![]() |
Sponsors! check your member email DB, you prolly are hacked.
When was the last time you (affiliate program owners) have placed a virgin email address in your member database on your server to see if your member's email list has been compromised? Bet when you do it, you will see spam on those emails in 3 to 5 days ;)
Got some serious hackers selling off member's lists fresh from hot small to huge sponsor programs DB's and the ones who buys these lists are some of the biggest affiliates in the biz. Seed fake members in your DB and then thank me later for warning you. :thumbsup |
Seconded.
Though, the less honest ones could be selling them... emails are worth a bit. |
nats or no nats ? i remember when nats got hacked by someone using their admin username and password , the hacker stole all the signup emails from each of the sponsors running nats that they compromised
|
hmm i see nats sites in sig , bad sign. NATS seemed to want nothing to do with finding/exposing/criminally charging the culprits last time. Kind of an open invitation for hackers to try the same hack, especially when they know their target isn't interested in finding them, charging them or exposing holes.
|
Quote:
The spammer will not be shut down by program owners (tried that) because they are making huge money on basically the most valuable email list ever created in the history of porn spamming. |
if that's the case i would recommend seeding fake affiliate emails as well.
|
Quote:
My theory based on tests and collecting info on this problem is there is a group that is cracking program owners DB's by any means, including php exploits, apache/sql/smarty exploits, and then straight up brute force cracking DB's and affiliate software admins if that fails. This has been going on for over a year. Once they gain access they are selling the lists to the same group of affiliates, one gets it exclusively for about a week or two, then it's sold to another affiliate who gets semi-exclusive spam access, then it's sold to several other spammers. |
Quote:
|
Quote:
|
Quote:
|
Quote:
Quote:
|
Quote:
|
What kind of email are they sending?
I received one starting like that: ---- Here is your login information. Username: daWeXeve Password: xxxx Website Location : http://www.lifetimeadultpass.com/ ---- From: Customer Suport ([email protected]) |
theoretically, to be able to crack SQL DB's logins one would need to have server access in the first place as SQL servers are not open to receive connections from remote locations by default. I don't know inner workings of paysite scripts and billers how they're tied up together - but i highly doubt its required to have SQL DB access open for remote servers.
|
Quote:
|
Quote:
customer emails are one of the most valuable assets an adult affiliate program has.... they should protect them. |
Quote:
in to the database. This due to a widely held misconception about how the default account works. So default MySQL, not secured by someone who knows what they are doing + any popular PHP script = DB publicly available. Quote:
|
Anyone after dating emails? I can acquire several million, im sure they would do well - sample available upon request.
|
there's no question some programs are either compromised, or are stupid enough selling emails. I've signed up with emails that have odd, hard to guess usernames and they get spam
|
Quote:
|
Quote:
|
these are very serious accusations about nats.
|
welcome to yesterday
|
Quote:
|
you can register to public forums, where are hackers playing game like to have control over complete adult business. group of hackers, filling their list of hacked dbs. if there is new program, new job is started and program is hacked in few days. when the hack is compromissed for public, they just post the hole and then you wake up and say oooh i am hacked those bastards! some stupid ones are putting to your passfile also logins with ishere and similar passwords, but clever ones are only spamming and making big bucks with fake watches or viagra. and, there is not only one forum where they have control over almost everything ... :2 cents: welcome to the internet people
|
Quote:
|
Quote:
|
Quote:
|
Quote:
|
Quote:
|
Quote:
Well I'd be interested, I'll even send thank you cards :thumbsup |
Quote:
|
Quote:
|
Quote:
Email sent :) Quote:
|
Quote:
|
Quote:
|
lesson from this thread:
- restrict db access only to from known hosts (shut anonymous db access if you have that) - use complex generated passwords for db login and anything else - also should consider securing ssh/ftp access - for commonly used scripts - customize them, change admin url if possible, use strict passwords what else is missing? |
Quote:
- do not send password through emails, do not store emails with passwords - put your own testing real looking combos in htpasswd so you can track the hacks easily - have all logins with captcha, not only popup 401 window maybe sounds easy and basic, but those are things how smart kid can take your datas even without knowing any programming language :) |
Quote:
|
Quote:
|
All times are GMT -7. The time now is 02:50 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc