![]() |
Quote:
Actually, it was more of a jesting remark with a touch of irony. |
Quote:
Geez, someone's on the defensive. |
Quote:
Its not being defensive. I don't appreciate people implying things, with a question mark or without, which they have no solid reason to believe as true. |
Wow! do we know how they got the user and pass to the admin?
|
Quote:
theres a couple scums here that hack affiliate databases for information. its well known who a few of them are. |
Quote:
John - Have you been alerted to this exploit in the past? It's been posted before here and on other boards. If you were aware, have you alerted your clients to sweep? This isn't about nats / paycom / mpa / ccbill etc - This is a serious exploit that is effecting peoples business's. If a member get spammed to all hell from a site he just joined... The trust between service and customer is gone. That member will not rebill nor return ever. :2 cents: |
Quote:
|
Quote:
|
Quote:
There will always be are various security issues with all softwares as well as issues with client's servers. Due to the install rate of NATS being far beyond any other affiliate software in this industry you are much more likely to hear about our issues than others. |
Quote:
|
Quote:
|
Quote:
|
Quote:
|
Quote:
Idea - Why don't you step back from GFY - Type out a mass email to your clients right now and send it so they are aware of the exploit. :upsidedow This is blowing me away sigh |
Quote:
|
Quote:
I know you are also only trying to help here. An email will be going out shortly. Jumping the gun and misinforming people is a bad thing also. |
Quote:
|
Quote:
This is a serious issue and one that needs to be handled expeditiously and I for one want to know how this happened and why it happened. This isn't a chance exploit of an admin account. The person knew enough to gain access to the NATS specific admin account and has done so on numerous installs that I currently know of. Based on this fact alone, you cannot blame any of us for thinking that it may perhaps have not been a security exploit but rather a leaked password. Asking those who find an issue to contact you is kind of silly since it is now safe to assume that anyone who has not disabled the NATS account has been compromised or will be compromised in due course. ... |
Mine is too long to post ...
But to give you a slight idea: 67.19.188.250 - 2007-12-21 14:37:29 67.19.188.250 - 2007-12-21 08:37:51 67.19.188.250 - 2007-12-21 02:37:33 67.19.188.250 - 2007-12-20 20:37:28 67.19.188.250 - 2007-12-20 18:10:30 67.19.188.250 - 2007-12-20 14:37:38 67.19.188.250 - 2007-12-20 08:37:39 67.19.188.250 - 2007-12-20 02:38:03 67.19.188.250 - 2007-12-19 20:37:39 67.19.188.250 - 2007-12-19 18:12:43 67.19.188.250 - 2007-12-19 14:38:13 67.19.188.250 - 2007-12-19 08:38:12 67.19.188.250 - 2007-12-19 02:38:08 67.19.188.250 - 2007-12-18 20:38:10 67.19.188.250 - 2007-12-18 17:24:26 67.84.12.95 - 2007-12-18 15:02:06 67.19.188.250 - 2007-12-18 14:38:05 67.19.188.250 - 2007-12-18 08:38:06 69.94.70.187 - 2007-12-18 02:38:04 65.110.53.100 - 2007-12-17 17:05:59 65.110.53.100 - 2007-12-17 14:38:18 65.110.53.100 - 2007-12-17 08:38:19 65.110.53.100 - 2007-12-17 02:38:19 65.110.53.100 - 2007-12-16 17:00:41 65.110.53.100 - 2007-12-16 14:38:14 65.110.53.100 - 2007-12-16 08:38:13 65.110.53.100 - 2007-12-16 02:38:14 65.110.53.100 - 2007-12-15 20:38:13 65.110.53.100 - 2007-12-15 16:59:57 65.110.53.100 - 2007-12-15 14:33:23 65.110.53.100 - 2007-12-15 08:33:53 65.110.53.100 - 2007-12-15 02:33:27 65.110.53.100 - 2007-12-15 01:00:16 0.0.0.0 - 2007-12-14 02:38:23 0.0.0.0 - 2007-12-13 20:38:25 0.0.0.0 - 2007-12-13 16:57:41 0.0.0.0 - 2007-12-13 14:38:13 0.0.0.0 - 2007-12-13 08:38:14 0.0.0.0 - 2007-12-13 02:38:12 0.0.0.0 - 2007-12-12 20:38:14 0.0.0.0 - 2007-12-12 17:11:35 0.0.0.0 - 2007-12-12 14:38:18 0.0.0.0 - 2007-12-12 08:38:18 0.0.0.0 - 2007-12-12 02:38:18 0.0.0.0 - 2007-12-11 20:38:18 0.0.0.0 - 2007-12-11 16:57:08 0.0.0.0 - 2007-12-11 14:37:58 67.84.12.95 - 2007-12-11 13:01:47 67.84.12.95 - 2007-12-11 10:26:32 0.0.0.0 - 2007-12-11 08:37:58 |
This happend to our 2 nats installs a few months ago, I was told to change my password, such I did. Well it happended again this week with a new IP logging in to my admin, I notified nats and was told to change the password again. I have blocked any and all IP's on the server level except mine from accessing the admin now, as there is ovisuouly a person able to get these passwords easily and steal any and all data anything they want.
No blame, just the facts. I suggest everyone have there admins do the same. |
Quote:
|
Quote:
I feel it is not in anyone's best interest to discuss this in public. If anyone would like more details you are welcome to contact us. |
what the sweet fuck is going on then? Ive been with NATS years and I would like to auto assume our data is just that, ours! We also have to abide by our UK data protection laws which if in this case was broken outside our control.
John whats going on?? |
Quote:
... |
My install is also showing the NATS user as having been logging in often. I'm not aware of any reason why anybody from nats would be logging in without my knowledge.
Account deleted and ticket submitted to NATS. I'll be following this thread closely. |
ive noticed last login on ours at - 12/21/07 16:32:16 John explain why you as a company with you as its head needed to login to my install today, was something wrong with it?
|
Quote:
Lots of my allys use NATS and I have alerted them to this thread so they can sweep their sites asap. These are my friends man - I'm doing my part in protecting them the best I can. Please do yours and send that email now before everyone goes away for the holidays. It's already 2:00 on the west coast, 5 on the east. |
Quote:
|
The following email is going out to all NATS clients now:
Quote:
|
John - can I remove the user?
|
Woop, mass NATS email:
Dear NATS Client, We have become aware of a security issue involving a few of our clients and would like to take this opportunity to aid you in improving the security of your NATS install. There are a number of ways that you can strengthen the security of your NATS install: 1. It is recommended that you IP restrict access to your NATS admin area through the NATS configuration. To set this up, you can place a comma separated list of IP addresses that you wish to allow access to your NATS admin in the ADMIN_IPS field in your configuration admin. 2. We have recently added a new feature that gives you the ability to have all requests to your admin area of NATS posted to a URL of your choice. These posts will include the IP and loginid of the user that is accessing any admin page. This will allow you to closely monitor all admin accesses to your install. Please put in a support ticket if you wish to be updated with this feature. To be as secure as possible we will be initiating a password change for the TMM admin accounts on all NATS installs on which we have the ability to and we will no longer be storing these passwords at all. We have done this in the past with server access passwords and feel the best way to be as secure as possible is to extend this practice to admin logins also. This will of course cause us to need to contact you to grant access when we must perform anything on your install. If you have any questions or require any assistance in setting up or changing your NATS configurations or passwords please post a ticket in our support system. Thank you, Too Much Media |
Quote:
|
Quote:
|
Quote:
|
it looks and smells like an inside job to me everyones got the same ips showing up, no chance this is a random event!
|
Had the same...I was on my own paysite as member to check if mails would come in etc. Within a few days I received spam!
It really sucks hard, and I'm sure many sites are affected. The one who made the script, knows exactly what he/she did, and I'm sure he//she is making a LOT of money with those emails. And I understand NATS doesn't want to discuss it on a public forum. But an email to customers would be welcome(which is send now) I am just curious of this was not posted if it would have arrived that fast too... |
67.19.188.250 - 2007-12-21 16:02:46
17 times... rapidnetuk.com Country United States State/Region TX City Dallas Postal Code 75207 Latitude 32.7825 Longitude -96.8207 Area Code 214 69.94.70.187 - 2007-12-18 04:03:39 1 time... 65.110.53.100 - 2007-12-17 18:14:40 14 times... Country Greece 0.0.0.0 - 2007-12-14 04:04:20 about 30 times up to Dec. 1st. Account Deleted. No accusations, just want to get my info out there to try and help remedy the situation. |
this issue is more than emails, whoever is behind it has had access to sales data members details, ive been having a run of passwords blocked by proxy pass or having more than 3 country IP's these pass's were for rock solid affiliates etc kinda makes sense now someone been using other data as well, this really sucks!
|
Quote:
My NATS is VERY customized and I've spent too much time and money to have someone able to just gank or even delete my templates. |
looks serious
|
All times are GMT -7. The time now is 01:23 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123