vb.org Archive

vb.org Archive (https://vborg.vbsupport.ru/index.php)
-   vB4 General Discussions (https://vborg.vbsupport.ru/forumdisplay.php?f=251)
-   -   Why the silence? (https://vborg.vbsupport.ru/showthread.php?t=304565)

motorhaven 11-15-2013 04:33 AM

Why the silence?
 
Why is VB.org and VB.com being silent on the fact that both were hacked yesterday, and access to customer data was gained? What is being done to protect VB license holders? You ought to at least email people so they can change their passwords rather than leaving it up to some outside source for us to find out about this!

Unfortunately, I don't have much faith ya'll will let this post stick around.

New Joe 11-15-2013 04:37 AM

How do you know they were hacked?

motorhaven 11-15-2013 04:51 AM

Because the people who did it posted screenshots of the contents of the file systems. Macrumors was compromised as a result of this as well, and 800,000 user accounts possibly compromised. They made it a point to announce it so their users could take again, Internet Brands has not. Inexcusable!


https://www.facebook.com/inj3ct0rs/p...11793255548704
This is the group that did it and they include the screen captures from the shell they managed to install on the servers.

Again, I ask... why the silence? This explains why the VB.org site was mysteriously down last night!

WEBDosser 11-15-2013 06:03 AM

Well I never..

Amaury 11-15-2013 07:16 AM

I wouldn't solely trust a screenshot if my life depended on it.

ozzy47 11-15-2013 09:32 AM

I seriously doubt such a thing happened, but if it truely did, I am sure we would be advised of it.

Dave 11-15-2013 10:57 AM

I guess he's referring to this http://1337day.com/exploit/description/21518
Kinda scary, 0days.

motorhaven 11-15-2013 12:14 PM

Quote:

Originally Posted by ozzy47 (Post 2460888)
I seriously doubt such a thing happened, but if it truely did, I am sure we would be advised of it.

1. A contractor for VB has already admitted it, then tried to bluff it out by saying it was "beta" installation on their server which was hit. But BOTH .com and .org were down, and screen shots show access to non-beta installations. http://www.theadminzone.com/forums/s...d.php?t=105650

2. It happened at the same time both VB.com and VB.org sites were mysteriously down.

3. The Mac site has already widely reported in the press.... then again they did the right thing and told their users immediately.

4. Just a few weeks ago the install directory exploit was reported by VB, and they pulled a similar move not broadcasting that there was an exploit until it was already widely known. I did consulting cleaning up hacked VB sites. This is not something I care to do with my consulting time, because it's money out of small business pockets they should not have had to spend!

I have defended the product for a long time when others haven't --- this I cannot.

lapiervb 11-15-2013 12:17 PM

I read the same thing here -> http://www.theadminzone.com/forums/s...d.php?t=105650


Can anybody confirm this is true?

ForceHSS 11-15-2013 12:18 PM

From what i can see its not true

lapiervb 11-15-2013 12:34 PM

Quote:

Originally Posted by ForceHSS (Post 2460910)
From what i can see its not true

And what do you see? Did you read this somewhere? Has VB come out and said this did not happen? Or does "from what you can see" mean you "hope" its not true??

DemOnstar 11-15-2013 01:11 PM

Why the silence?

Because nobody is saying anything of course...

motorhaven 11-15-2013 01:19 PM

Quote:

Originally Posted by ForceHSS (Post 2460910)
From what i can see its not true

Did you even read that thread? One of VB's guys admitted it.

Paul M 11-15-2013 01:23 PM

Quote:

Originally Posted by motorhaven (Post 2460907)
1. A contractor for VB has already admitted it, then tried to bluff it out by saying it was "beta" installation on their server which was hit. But BOTH .com and .org were down, and screen shots show access to non-beta installations. http://www.theadminzone.com/forums/s...d.php?t=105650

2. It happened at the same time both VB.com and VB.org sites were mysteriously down.

You are making stuff up here.

1. I stated (correctly) that the server they hacked was an old QA stage server.

2. The server was not hacked yesterday, the screenshots date it at sometime in October (more than likely they did it even earlier, just took later shots).

3. vb.org & vb.com were last down (12th/13th depending on your timezone) because of scheduled work on the database server.

You are free to discuss this situation on vb.org, you are not free to make up stuff.

nerbert 11-15-2013 02:00 PM

One little inconsistency here is that the facebook announcement says the vulnerability is in vB4 and vB5 and they hacked vBulletin.org. vBulletin.org uses vb3.6.12. Why didn't the announcement say the vulnerability is in vB3 as well?

If you're so sure this is true then buy their patch (NOT!!!!!)

Quote:

Originally Posted by Inj3ct0r Exploit DataBase
All those wishing to buy a vulnerability and patch your forum : h t t p ://1337day.com/exploit/description/21518


motorhaven 11-15-2013 02:19 PM

Quote:

Originally Posted by Paul M (Post 2460922)
You are making stuff up here.

1. I stated (correctly) that the server they hacked was an old QA stage server.

2. The server was not hacked yesterday, the screenshots date it at sometime in October (more than likely they did it even earlier, just took later shots).

3. vb.org & vb.com were last down (12th/13th depending on your timezone) because of scheduled work on the database server.

You are free to discuss this situation on vb.org, you are not free to make up stuff.

IB really needs to invest in CRM (last sentence of your reply). There is a big difference between "making stuff up" and not having information which agrees with yours.

Test QA system or not the screen shots show access to vb.org, vb.com, flyertalk and 5series.net information. What exposure did users of these forums have?

ForceHSS 11-15-2013 04:31 PM

Quote:

Originally Posted by lapiervb (Post 2460916)
And what do you see? Did you read this somewhere? Has VB come out and said this did not happen? Or does "from what you can see" mean you "hope" its not true??

Its not true because the ss they show are not vb just something they made up to look like hackers.

motorhaven 11-15-2013 05:03 PM

Quote:

Originally Posted by ForceHSS (Post 2460960)
Its not true because the ss they show are not vb just something they made up to look like hackers.

The crackers used the VB database to get a password to a person who is a moderator on MacRumors. They then used to this to hack MacRumors because the moderator used the same password on both sites. MacRumors admitted to the hack. Or are they just making it up too?

ForceHSS 11-15-2013 05:20 PM

I am talking about vbulletin offical site when did I ever start talking about MacRumors as you started to say this on your first post that vbulletin.com and vbulletin.org have been hacked

Max Taxable 11-15-2013 06:27 PM

November: THE month for conspiracy nutter bilge water and bile!

motorhaven 11-15-2013 06:39 PM

Quote:

Originally Posted by ForceHSS (Post 2460967)
I am talking about vbulletin offical site when did I ever start talking about MacRumors as you started to say this on your first post that vbulletin.com and vbulletin.org have been hacked

You aren't paying attention to what I said. The password to Macrumors to was obtained BECAUSE VB.com was hacked. Once someone obtains access to a vb database it doesn't take much computational power to crack the passwords. MD5 password protection is weak. It's been a known weak hash method since 1996, and more weaknesses found in 2004.

Max Taxable 11-15-2013 06:41 PM

This is so laughable... If they soooo want us to believe any of this they should have been able to deface the sites in question without too much trouble.

It didn't happen.

motorhaven 11-15-2013 06:45 PM

Quote:

Originally Posted by Max Taxable (Post 2460982)
This is so laughable... If they soooo want us to believe any of this they should have been able to deface the sites in question without too much trouble.

It didn't happen.

So when Macrumors announced they were hacked they were lying? Yes? No?

Max Taxable 11-15-2013 06:47 PM

Quote:

Originally Posted by motorhaven (Post 2460983)
So when Macrumors announced they were hacked they were lying? Yes? No?

I am talking about vB dot org. I don't give a red rat's ass about MacRumors, or any of the rumors about it.

And by the way, it is NOT a unusual event for a site to LIE about being "hacked."

Amaury 11-15-2013 06:48 PM

Quote:

Originally Posted by motorhaven (Post 2460981)
You aren't paying attention to what I said. The password to Macrumors to was obtained BECAUSE VB.com was hacked. Once someone obtains access to a vb database it doesn't take much computational power to crack the passwords. MD5 password protection is weak. It's been a known weak hash method since 1996, and more weaknesses found in 2004.

Quote:

Originally Posted by motorhaven (Post 2460983)
So when Macrumors announced they were hacked they were lying? Yes? No?

See below:

Quote:

Originally Posted by Paul M (Post 2460922)
You are making stuff up here.


motorhaven 11-15-2013 07:02 PM

Quote:

Originally Posted by Max Taxable (Post 2460984)
I am talking about vB dot org. I don't give a red rat's ass about MacRumors, or any of the rumors about it.
And by the way, it is NOT a unusual event for a site to LIE about being "hacked."

Weren't you the one who just a few days ago lamented about how poor VB's security record has been?

Max Taxable 11-15-2013 07:04 PM

Quote:

Originally Posted by motorhaven (Post 2460991)
Weren't you the one who just a few days ago lamented about how poor VB's security record has been?

That's vB 4. Not vBulletin in general.

But at least in those instances there was a shred of proof, not just dummied up screenshots from illiterate script kiddies, posted on facebook.

motorhaven 11-15-2013 07:13 PM

Quote:

Originally Posted by Max Taxable (Post 2460992)
That's vB 4. Not vBulletin in general.

You're not serious, are you? Here are 50 vulnerabilities in 3.x versions, and that's just through 2007!
http://www.cvedetails.com/vulnerabil...Vbulletin.html

Quote:

But at least in those instances there was a shred of proof, not just dummied up screenshots from illiterate script kiddies, posted on facebook.
http://www.macrumors.com/2013/11/12/...security-leak/

Max Taxable 11-15-2013 07:15 PM

Quote:

Originally Posted by motorhaven (Post 2460995)
You're not serious, are you?

Since you believe this so strongly, almost religiously and without a shred of actual proof - I am sure you bought the illiterate script kiddie's "patch" and installed it, right?

Did it occur to you the "patch" when installed, is actually the exploit? It's called "social engineering" and it's a tried and true form of "hacking."

Interesting you believe the MacRumors claim, but dismiss Paul's claim. One of them fits your paranoid rant, the other doesn't.

Zachery 11-15-2013 07:17 PM

Quote:

Originally Posted by motorhaven (Post 2460995)
You're not serious, are you? Here are 50 vulnerabilities 3.x versions, and that's just through 2007!
http://www.cvedetails.com/vulnerabil...Vbulletin.html

A fair few of those that I see require some level of administrator privilege... administrators are gods.

ozzy47 11-15-2013 07:19 PM

So they hacked vb.com and vb.org, so they could get this dudes password and hack MacRumors

Sounds to me like stealing the keys to a Chevy to drive a Ford.

Max Taxable 11-15-2013 07:33 PM

1 Attachment(s)
The claim: vBulletin dot org was hacked yesterday
The evidence: Zero

Result is attached.

And right now, because we refuse to believe the religious ramblings, he is desperately trying to figure out what sites we have, to feed us to the illiterate hax0rs...

motorhaven 11-15-2013 07:49 PM

Quote:

Originally Posted by Max Taxable (Post 2460996)
Since you believe this so strongly, almost religiously and without a shred of actual proof - I am sure you bought the illiterate script kiddie's "patch" and installed it, right?

Did it occur to you the "patch" when installed, is actually the exploit? It's called "social engineering" and it's a tried and true form of "hacking."

Put away your lame assumptions about someone's experience and your weak lessons before you embarrass yourself. I know what social engineering is - I was dealing with people doing that stuff back in the 1980s, when I wasn't busy coding in assembler. That was well before I started one of the first enthusiast groups on the Internet.

Quote:

Interesting you believe the MacRumors claim, but dismiss Paul's claim. One of them fits your paranoid rant, the other doesn't.
Macrumors has nothing to gain by saying they were hacked. They have credibility to lose, as a matter of fact.

Max Taxable 11-15-2013 07:51 PM

Quote:

Originally Posted by motorhaven (Post 2461003)
Put away your lame assumptions about someone's experience and your weak lessons before you embarrass yourself. I know what social engineering is - I was dealing with people doing that stuff back in the 1980s, when I wasn't busy coding in assembler. That was well before I started one of the first enthusiast groups on the Internet.

Macrumors has nothing to gain by saying they were hacked. They have credibility to lose, as a matter of fact.

And we still have ZERO evidence that vB dot org was hacked, as you claimed.

You never answered the question either. DID you buy the "patch" from the illiterate script kiddies and install it? If not, why are you promoting it?

ForceHSS 11-15-2013 08:53 PM

Quote:

Originally Posted by motorhaven (Post 2460981)
You aren't paying attention to what I said. The password to Macrumors to was obtained BECAUSE VB.com was hacked. Once someone obtains access to a vb database it doesn't take much computational power to crack the passwords. MD5 password protection is weak. It's been a known weak hash method since 1996, and more weaknesses found in 2004.

Someone needs to chill pill. Stop posting crap like this your just making it worse for yourself

Paul M 11-15-2013 08:55 PM

Quote:

Originally Posted by motorhaven (Post 2460963)
The crackers used the VB database to get a password to a person who is a moderator on MacRumors. They then used to this to hack MacRumors because the moderator used the same password on both sites. MacRumors admitted to the hack. Or are they just making it up too?

Where exactly have MacRumors admitted that they were hacked because (1) A moderator used the same password on vb.com and their site, (2) Assuming they cracked the password from vb.com, this moderator account was used to hack them ?

Digital Jedi 11-16-2013 10:39 AM

Quote:

Originally Posted by motorhaven (Post 2460867)
Again, I ask... why the silence? This explains why the VB.org site was mysteriously down last night!

So you believe that vB.org and vB.com were hacked, going by the time stamp on your post, Thursday.


Quote:

Originally Posted by motorhaven (Post 2460907)
2. It happened at the same time both VB.com and VB.org sites were mysteriously down.

And at the same time as MacRumors.


Quote:

Originally Posted by motorhaven (Post 2460939)
Test QA system or not the screen shots show access to vb.org, vb.com, flyertalk and 5series.net information. What exposure did users of these forums have?

And into a vBulletin 3 site using a vBulletin 4 exploit.


Quote:

Originally Posted by motorhaven (Post 2460963)
The crackers used the VB database to get a password to a person who is a moderator on MacRumors. They then used to this to hack MacRumors because the moderator used the same password on both sites. MacRumors admitted to the hack. Or are they just making it up too?

Quote:

Originally Posted by motorhaven (Post 2460981)
You aren't paying attention to what I said. The password to Macrumors to was obtained BECAUSE VB.com was hacked. Once someone obtains access to a vb database it doesn't take much computational power to crack the passwords. MD5 password protection is weak. It's been a known weak hash method since 1996, and more weaknesses found in 2004.

Then they used the information they hacked from vBulletin.org Thursday, to hack into MacRumors....on Monday????


Either the hackers are time travellers or, as was repeatedly stated, hacking had nothing to do with .com and .org being down last night. Which would explain how you get into a vB3 site using a vB4 exploit. You don't.

You can see where this information all seems kinda suspicious, especially since MacRumors says they were hacked in a similar manner to the way Ubuntu Forums was hacked. And Ubuntu Forums was hacked in July. Again, there's no suspicious timing with vBulletin being down yesterday that coincides with either of these forums being hacked. In both cases, a moderator/administrator having their personal accounts hacked. Why would you need to hack vB.com and vB.org .... to hack a completely different website in the exact same manner? To borrow from ozzy's analogy, that's stealing the keys to the Chevy. Hot wiring the Ford. Then saying the Chevy made me do it. It doesn't make a lick of sense.

Simon Lloyd 11-16-2013 11:07 AM

Unfortunately there IS some evidence about macrumours here http://www.informationweek.com/secur.../d-id/1112235? and their admission here http://www.macrumors.com/2013/11/12/...security-leak/ although i see no evidence of any vb hacking!
Quote:

Originally Posted by informationweek.com
In the case of MacRumors, however, lol said that the vBulletin software wasn't to blame for the breach, saying instead that "the fault lied within a single moderator." That suggests that a MacRumors moderator chose an insecure password, which lol either guessed, or matched using a dictionary attack, which attempts to guess passwords by using an exhaustive list of likely matches.


ozzy47 11-16-2013 11:13 AM

If you read in that first link you posted, http://www.informationweek.com/secur.../d-id/1112235? this is what the hacker said.

Quote:

In the case of MacRumors, however, lol said that the vBulletin software wasn't to blame for the breach, saying instead that "the fault lied within a single moderator." That suggests that a MacRumors moderator chose an insecure password, which lol either guessed, or matched using a dictionary attack, which attempts to guess passwords by using an exhaustive list of likely matches.

Simon Lloyd 11-16-2013 11:33 AM

lol already posted that in my post :-)


All times are GMT. The time now is 07:03 PM.

Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.

X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.03088 seconds
  • Memory Usage 1,859KB
  • Queries Executed 10 (?)
More Information
Template Usage:
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (32)bbcode_quote_printable
  • (1)footer
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (6)option
  • (1)pagenav
  • (1)pagenav_curpage
  • (2)pagenav_pagelink
  • (1)post_thanks_navbar_search
  • (1)printthread
  • (40)printthreadbit
  • (1)spacer_close
  • (1)spacer_open 

Phrase Groups Available:
  • global
  • postbit
  • showthread
Included Files:
  • ./printthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/class_bbcode_alt.php
  • ./includes/class_bbcode.php
  • ./includes/functions_bigthree.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • printthread_start
  • pagenav_page
  • pagenav_complete
  • bbcode_fetch_tags
  • bbcode_create
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • printthread_post
  • printthread_complete