![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
So Fucking Banned
Industry Role:
Join Date: Apr 2001
Location: the beach, SoCal
Posts: 107,089
|
WHMCS Billing system database compromised
Unfortunately today we were the victim of a malicious social engineering attack which has resulted in our server being accessed, and our database being compromised.
To clarify, this was no hack of the WHMCS software itself, nor a hack of our server. It was through social engineering that the login details were obtained. As a result of this, we recommend that everybody change any passwords that they have ever used for our client area, or provided via support ticket to us, immediately. Regrettably as this was our billing system database, if you pay us by credit card (excluding PayPal) then your card details may also be at risk. This is just a very brief email to alert you of the situation, as we are currently working very hard to ensure everything is back online & functioning correctly, and I will be writing to you again shortly. We would like to offer our sincere apologies for any inconvenience caused. We appreciate your support, now more than ever in this challenging time. ---- WHMCS Limited www.whmcs.com |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
Liv Benson to You, Bitch
Industry Role:
Join Date: Aug 2007
Location: Maryland and WV
Posts: 6,060
|
And why are they keeping CC numbers on their server? Aren't they supposed to keep those with their merchant?
__________________
![]() ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 |
So Fucking Banned
Industry Role:
Join Date: Apr 2001
Location: the beach, SoCal
Posts: 107,089
|
Anxiety guy, capable of leaping to the worst possible conclusion at a single bound. They would have name, type of card, security code, exp date and last 4 digits. Makes it a lot easier to brute force.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 | |
Liv Benson to You, Bitch
Industry Role:
Join Date: Aug 2007
Location: Maryland and WV
Posts: 6,060
|
Quote:
![]()
__________________
![]() ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 | |
Confirmed User
Join Date: Oct 2002
Posts: 3,745
|
baddog, props for full disclosure.
Quote:
Your brief post also indicated at least one other specific vulnerability, with a specific fix that should be done. I won't post details here. Sure there was a social engineering component, and there were a couple of architecture problems that turned that attack into something much more serious than it should have been. ONLY tickets should have been exposed by a successful attack, not login passwords, CC info, etc. You don't need to, and aren't supposed to by PCI, store ANY track information on a public web server. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 | |
So Fucking Banned
Industry Role:
Join Date: Apr 2001
Location: the beach, SoCal
Posts: 107,089
|
Quote:
You would probably be a good one to ask, what do they mean that it was done via social engineering? |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#7 |
So Fucking Banned
Industry Role:
Join Date: Apr 2001
Location: the beach, SoCal
Posts: 107,089
|
They aren't talking about phishing are they? Like they responded to one that screwed us all?
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#8 | |
Confirmed User
Join Date: Feb 2007
Location: www.BareBacked.com
Posts: 3,685
|
Quote:
http://en.wikipedia.org/wiki/Social_...%28security%29 |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#9 |
Confirmed User
Join Date: Feb 2007
Location: www.BareBacked.com
Posts: 3,685
|
Following an initial investigation I can report that what occurred today was the result of a social engineering attack.
The person was able to impersonate myself with our web hosting company, and provide correct answers to their verification questions. And thereby gain access to our client account with the host, and ultimately change the email and then request a mailing of the access details. This means that there was no actual hacking of our server. They were ultimately given the access details. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#10 | |
Confirmed User
Join Date: Oct 2002
Posts: 3,745
|
Quote:
Another example would be if I called your web hosting company pretending to be you. I would call at 2AM, when their boss isn't there, just the new guy working the shit shift. I'd claim (or cause) a server down and ask for a KVM to be put on it immediately. That KVM would let me boot into special rescue modes where passwords aren't required. But yeah, phishing would be the most simplistic form of social engineering, social engineering for morons.
__________________
For historical display only. This information is not current: support@bettercgi.com ICQ 7208627 Strongbox - The next generation in site security Throttlebox - The next generation in bandwidth control Clonebox - Backup and disaster recovery on steroids |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#11 |
Too lazy to set a custom title
Industry Role:
Join Date: Oct 2002
Location: Punta Cana, DR
Posts: 29,591
|
password changed ... everything looked normal .
__________________
I know that Asspimple is stoopid ... As he says, it is a FACT ! But I can't figure out how he can breathe or type , at the same time .... |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#12 | |
So Fucking Banned
Industry Role:
Join Date: Apr 2001
Location: the beach, SoCal
Posts: 107,089
|
Quote:
Safety first. Wonder how the person was able to answer the security questions properly; must know him. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#13 |
Confirmed User
Industry Role:
Join Date: May 2010
Posts: 5,735
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#14 |
Confirmed User
Industry Role:
Join Date: May 2010
Posts: 5,735
|
Looks like they took over their twitter account as well? http://twitter.com/#!/whmcs/status/204596829042638848 jesus.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#15 |
Confirmed User
Join Date: Oct 2002
Posts: 3,745
|
Or found him on Facebook. Which high school attended? It's on Facebook. Pet's name? On Facebook. Favorite sports team? Also on Facebook.
__________________
For historical display only. This information is not current: support@bettercgi.com ICQ 7208627 Strongbox - The next generation in site security Throttlebox - The next generation in bandwidth control Clonebox - Backup and disaster recovery on steroids |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#16 |
Confirmed User
Industry Role:
Join Date: Aug 2006
Location: Poland
Posts: 9,228
|
Could have been somethign as simple as someone phoning pretending to be their webhost saying something is wrong with the server, the password they have on file doesn't work and they don't want to reset it if they can avoid it.
__________________
Mechanical Bunny Media Mechbunny Tube Script | Mechbunny Webcam Aggregator Script | Custom Web Development |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#17 |
Confirmed User
Industry Role:
Join Date: Jan 2002
Location: Huntington Beach, CA
Posts: 8,582
|
Lloyd,
We are happy to help WHMCS setup through our gateway under our PCI certification which will ease the burden of them having to store any credit card data. Let me know if you.they are interested. Mitch
__________________
![]() Mitch Farber CEO - NETbilling, Inc. Email / Phone: 888-357-8166 / 661-252-2456 Transaction processing & 24/7 call center services with exceptional rates and flexibility, since 1998! |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#18 |
¯\_(ツ)_/¯
Industry Role:
Join Date: Aug 2004
Posts: 11,475
|
social engineering? it is a new wording for "our admin used the same password for master billing account and also for some social crap"? congrats lol
![]() ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#19 | |
Confirmed User
Industry Role:
Join Date: May 2010
Posts: 5,735
|
Quote:
-edit- and data has been leaked and does include credit card information according to some people...that sucks ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#20 |
Just Doing My Own Thing
Industry Role:
Join Date: Jan 2011
Location: London, Spain, New Zealand, GFY - Not Croydon...
Posts: 25,064
|
There appears to be a lot of confusion in this thread!!
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#21 |
Confirmed User
Industry Role:
Join Date: May 2009
Location: Onboard an airplane around the globe
Posts: 3,735
|
Social engineering, send a pretty girl and some alcohol and people (insecure guys who want to brag) will start talking. And if the girl is any good at pretending to be interested, he will show her, login and try to show off.
Easiest thing in the world. Or if you need an access code to a locked part of the building, to open a door, easy peasy to just hang out by the digit pad and pretend to be on the phone walking up or down and then "just happen" to glare over when the access code is punched by someone. Or pretend to be from AT&T to get into almost any building, just claim there was an error report called in about their phone system and that you're here to take a look. Won't get you into any secure parts of the building but will certainly get you through the door!
__________________
---------------------------------------------------------------------------------- The truth is not affected by the beliefs, or doubts, of the majority. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#22 | |
Too lazy to set a custom title
Industry Role:
Join Date: Jul 2006
Location: A magical land
Posts: 15,808
|
Quote:
Surprised you are unaware of social engineering. Kevin Mitnick was asked if a computer locked in a safe offline was the safest place to put it. He replied no, he'd just ring up, get someone to open the safe and turn it on for him. The best one his did before he turned whitehat was to go into an office and 'accidentally' drop a floppy disc with salaries.xls written on it. SOMEONE would find it, and they would, out of curiosity put it in their PC. Bingo. He was then in. Nowadays hardly anyone does brute force attacks. It's so much easier just to ask people to tell you the information. A survey showed that 70% of people would give up their passwords in return for a bar of chocolate. http://www.techrepublic.com/blog/sec...-near-you/5368 Fascinating. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#23 |
Carpe Visio
Industry Role:
Join Date: Jul 2002
Location: New York
Posts: 43,061
|
Pretty much guessing passwords or convincing someone to give up a bit of info that makes it easier for them to obtain the password.
Phishing. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#24 |
Confirmed User
Join Date: Oct 2002
Posts: 3,745
|
Put a little baby or powder (or plain dirt) on the keypad first and with a glance you only need to see if they start by pressing the buttons near the top or the ones near the bottom. I once rescued some servers from the old Alphared / Acronoc datacenter after the operators fled, leaving everyone's servers locked inside. Not saying HOW I got into the building, just that I did.
__________________
For historical display only. This information is not current: support@bettercgi.com ICQ 7208627 Strongbox - The next generation in site security Throttlebox - The next generation in bandwidth control Clonebox - Backup and disaster recovery on steroids |
![]() |
![]() ![]() ![]() ![]() ![]() |