 AM

Quote:

Originally Posted by PBucksJohn (Post 15358157)
Please don't spread misinformation.

Some point prior to November 2007, somebody got a hold of the nats admin passwords for a large number of sites. This was used to harvest member email addresses on a daily basis. TMm were told about this, but did not wish to discuss the matter. Annoyed that tmm were seemingly doing nothing about it, certainlynot informing their clients, OC3 went public on this board with their findings.

Is that more correct?

You mentioned during that thread that an investigationwas underway. Did anything result from that?

tranza 01-20-2009 09:46 AM

The link drop me in blogger.com, is it normal?

TeenCat 01-20-2009 09:49 AM

Quote:

Originally Posted by tranza (Post 15360701)
The link drop me in blogger.com, is it normal?

http://209.85.129.132/search?q=cache...ellaneous/nats

SmokeyTheBear 01-20-2009 11:21 AM

Quote:

Originally Posted by PBucksJohn (Post 15358157)
Please don't spread misinformation.

please tell me what part of what i said was misinformation ?

Was your admin username and pass exposed ?

Was it used to login to several nats sponsors and steal info from users ?

Didn't you come on gfy to verify your admin pass was compromised ?

Didnt several of your clients come on gfy and verify the compromised u/p was being used to skim info from their database ?

Isn't it true nats was aware of this compromise well before it was reported on gfy by your own admission ?

Isnt it true that even though you were aware of the compromise it wasnt until your clients reported this information on gfy that the usernames and passwords were changed ?

feel free to correct me if i am wrong , but thats how i remembered it ?

natas 01-20-2009 11:41 AM

ooooooooh damn

HorseShit 01-20-2009 11:44 AM

a friendly bump for this thread

crockett 01-20-2009 11:50 AM

Quote:

Originally Posted by borked (Post 15359478)
Some point prior to November 2007, somebody got a hold of the nats admin passwords for a large number of sites. This was used to harvest member email addresses on a daily basis. TMm were told about this, but did not wish to discuss the matter. Annoyed that tmm were seemingly doing nothing about it, certainlynot informing their clients, OC3 went public on this board with their findings.

Is that more correct?

You mentioned during that thread that an investigationwas underway. Did anything result from that?

It was the guy on the grassy null.. It's just like the "mystery" guy that "supposedly" bought pornogragh.com and fucked over many of us here on GFY by using it to infect our websites with BS installs.


borked 01-20-2009 11:57 AM

Quote:

Originally Posted by crockett (Post 15361374)
It was the guy on the grassy null.. It's just like the "mystery" guy that "supposedly" bought pornogragh.com and fucked over many of us here on GFY by using it to infect our websites with BS installs.

Funny youtube clip :thumbsup

What I don't understand, though you may have a better understanding of the situation is why the programme that alerted TMM to this security breach, so that TMM could investigate it, was subsequently treated as second class customers, with ticket response times taking a nose dive. :(

Or it mayjust have been my imagination...

Si 01-20-2009 12:06 PM

Very interesting sounds like a few people are still having problems or rants about the whole thing aswell.

So if I was to set up a program, what would be THE best way to do it, what system to use?

please don't say epoch or ccbill :(

borked 01-20-2009 12:11 PM

It depends how many sites and billers you have. If it's just 1, then CCBill (if you have CCBill that is)....

If you have multiple sites, and billers for cascades, then nats or mas is worth a look as they are easier to maintain/administer.

KillerK 01-20-2009 12:31 PM

Bump for Porngraph! Can't believe we let him off that easy...

V_RocKs 01-20-2009 12:42 PM

Epoch or CCBILL...

SmokeyTheBear 01-20-2009 12:50 PM

Quote:

Originally Posted by mobilefun1987 (Post 15361472)
So if I was to set up a program, what would be THE best way to do it, what system to use?

please don't say epoch or ccbill :(

i would say NATS is your #1 choice. That may sound strange considering the previous comments but hey hacks do happen, i dont appreciate being accused of being a liar by john and i dont think nats handled the situation appropriately but with that being said, i can see somewhat why it was mishandled ( in my opinion ). What it boils down to is NATS makes business sense and while i dont think nats handled the situation properly i dont think any nefarious deeds were done with ill intent by anyone at nats and hopefully they learned a lesson besides just the security risk associated with this particular problem.

ladida 01-20-2009 01:53 PM

There's not a company mentioned in this thread that has not been hacked in one form or another in the past.

borked 01-20-2009 01:56 PM

PBucksJohn:

Quote:

Originally Posted by borked (Post 15359478)
You mentioned during that thread that an investigationwas underway. Did anything result from that?

Is your investigation complete? After more than 14 months, I would assume so. Was anyone indicted?

Who headed the investigation btw, because I find it odd that programmes that were involved in the member rape were not contacted as part of the investigation. If they were, I could have given you some very interesting logs, IP addresses from an independent internal investigation. Also from that, a whole bunch of emails from (non-adult) server owners that were hacked (and their logs) to hide the hackers trail revealed quite a trail of destruction, with some extremely interesting endpoints.

All to harvest emails (and god knows what else).

Very very unfortunately, I don't have the authority to release this information publicly, because I'm sure a few people here could take the trail to completion and help you find the person responsible for this. I no longer work for the company that holds this information, but if you don't know who that company is (think "first contact"), I can put you in touch with them if you wish to re-open your investigation.

lazycash 01-20-2009 02:03 PM

Lets get Minusonebit in here to clarify the matter.


All times are GMT -7. The time now is 09:59 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc