![]() |
I really need to read more, or sleep more, I swear, all the text starts to look the same after awhile. :)
|
Interestingly, (Or perhaps not) I did a page source code reading of vB dot org while it was down. It showed a 101 error on the server, server down. As with maintenance. There was NO evidence of any "hacking."
Again - why didn't the script kiddies deface the site for their street cred? Why did they have to dummy up a screenshot for their claim? Oh... Because it never happened. |
Hi everyone,
I just wanted to stop by and make sure, we don't need to apply any patches or fixes to our sites, right? Still no vulnerabilities in 4.2.2? Thanks very much |
The best way to protect yourself is make sure you mods have safe passwords and comment out their ability to use HTML.
|
Quote:
|
Quote:
|
Yeah I believe they added that in there, instead of just making you just delete the file.
|
So.. I have emails from vb.com asking to change my password and saying they where hacked.
--------------- Added [DATE]1384626102[/DATE] at [TIME]1384626102[/TIME] --------------- take a look at vb.com cannot get in to change anything |
Strange, I got in and changed my PW no problem, all I did was log in, using my old PW, and then changed it.
|
Quote:
|
Yeah vb.com gave out a duff link but if you login and go here go here http://www.vbulletin.com/forum/setti...ngs-module-top you'll be golden!
--------------- Added [DATE]1384626578[/DATE] at [TIME]1384626578[/TIME] --------------- I got this from them a few minutes ago Quote:
|
It won't let me change my password on .com
|
Few things are worse than and yet more humorous than, hax0r paranoia.
|
So I'm jus wondering - I just got the email ( screenshot below) . Did this happen or not? I was sort of waiting to see if something would be posted in my admincp or something...
https://vborg.vbsupport.ru/external/2013/11/29.png My gut was that this is a phishing email but I don't know.... |
Quote:
|
Better off to be safe that sorry, But I would not follow the links in the email just to be safe, navigate to the site like you normally would.
|
lol so they did get hacked.. haha
|
I was asked to change my password when getting on just now because it's been 100 days and it therefore expired.
Must have been a recent change for security reasons, which I have no problems with, because I only update my passwords about every six months (twice a year), and I didn't get that message before. |
So wait, they went ahead and sent out emails to change your password just to sate hacking paranoia?
|
Quote:
|
Quote:
|
Quote:
Quote:
Quote:
DO NOT USE THE SAME PASSWORD FOR EVERY SITE! Buy a cheap black ledger book from an office supply store/wal-mart etc and write down the passwords for each site, keep in your desk drawer for easy reference. You can also have your broswer remember passwords, I do the ledger book because if the right virus hits your pc then all that info is known as well. |
Quote:
|
Quote:
I use the same password for all sites I'm a member of (e.g., YouTube), However, on sites where I'm a staff member, such as KH-Flare, I use a different password, which is currently the only site I have a different password on. The other sites I'm staff on aren't big / don't have a lot on them at the moment, so I use the same password as places I'm of a member of, but it's a secure password. Then there are also sites that you're staff on, but you're only a sectional moderator that, of course, doesn't have access to the admin or moderator control, so it doesn't really matter. I actually look at the security more than the uniqueness when it comes to passwords |
What hasn't been disclosed and concerns me is whether the hackers had access to customer records and financial information, and the support system which must contain a large amount of fairly sensitive customer information...
|
Not really sure what financial information you mean.
All the log files that were examined do not show any attemped access of customer data in the support system, they basically targeted the vb user table. |
Quote:
Quote:
The right thing was not IB employees initially taking the Baghdad Bob role. |
Just to keep this clear...
No one has yet said vbulletin DOT COM wasn't possibly hacked. The meter was this site, vbulletin DOT ORG. From the link in post #3, there is NO claim of vb dot org being part of this "hack." And many here have expressed their doubts a exploit for version 4 would also automatically mean this site which uses version 3 was also "hacked." As far as I can tell, only the author of the first post is claiming it's also vB dot org which was "hacked." There isn't one shred of proof of that and it's not even a claim the illiterate script kiddies with their dummied up screenshot and their "patch for sale" are even making. |
Just got this e mail:
Quote:
|
So... can someone explain how exactly they hacked vb.com. Can we have some more detailed answers?
|
Posts edited or removed.
I will repeat one more time, this thread is not for made up nonsense. Stick to facts, dont go making things up. |
Quote:
|
Quote:
|
Quote:
|
Quote:
There was nothing at all about vB dot org in any of it. |
Quote:
|
Quote:
You never answered my questions. Have you bought their "patch?" If not, why are you promoting it? |
Quote:
Its not know exactly how, but at one point there were in the region of 100 old installs on it, so anyone of them could have been used. The best guess from evidence is that they hacked it sometime in late summer, and at some point between then and early October they uploaded adminer. They then appear to have cracked a mysql user password for the Live DB server, and used it (via adminer) to read the vb.com and vb.org user tables. After that it appears they moved on (they deleted adminer). Nothing was known about this until their facebook post the other day. |
Quote:
|
Quote:
|
All times are GMT. The time now is 10:25 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|