![]() |
Quote:
|
Quote:
|
Quote:
It takes all of 1 min to back up your nats templates. I would suggest you do that now |
Quote:
|
Quote:
Quote:
|
Quote:
|
Quote:
I am not saying things people have said are horrendous. People have asked me to go into details about what we know and what we have done in the past here. I'm simply saying I think this is not the place for that. |
Im still in a state of utter disbelief that they knew or so long and didnt think to tell us.
|
Quote:
I'm wondering if you have or are going to contact the authorities? |
Quote:
I still do not believe it is a completely widespread issue but we are taking strong action anyway. |
Quote:
|
Strong action doesnt mean shit now its happened, you have totally lost my confidence in your software, there has been a lot of talk everywhere about whats best NATS or CCbill, I think this turn of events has just answered that common thread topic!
|
Quote:
|
Quote:
It looks like NATS has a security hole which is/is being/has been closed, I dunno. But you all need to be taking your customer's data security seriously and checking login logs periodically. You, the user are ultimately responsible for that. We are proactive on these matters, which is why we've been breach-free for some time now |
I am out of town and getting on a plane shortly. This will be my last post in this thread for at least hours. Please submit tickets if you have any further questions.
|
It seems clear to me until TMM sorts its issues out sponsors can either wait and see or move now, theres plenty of options that john seriously needs to address namely MPA3 and Epoch are looking like a better option right now.
|
Quote:
I know firms in the UK facing BIG fines. I presume that websites based in the UK could also be subject to BIG fines. |
Looks pretty widespread to me...
|
The scary thing is how easy MPA and Nats are to hack. The even scarier thing is both of those companies think their program can not be hacked. If they'd get off their high horse for a second they'd realize how many exploits each of them has they may be able to actually secure their script. Instead they are too busy getting drunk on their own kool aid.
Anybody thinking of buying Nats should read John's posts in this thread. Is that the type of guy you want to do business with? |
Quote:
People in this thread are funny. Noone cares about their security untill it's either a) posted on a public board b) starts receiving complaints from members |
Quote:
|
Quote:
damn, I'm getting a bad throat *cough* |
Quote:
|
Quote:
have a drink of water. |
Quote:
Quote:
|
Quote:
|
Please see thread
http://www.gfy.com/showthread.php?t=779742 issue was knows to them LONG ago but rather then notifying customer they preferred the scare tactics... called Caz and threaten to sue. great way to conduct business. :2 cents: |
Quote:
John's many posts have me feeling like a mug especially considering that he feels the problems was not widespread and he only informed certain clients who he thought it might have affected. Why not email all clients and request that they submit a ticket for an upgrade and have the TMM techs check it across the board? This could have been prevented if they had informed all clients from the get go. Your mightier than thou attitude about how little and how much people know or don't know is what is funny about this thread. ... |
Quote:
As the day goes on and more people keep coming to me saying "Thank You" it just keeps getting better and better. I'm at a loss for words right now. :disgust |
Quote:
Have your system admin monitor all admin accounts. By doing that you will have no more problems from this. |
Quote:
Fact 1. Several webmasters in this very thread knew about these issues. They ignored them knowingly (not the nats issue, the issues that their data is leaking) Fact 2. Several webmasters in this thread have been notified of harvesting emails from their databases in the past and have chose to ignore it (unrelated to the problem in the thread, but they have the hollier then thou attitude) Fact 3. There's alot more webmasters on this board that know their databases are compromised and still chose to ignore it. Now crawl back to where you came from since you have no idea what im talking about. Nats was once a good product while Nathan was around. I don't like John from TMM, nor do i like Garry from MPA, nor do i like any other software producer more then the other. I'm just stating facts. Facts you have no idea about. |
Thank you for this thread.
A real eye opener... and answers a few questions about security that have recently come up! |
Hmm??
Here's something about your Fred Schank. Scroll down to the 3rd post under service providers http://www.getafreelancer.com/projec...rogrammer.html "I am the lead programmer for a software company based in NJ. We design backend software for webmasters. I have done the majority of the programming on a CMS geared towards the adult industry. I am interested in finding a few projects to work on, during my free time" |
Can't post other forums, so here's screen cap.
http://i15.tinypic.com/6l171gx.jpg |
Quote:
lets see how far this rabbit hole goes... |
Quote:
... |
This is going to be a loooooooooooooooong thread.
best get your sig spots in and pretend you have somthing important to say on the subject. Looks like xmass will suck this year for Nats. |
Quote:
There are A LOT of responsible programme owners in this industry, some are more conscious and aware about certain matters than others, and nobody has ignored anything. |
We did not plan to post in this thread since it had nothing to do about
us. But ShotGun and ladida changed that and their posts needs a reply from us. Now I don't want to go in to a discussion about whether this was a hack or an inside job. But ShotGun and ladida are correct when he say that any program is hackable. However, they are not correct when they say that we think that our program cannot be hacked. We are very aware of this, and have taken all available precautions possible and we continue to strive to keep up to date on what possible hackers try to achieve. We even hired two known hackers to try to hack in to our program, and on top of that when a prominent program moved over to MPA3 we had to have a 3rd party audit company go over the whole source code. All of this and still I am not saying we are totally un-touchable. No one is. However, the last two years we have not had one report about any hacks, we have gotten plenty of hack attempts reported, but no actual breach. But maybe the most important thing is that when and if we do get any breach we stop everything else we are doing to fix and update all programs. I can also guarantee you all that we do not have any one password working as master access to all MPA3 installs. |
Quote:
|
We were affected by this as well.... thanks to Razorsharpe for calling me today to bring this to my attention. We'll be talking to the NATS guys tomorrow and hoping to have this resolved. Nats isn't exactly cheap, I really shouldn't have to deal with problems like this.
|
Quote:
Have a good Holiday people - It's family time :thumbsup |
I sure hope all the techs at NATS got their Xmas shopping done early - doesn't look like they'll have time this weekend.
I truly hope that Swiftwill being diligent with security, covered our ass with this. |
Quote:
Quote:
Furthermore, there's alot of backstabbing in this thread from people that supposedly "want to help". So nats got hacked. WOOO HOOO... What do you (or other in the thread) know exactly of the time that Mansion got hacked? Strongbox? Sitedepth? AdultWebware? Or any other shit that people use? So some are furious that they have not been notified? LOL. Get a grip. Ofcourse John is not gona make a public statement their server is compromised (if it is), or that they have a problem in the code. It'd be a suicide. Same as when any other porn company gets hacked, you don't see a public apology here that people's emails/personal info got harvested do you? No, they fix the shit and move on (or don't even fix it and blame someone else). Or when software companies fix faults in their software on your server without you even knowing that it was a live exploit through which your server got hacked? |
Quote:
Re-read through the thread, as some users posted instructions on how to deny Fred from gaining access to the admin |
I would hope all of you who have been affected will contact the authorities about this. Whoever did this has to be somewhat knowledgeable with the industry. A run-of-the-mill hacker would have harvested the CC data as well as the e-mail data. The hacker knew what they could and couldn't get away with.
I'd suggest looking at the spam e-mails you received following the member signups. See if there is a common sponsor or theme to those spams. See if you can get the affiliate data from that particular sponsor. It shouldn't be too difficult to see who profited off this data. |
ccbill is coming out with their new cascading system right on time..
|
Question for NATS sponsors. Would this have given them access to affiliate data? We promote a lot of NATS sponsors and store not only our business information but bank information and our password. I just want to know if they can see that and if so, we will change the payment method until the issue is resolved.
|
Quote:
|
Glad I dont use Nats
|
All times are GMT -7. The time now is 09:31 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123