![]() |
Quote:
|
Quote:
I am not sure how NATS works from the inside. If they have admin access, do they also have access to affiliate info as well? |
Quote:
|
Quote:
|
Quote:
|
additional info... not sure how important it is:
Joined Last Login 12/21/07 17:03:59 12/21/07 16:02:46 I've had nats since about July... but the user naqIPksxjBioBI who was admin since time of install says joined today. ??? |
Quote:
|
Quote:
Think of all the other info they had access to ... |
Quote:
i will be submitting a ticket now. thanks for the help and attention in this matter. |
Quote:
|
Quote:
|
Quote:
|
Quote:
The ICQ's I have been getting all day are fucking unreal as to who knew about the exploit as it effected them as far back as a YEAR. This has been going on for a long time to lots of programs and I am totally disgusted right now. Take it a step further - The programs benefiting from these lists being used/mailed promoting their products :disgust Anyone here feeling fucking violated? John again thank you for your support and getting that email out. I'm still shaking my head as to why it took you so long. You've know about this for a long time there is 100% no question about that. But at least you did it and now people are aware and can lock down to stop this shit. Instead of covering this issue up you now look like a hero just from that one email. Go figure |
Quote:
|
Quote:
|
Quote:
Nothing is going to prevent this from happening 100% in the future. The average server security in this industry is horrible. And many people with very bad security insist they know everything about it and are 100% secure. We have assisted a number of clients privately in helping them secure their servers which they claimed were bullet proof. Unfortunately we are dealing with criminals here. They will continue to hack servers, be they NATS clients, clients of other software, or whatever. If NATS could magically prevent people's servers from being compromised I would be a very retired man. |
Quote:
|
According to Fred in v3 the Join Date you are being shown is the date the account info was last modified and it is the password update that is causing the dates to be showing as today.
|
Quote:
|
Quote:
It is my belief that someone is accessing the server that NATS is on and retrieving the admin password directly from the server. Then using that password in whatever script they have to login as it is less obvious than them accessing your box directly on a regular basis. We are however changing our policy to no longer keep any NATS admin passwords as we have done with SSH info in the past to be sure it is not something on our end. |
Quote:
|
Quote:
|
Quote:
It takes all of 1 min to back up your nats templates. I would suggest you do that now |
Quote:
|
Quote:
Quote:
|
Quote:
|
Quote:
I am not saying things people have said are horrendous. People have asked me to go into details about what we know and what we have done in the past here. I'm simply saying I think this is not the place for that. |
Im still in a state of utter disbelief that they knew or so long and didnt think to tell us.
|
Quote:
I'm wondering if you have or are going to contact the authorities? |
Quote:
I still do not believe it is a completely widespread issue but we are taking strong action anyway. |
Quote:
|
Strong action doesnt mean shit now its happened, you have totally lost my confidence in your software, there has been a lot of talk everywhere about whats best NATS or CCbill, I think this turn of events has just answered that common thread topic!
|
Quote:
|
Quote:
It looks like NATS has a security hole which is/is being/has been closed, I dunno. But you all need to be taking your customer's data security seriously and checking login logs periodically. You, the user are ultimately responsible for that. We are proactive on these matters, which is why we've been breach-free for some time now |
I am out of town and getting on a plane shortly. This will be my last post in this thread for at least hours. Please submit tickets if you have any further questions.
|
It seems clear to me until TMM sorts its issues out sponsors can either wait and see or move now, theres plenty of options that john seriously needs to address namely MPA3 and Epoch are looking like a better option right now.
|
Quote:
I know firms in the UK facing BIG fines. I presume that websites based in the UK could also be subject to BIG fines. |
Looks pretty widespread to me...
|
The scary thing is how easy MPA and Nats are to hack. The even scarier thing is both of those companies think their program can not be hacked. If they'd get off their high horse for a second they'd realize how many exploits each of them has they may be able to actually secure their script. Instead they are too busy getting drunk on their own kool aid.
Anybody thinking of buying Nats should read John's posts in this thread. Is that the type of guy you want to do business with? |
Quote:
People in this thread are funny. Noone cares about their security untill it's either a) posted on a public board b) starts receiving complaints from members |
All times are GMT -7. The time now is 01:23 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123