GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   ***** NATS Issue - What we know about it ***** (https://gfy.com/showthread.php?t=794159)

milan 12-22-2007 06:28 PM

Quote:

Originally Posted by minusonebit (Post 13551830)
Ah, now ain't that nice? Does that mean all of the affiliates' information is compromised as well? God, this entire industry sucks with regard to security and privacy practices. People need to get their heads out of their asses. Add this to the list of reasons why I am glad I use a taxpayer ID for program signups.

Now, the question that remains in my mind is two fold:

1. Why is TMM sitting on their goddamned asses with regard to this?
2. Milan, why did you give them as long as you did to fix this before letting it out?

This is a serious issue and you giving them three fucking months is to address it before going public with it is way too damn long. They should have had 48 hours - maximum - to address it. You're right, they should have notified the customers. Their failure to do that is another nail in their coffin. And right after they bought SegPay? Hah, now there is one billing company I'll never do business with.

Fuck TMM's reputation and the damage that releasing this after 48 hours would have caused, let me be the first to say that I don't give a good goddamn about that at all. When privacy and security and people having access to private data is concerned, the reputation of the companies involved does not matter, the security of the data in a timely manner trumps all ego concerns.

This industry worries way too fucking much about the reputation of other companies when it comes to shit like this. When something stinks, the dirty laundry needs to be aired now, not after three months of back room pleasantries and friendly chats.

I can't answer #1 as I knew they are trying to resolve this, they did not sit on their ass... (I still think letting the customers know would be first priority)

as for #2 I will repeat that we still have respect for the idea that security issues should be secret until their fixed. and was urged by our clients that we located the issue on their server NOT to go public or something bad will happen to them, who know what bad is but lawsuit and revoke of license is what I heard... can't confirm the second one.

milan 12-22-2007 06:32 PM

Quote:

Originally Posted by raymor (Post 13551540)
Thanks for handling this reponsibly, contacting NATS first and then going to
full disclosure mode only when it became necesary. As a security professional
who works with a lot of NATS sites, and someone who has previously
raised questions about the security implications of having that kind of data
on the web server at all as well as specific concerns about NATS, this is
of great interest to me and leaves me with a question.

Most of the "symptoms" you describe could be explained by a simpler problem
that that "*Someone* has access to TMM's clients database with your admin
logins and passwords.". There are numerous other ways for a cracker to get
the admin user name and password. Most webmasters choose poor passwords,
with "admin:admin" being common, as are certain variations on that.
You don't have to crack TMM's database to get in when the password is
that obvious. Most webmasters use passwords based on English words,
such a dictionary attack is simple enough. More likely, any PHP script
anywhere on the server might be exploited and used to read the password
from the database. Based on what you've posted, the only evidence that
the bad guy(s) have access to the TMM database is:



Is that a solid pattern that you saw repeatedly, or is it a case where it
happened one time that the cracker definitely was gone and then came back
shortly after TMM was given admin access?





Agreed - they have an impressive product and the current crop of people there
seem to be good people. Some on this board know we once had some
intellectual property concerns regarding the actions of somewhere who no
longer works there, but that's been properly taken care of by TMM. My interest
is in helping webmasters who use NATS and TMM to take care of any problems
so that everyone can get back to the business of getting the porn to the people.

YES solid as can be, we will keep all logs and evidence... as soon as they (TMM) get the "new" admin password within hours we saw the attacks comeback, more than that after we blocked the 2-3 IP's on the core network they came from, a few weeks later the "hacker" changed IP's while attacking our customers so another protection went into place.

milan 12-22-2007 06:35 PM

Quote:

Originally Posted by Sebastian Sands (Post 13552133)
Are the processors concerned at all?

Yes they are, some have been responsible and contact me to get more info on what we have and I did, it doesn't look like they got any of the CC info tho.
they were more interested in the email list

TMM_John 12-22-2007 06:36 PM

Milan and Caz, I want to apologize to both of you.

I realize now that you guys were only trying to help in this situation. I had received comments from a few people indicating to me that wasn't the case and I took them to be true without speaking with you guys myself. I always try to form my own opinions on things and in this case I'm sorry for not getting my own opinion of what you were doing about the situation.

I would also like to tell you that there is no backdoor we have put in NATS for us to access. I understand this is a common rumor but that is all that it is.

I realize now you guys are only here trying to help and I appreciate it. Thank you. I hope you can accept my apology.

milan 12-22-2007 06:52 PM

Quote:

Originally Posted by PBucksJohn (Post 13552666)
Milan and Caz, I want to apologize to both of you.

I realize now that you guys were only trying to help in this situation. I had received comments from a few people indicating to me that wasn't the case and I took them to be true without speaking with you guys myself. I always try to form my own opinions on things and in this case I'm sorry for not getting my own opinion of what you were doing about the situation.

I would also like to tell you that there is no backdoor we have put in NATS for us to access. I understand this is a common rumor but that is all that it is.

I realize now you guys are only here trying to help and I appreciate it. Thank you. I hope you can accept my apology.

John,

People that know me aware how easy going I am.

We respected the major dilemma you were facing and really tried to help you, TMM and the industry securing the data nothing more.
Your product is great and we are working on a daily basis with your install and support team, what a great bunch of guys they are.

Me and I can speak in the name of Caz here that we without question accept the apology with no hard feeling, I really think in the future anyone should really talk face to face (or by phone...) without prejudice and try to understand the problem.

We are here 24/7 to help you if needed to solve the security breach, since at the end this is ALL it is.

I truly hope you can enjoy this holiday even if you are probably occupied with this issue.

Respectfully,

TMM_John 12-22-2007 06:55 PM

Quote:

Originally Posted by milan (Post 13552710)
John,

People that know me aware how easy going I am.

We respected the major dilemma you were facing and really tried to help you, TMM and the industry securing the data nothing more.
Your product is great and we are working on a daily basis with your install and support team, what a great bunch of guys they are.

Me and I can speak in the name of Caz here that we without question accept the apology with no hard feeling, I really think in the future anyone should really talk face to face (or by phone...) without prejudice and try to understand the problem.

We are here 24/7 to help you if needed to solve the security breach, since at the end this is ALL it is.

I truly hope you can enjoy this holiday even if you are probably occupied with this issue.

Respectfully,

Thank you. We have really gotten off on the wrong foot here, which is my fault. I hope we can sit down in Vegas and get to know each other, as well as with Caz. I sent you an ICQ also but did not receive a reply, not sure if it made it through to you. My ICQ is 5596373.

seeric 12-22-2007 06:58 PM

just a little PSA here.

if you dont have this product, get it.

www.lifelock.com

change all your passwords to places that you use the same pass as your nats account.

problem solved, or at least your level of protection is intensely elevated.

i've been using this for a while and you wouldnt believe the activity a normal persons credit data sees. i get calls about once a month for someone or another trying to access my credit info for this or that.

its worth it.

milan 12-22-2007 07:10 PM

Quote:

Originally Posted by PBucksJohn (Post 13552720)
Thank you. We have really gotten off on the wrong foot here, which is my fault. I hope we can sit down in Vegas and get to know each other, as well as with Caz. I sent you an ICQ also but did not receive a reply, not sure if it made it through to you. My ICQ is 5596373.

Didn't get it as I'm not at my computer but my wifes notebook... will see it soon... thx for that.

Absolutely on the sit down, would be great to meet you heard lots of good things about you from a mutual friend (NJ guy that leave out here in Cali now)

munki 12-22-2007 07:20 PM

<---- not fucking happy at this point...

BoyAlley 12-22-2007 07:26 PM

You know what, maybe OC3 should have fucking come out about this issue MONTHS ago instead of rolling over because their clients, whoever they are, were fucking scared of the wrath of TMM John of all god forsaken people.

Instead who knows how many people have been fucked up their ass worse than me without lube in the 4 months since.

Now TMM's John is coming forward with some pathetic little "Oopsie daisy my fault I'm so sorry have cybersex with me on ICQ now", and OC3 is immediately all like "so what are you wearing".

Fucking retarded.

milan 12-22-2007 07:33 PM

Quote:

Originally Posted by BoyAlley (Post 13552803)
You know what, maybe OC3 should have fucking come out about this issue MONTHS ago instead of rolling over because their clients, whoever they are, were fucking scared of the wrath of TMM John of all god forsaken people.

Instead who knows how many people have been fucked up their ass worse than me without lube in the 4 months since.

Now TMM's John is coming forward with some pathetic little "Oopsie daisy my fault I'm so sorry have cybersex with my on ICQ now", and OC3 is all "so what are you wearing".

Fucking retarded.

Not everyone are angry little man and in seek of drama...

We respect first and foremost OUR customers, I have no problem with that do you? and if you saw the post we had a few months back you will see we did alerted the industry but I guess the subject of the post was not appealing enough for people to ask Q's.

V_RocKs 12-22-2007 07:36 PM

Nice... When it comes to security, there is no competition among hosting companies. I love that!


On a side note...

IP RESTRICTION...

But my IP address changes....

Bullshit. You make enough money to call your provider and request a PERMANENT one. But they don't provide one. What the fuck? Are you on Dialup because most Cable, DSL, Broadband providers WILL give you a permanent IP if you pay monthly for leasing. Usually $20. Consider it a cost of doing business and a tax write off.

OK... But I AM ON DIALUP! So pay an admin here to setup a proxy on a dedicated server with a NON-ADULT hosting company picked at random. Have that proxy password protected.

Case closed...

The fact that a village idiot can get into this industry if he has $100,000 in inheritance money frightens me. It frightens me because when it comes to security you are all village idiots! Every last one of you!

90&#37; of you have hackers on your boxes because they hacked your forum, your support system, your webcam software or by some other means. You don't know because all the hacker wants is your password DB and not the Emails.

They trade those DB's like Pokemon cards. They give 1 account away to each person who asks for them on newsgroups and IRC channels. It NEVER trips your strongbox, pennywize, proxy pass, etc, because they give each requester a different account. So even if the real user and the fake one use it at the same time they fall with in the AOL threshold (5 IP's in 15 minutes).

You all think.. Impossible because those previously mentioned programs shut this kinda shit down! No... They don't... Because each request gets a different account. This isn't password boards where 15,000 people get the same account. This is the designer version where everyone gets their own unique, free account.

But bandwidth is so cheap I don't give a fuck!... I know.. But in one channel on the IRC alone you will have up to 1000 people receive a password in a day. You are pissing away $35,000 a day! Smaller programs a few thousand...

Industry wide? About $800,000,000 a year is just pissed away...

OK.. Back to your original programming where you just bury your heads in the sand.

BoyAlley 12-22-2007 07:37 PM

Quote:

Originally Posted by milan (Post 13552832)
Not everyone are angry little man and in seek of drama...

We respect first and foremost OUR customers, I have no problem with that do you?


Yes you're right, a huge portion of the fucking industry potentially having personal details stolen, not to mention who the fuck nows how many unsuspecting members, that's just me seeking out drama huh?

As for your second comment, basically what you're saying is, people have to pay you if they expect to be let in on little secrets like major vulnerabilities with the most used affiliate management software in the industry, huh? Did I understand that correctly?

BoyAlley 12-22-2007 07:39 PM

I, for one, would absolutely LOVE to know who these chickenshit clients were that told OC3 networks to keep their mouth shut cuz they were scurred of TMM John. :321GFY

TheDoc 12-22-2007 07:46 PM

Quote:

Originally Posted by BoyAlley (Post 13552846)

Yes you're right, a huge portion of the fucking industry potentially having personal details stolen, not to mention who the fuck nows how many unsuspecting members, that's just me seeking out drama huh?

As for your second comment, basically what you're saying is, people have to pay you if they expect to be let in on little secrets like major vulnerabilities with the most used affiliate management software in the industry, huh? Did I understand that correctly?

Damn near every processor and a ton of other affiliate programs lists have been for sale for years, just ask around. People talk about it, hell posts have been deleted about them on GFY.

Every day hosting companies go through exploits, hacks, all types of shit. You don't see all the other Major Hosts posting what they found. They all host different programs with and without nats and nobody, no program, ever comes out and says shit about hacks/exploits.

And yes, you can guarantee that every host and affiliate program has gone through it's share of hacks and exploit issues. It's part of the business.

TheDoc 12-22-2007 07:49 PM

Sad as it is to say, this is a 10+ year problem and is probably one of the biggest reasons we have seen a down turn in our industry over the last 5ish years.

I have heard it from people straight up, and we all know it to be true to. Stolen email lists or not... If you signup for a porn site you will get spamed at some point down the road.

shuki 12-22-2007 07:57 PM

Quote:

Originally Posted by V_RocKs (Post 13552845)
Nice... When it comes to security, there is no competition among hosting companies. I love that!


On a side note...

IP RESTRICTION...

But my IP address changes....

Bullshit. You make enough money to call your provider and request a PERMANENT one. But they don't provide one. What the fuck? Are you on Dialup because most Cable, DSL, Broadband providers WILL give you a permanent IP if you pay monthly for leasing. Usually $20. Consider it a cost of doing business and a tax write off.

OK... But I AM ON DIALUP! So pay an admin here to setup a proxy on a dedicated server with a NON-ADULT hosting company picked at random. Have that proxy password protected.

Case closed...

The fact that a village idiot can get into this industry if he has $100,000 in inheritance money frightens me. It frightens me because when it comes to security you are all village idiots! Every last one of you!

90% of you have hackers on your boxes because they hacked your forum, your support system, your webcam software or by some other means. You don't know because all the hacker wants is your password DB and not the Emails.

They trade those DB's like Pokemon cards. They give 1 account away to each person who asks for them on newsgroups and IRC channels. It NEVER trips your strongbox, pennywize, proxy pass, etc, because they give each requester a different account. So even if the real user and the fake one use it at the same time they fall with in the AOL threshold (5 IP's in 15 minutes).

You all think.. Impossible because those previously mentioned programs shut this kinda shit down! No... They don't... Because each request gets a different account. This isn't password boards where 15,000 people get the same account. This is the designer version where everyone gets their own unique, free account.

But bandwidth is so cheap I don't give a fuck!... I know.. But in one channel on the IRC alone you will have up to 1000 people receive a password in a day. You are pissing away $35,000 a day! Smaller programs a few thousand...

Industry wide? About $800,000,000 a year is just pissed away...

OK.. Back to your original programming where you just bury your heads in the sand.

So how do we stop the theft?

shuki 12-22-2007 08:00 PM

Quote:

Originally Posted by TheDoc (Post 13552877)
Sad as it is to say, this is a 10+ year problem and is probably one of the biggest reasons we have seen a down turn in our industry over the last 5ish years.

I have heard it from people straight up, and we all know it to be true to. Stolen email lists or not... If you signup for a porn site you will get spamed at some point down the road.

Yep...I think part of the problem is that some in this industry will accept and capitalize on this activity.....as long as you can make money off the stolen lists and spamming people it won't stop.

V_RocKs 12-22-2007 08:30 PM

Well, how many programs support password lists through advertising?

Tons!

minusonebit 12-22-2007 08:44 PM

Quote:

Originally Posted by milan (Post 13552633)
I can't answer #1 as I knew they are trying to resolve this, they did not sit on their ass... (I still think letting the customers know would be first priority)

as for #2 I will repeat that we still have respect for the idea that security issues should be secret until their fixed. and was urged by our clients that we located the issue on their server NOT to go public or something bad will happen to them, who know what bad is but lawsuit and revoke of license is what I heard... can't confirm the second one.

Well, you gotta do right by your clients, I suppose... Milan, I know what a nice guy you are and in this case, I think you might have been a little bit too nice to the TMM folks. Thats what I was trying to say. From the TMM response, it doesn't sound like they were doing alot to fix the issue but were working overtime to keep it hush hush. I know what you are saying about the keeping it secret part, but there is a balance there. If they are not working on fixing it, then someone needs to disclose it to force their hand for the greater good. I don't blame anyone other than NATS/TMM for this.

Ycaza 12-22-2007 10:16 PM

woh, I am taken aback and happy to accept the apology. Thank you john, I just saw this. It is our pleasure to try and help the situation. If there is more I or we can do to help resolve this, let us know.

oh and boy alley we did, months ago. I helped not only our clients, but a bunch of nats customers called me personally for the fix. I had assumed the problem was fixed from there. We just uncovered it again, In what I am told is a slightly different form.

minusonebit 12-22-2007 10:41 PM

Quote:

Originally Posted by Dirty F (Post 13551935)
Wtf? Youre so fucking fucked in your head, you should seek help you fucking imbecile. I had my chance but got quiet? Had what chance you retard boy? Oh yeah now i remember, you said i stopped posting on gfy for 3 weeks after you said you would beat me up :1orglaugh:1orglaugh
Man, if you read all this shit back about yourself dont you just want to shoot yourself?
Please explain to me how exactly i got quiet and scared? :1orglaugh:1orglaugh Fucking delusional piece of password sharing shit!

Real simple. You stopped posting. Like I said. You signed off and no one heard from you for a while and you avoided the challenge thread like the plauge. But thats OK, I'll give you another chance. Any time you want to come and back your shit up Franck, lets go for it. I promise you I'll win and you will be a little bloody mess of broken bones and oozing sores.

st0ned 12-22-2007 11:02 PM

Quote:

Originally Posted by ronaldo (Post 13552084)
If I understand correctly from the other thread, OC3Networks is working with, or assisting MojoHost and quite possibly others as well.

If that's true, I have to give props to a company (that I don't host with btw) for working DIRECTLY WITH their competition to help solve an issue that effects our entire industry instead of capitalizing on it for their own gains.

That deserves the utmost respect.

:thumbsup

No kidding, they just got themselves a new customer :thumbsup

TMM_John 12-22-2007 11:03 PM

Quote:

Originally Posted by Ycaza (Post 13553356)
woh, I am taken aback and happy to accept the apology. Thank you john, I just saw this. It is our pleasure to try and help the situation. If there is more I or we can do to help resolve this, let us know.

oh and boy alley we did, months ago. I helped not only our clients, but a bunch of nats customers called me personally for the fix. I had assumed the problem was fixed from there. We just uncovered it again, In what I am told is a slightly different form.

You're very welcome. I made the mistake of lumping you in with some of the assholes here by assuming things others told me to be true rather than looking for myself which I something I always try to do in life. I'm sorry for that.

We also believed the issued had been fixed when it first popped up and was addressed. We also fully believed we had spoken with everyone it affected. Some people here would rather perpetuate the drama than listen to things tho :(

If we can be of any aid to you in helping your clients or if you have any info that we could use please know that the lines of communication are always open. I look forward to sitting down with you in Vegas also.

Paul Markham 12-23-2007 12:36 AM

Quote:

Originally Posted by milan (Post 13552832)
We respect first and foremost OUR customers, I have no problem with that do you? and if you saw the post we had a few months back you will see we did alerted the industry but I guess the subject of the post was not appealing enough for people to ask Q's.

I'm sorry but with an issue this big and TMM's response I would have found a few different ways to bring this to light. There are many posters who would of posted it for you without naming you as the source, there's opening a new GFY account and bouncing an old thread with new in depth info and there is finding a list of big NATS users you're not hosting and giving them a Heads up.

You backed off because John threatened legal action to your clients. Which is partly understandable, reflects badly on John as he must of known the last place he would go with this is court.

John I see you are still calling people names. If you're 101% innocent in this you're a bad businessman. Because the problem was shown to you and instead of fixing it and informing clients you chose to hide it and threaten VICTIMS with court action.

The problem continued, with your knowledge. Or did you not believe all the warning signs that were being shown to you while you were threatening people with court action?

Paul Markham 12-23-2007 12:44 AM

Quote:

Originally Posted by TheDoc (Post 13552877)
Sad as it is to say, this is a 10+ year problem and is probably one of the biggest reasons we have seen a down turn in our industry over the last 5ish years.

I have heard it from people straight up, and we all know it to be true to. Stolen email lists or not... If you signup for a porn site you will get spamed at some point down the road.

Sadly true. A large proportion of the people in the Adult Net have ethics that leave you wondering if they act like this in the rest of their life. Stealing anything on the Net is done by them on a basis of "If I can do it I will and it's acceptable." It seems they feel Internet propert can be taken at will.

I wonder how they would feel if someone drove off with their car because they had not totally disabled it?

xxxjay 12-23-2007 02:13 AM

Holy shit...

Zester 12-23-2007 04:51 AM

i'm getting depressed again...

RazorSharpe 12-23-2007 06:22 AM

Quote:

Originally Posted by PBucksJohn (Post 13553551)
You're very welcome. I made the mistake of lumping you in with some of the assholes here by assuming things others told me to be true rather than looking for myself which I something I always try to do in life. I'm sorry for that.

We also believed the issued had been fixed when it first popped up and was addressed. We also fully believed we had spoken with everyone it affected. Some people here would rather perpetuate the drama than listen to things tho :(

If we can be of any aid to you in helping your clients or if you have any info that we could use please know that the lines of communication are always open. I look forward to sitting down with you in Vegas also.

John, please give your clients a little respect. You are accussing us of perpetuating drama in an environment that YOU have made condusive to drama. What did you expect?

Oh and don't sit too close to Caz in vegas ... if his wallet gets lost you're totally fucked!

...

D-man 12-27-2007 12:50 AM

Quote:

Originally Posted by Headless (Post 13551306)
holy shit this isnt good...

lol and even headless posted on this :thumbsup

dicknixon 12-27-2007 01:51 AM

I bow down to Dale. He's the best admin I've ever dealt with.

Iron Fist 12-27-2007 06:43 PM

Blogs are linking to this thread :)

Dirty F 12-27-2007 07:00 PM











:warning

Paul Markham 12-28-2007 05:23 AM

Quote:

Originally Posted by milan (Post 13551150)
After many MANY emails and VM's I will post what OC3 Networks discovered back in October after routine audit of 2 of our clients security.

We know this issue exist since mid Aug 2007, secured our customers and blocked the intruder IP?s from any access to our network.

We posted the thread http://www.gfy.com/fucking-around-and-business-discussion/779742-oc3-networks-customers-urgent.html and got some lawsuit treat to sue us that we could have care less? BUT when our customers that we tracked the breach on their servers got treats as well and requested us to NOT come out public with it, we honored their request.


Just as a side info, I think NATS is a great product and it's a shame that after the months they had to fix or come clean with their clients it never happened...


Credit for this below info should go to our SUPER SYSADMIN/Security fanatic Dale that has never posted on this board so I'm doing this for him, He wanted to come out with this long ago!
=====
The issue with this "intruder" does not seem to be an exploit of the nats software itself. *Someone* has access to TMM's clients database with your admin logins and passwords. That?s what the issue is. I'm not posting this to bash TMM. I'm posting this because they have had month to fix this issue and have apparently failed. They didn't even let (some of?) their customers know they implemented this "Admin activity log" and installed it behind their backs.

I've been involved with a high number of NATS clients and have found the following to be true:
*) Changing all admin level account passwords stops the intruder. He still attempts to login, but in vain.
*) As soon as TMM has admin access to NATS the intruder is back. Sometimes the same day.
*) Intruder is using an automation script that dumps the NATS members list. In some cases he is doing this every hour on the hour.
*) If you have web logs, look for hits against "admin_reports.php?report=surfer_stats&member=#### ##". You will see a number of those hits in sequential order.
*) NATS was vulnerable to SQL injection attacks. I haven't investigated whether it still is.

I have some suggestions for people using NATS:
*) Change all your admin level passwords.
*) Do not give TMM an admin account they can use anytime they want. Change the pass when they are done.
*) Restrict access to the admin*.php files by IP. This is inconvenient, but if you can do this it will circumvent any future intrusion. There may be other files you want to do this with. You can do this with apache easily (syntax depends on your version. this is for 2.0):
<Files "admin*">
Order deny,allow
Deny from all
Allow from your.ip.addr.here
</Files>
*) Keep an eye on the ssh user you have given TMM to fix/maintain your NATS install. Change their password every time they need access and as soon as they are done. I have experience with TMM ssh-ing in and making changes to NATS software without permission.
*) Be thankful of many things I'll not get into.

Time to bump this so people know.

Paul Markham 12-28-2007 11:10 AM

It's time for another and another part in bold.

Quote:

Originally Posted by milan (Post 13551150)
After many MANY emails and VM's I will post what OC3 Networks discovered back in October after routine audit of 2 of our clients security.

We know this issue exist since mid Aug 2007, secured our customers and blocked the intruder IP?s from any access to our network.

We posted the thread http://www.gfy.com/fucking-around-and-business-discussion/779742-oc3-networks-customers-urgent.html and got some lawsuit treat to sue us that we could have care less? BUT when our customers that we tracked the breach on their servers got treats as well and requested us to NOT come out public with it, we honored their request.

Just as a side info, I think NATS is a great product and it's a shame that after the months they had to fix or come clean with their clients it never happened...


Credit for this below info should go to our SUPER SYSADMIN/Security fanatic Dale that has never posted on this board so I'm doing this for him, He wanted to come out with this long ago!
=====
The issue with this "intruder" does not seem to be an exploit of the nats software itself. *Someone* has access to TMM's clients database with your admin logins and passwords. That?s what the issue is. I'm not posting this to bash TMM. I'm posting this because they have had month to fix this issue and have apparently failed. They didn't even let (some of?) their customers know they implemented this "Admin activity log" and installed it behind their backs.

I've been involved with a high number of NATS clients and have found the following to be true:
*) Changing all admin level account passwords stops the intruder. He still attempts to login, but in vain.
*) As soon as TMM has admin access to NATS the intruder is back. Sometimes the same day.
*) Intruder is using an automation script that dumps the NATS members list. In some cases he is doing this every hour on the hour.
*) If you have web logs, look for hits against "admin_reports.php?report=surfer_stats&member=#### ##". You will see a number of those hits in sequential order.
*) NATS was vulnerable to SQL injection attacks. I haven't investigated whether it still is.

I have some suggestions for people using NATS:
*) Change all your admin level passwords.
*) Do not give TMM an admin account they can use anytime they want. Change the pass when they are done.
*) Restrict access to the admin*.php files by IP. This is inconvenient, but if you can do this it will circumvent any future intrusion. There may be other files you want to do this with. You can do this with apache easily (syntax depends on your version. this is for 2.0):
<Files "admin*">
Order deny,allow
Deny from all
Allow from your.ip.addr.here
</Files>
*) Keep an eye on the ssh user you have given TMM to fix/maintain your NATS install. Change their password every time they need access and as soon as they are done. I have experience with TMM ssh-ing in and making changes to NATS software without permission.
*) Be thankful of many things I'll not get into.


P.S. Im hearing that there is a backdoor that TMM can use to get into your NATS, but I havent investigated so its speculation. Only reason I even mention this is because NATS is encrypted and you dont know. Im not interested in decrypting NATS just to find out. There are other ways. I hope this isn?t true.

NATS is a great program.

minusonebit 12-29-2007 06:12 PM

Back up to the top. At least Milan brought this forward. Most people probably wouldn't have had the stones.

TidalWave 12-29-2007 10:12 PM

OC3 Networks ROCKS!

www.oc3networks.com


All times are GMT -7. The time now is 07:32 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123