GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Paycom or NATS spamming our members? (https://gfy.com/showthread.php?t=793881)

chri$tian 12-21-2007 04:06 PM

Quote:

Originally Posted by kristin (Post 13548367)
What about our templates, webmaster info, sales stats?

My NATS is VERY customized and I've spent too much time and money to have someone able to just gank or even delete my templates.

If they have an admin user and pass the would have full access to EVERYTHING you have access to, think about it... Not good.

TheSenator 12-21-2007 04:09 PM

Quote:

Originally Posted by AtlasChris (Post 13548390)
If they have an admin user and pass the would have full access to EVERYTHING you have access to, think about it... Not good.


I am not sure how NATS works from the inside. If they have admin access, do they also have access to affiliate info as well?

tdfcash3 12-21-2007 04:10 PM

Quote:

Originally Posted by AtlasChris (Post 13548390)
If they have an admin user and pass the would have full access to EVERYTHING you have access to, think about it... Not good.

Exactly and how many sponsors are we talking, how much info in total has been compromised?

TMM_John 12-21-2007 04:12 PM

Quote:

Originally Posted by Trixxxia (Post 13548233)
John - can I remove the user?

Yes, you can of course.

TMM_John 12-21-2007 04:15 PM

Quote:

Originally Posted by RazorSharpe (Post 13548272)
was it an ex NATS employee?

We have nothing that leads us to believe that. Everything indicates that it is an outside person who has accessed passwords somehow. There are a number of ways some of these passwords may have been compromised including but not limited to them getting the admin password by accessing a client's server and taking it from the DB. Passwords in NATS3 are 2 way encrypted. This is changed to 1 way encryption in NATS4 and we are also going to be putting out a patch for NATS3 which changes this to one way encryption.

Luca_Triple 10 12-21-2007 04:16 PM

additional info... not sure how important it is:

Joined
Last Login
12/21/07 17:03:59
12/21/07 16:02:46

I've had nats since about July... but the user naqIPksxjBioBI who was admin since time of install says joined today. ???

TMM_John 12-21-2007 04:19 PM

Quote:

Originally Posted by Luca_Triple 10 (Post 13548431)
additional info... not sure how important it is:

Joined
Last Login
12/21/07 17:03:59
12/21/07 16:02:46

I've had nats since about July... but the user naqIPksxjBioBI who was admin since time of install says joined today. ???

It says it logged in today or it says it joined today? It would much better assist us and you to contact us and work with us on resolving the issue rather than just posting all of the info you find here. The person doing these things may very well monitor here.

kristin 12-21-2007 04:22 PM

Quote:

Originally Posted by AtlasChris (Post 13548390)
If they have an admin user and pass the would have full access to EVERYTHING you have access to, think about it... Not good.

Oh I know, that's why I'm surprised people are only going off about the emails.

Think of all the other info they had access to ...

Luca_Triple 10 12-21-2007 04:23 PM

Quote:

Originally Posted by PBucksJohn (Post 13548435)
It says it logged in today or it says it joined today? It would much better assist us and you to contact us and work with us on resolving the issue rather than just posting all of the info you find here. The person doing these things may very well monitor here.

it says they logged in and joined today.

i will be submitting a ticket now. thanks for the help and attention in this matter.

kristin 12-21-2007 04:24 PM

Quote:

Originally Posted by TheSenator (Post 13548402)
I am not sure how NATS works from the inside. If they have admin access, do they also have access to affiliate info as well?

They would have access to that, yes.

TMM_John 12-21-2007 04:25 PM

Quote:

Originally Posted by Luca_Triple 10 (Post 13548448)
it says they logged in and joined today.

i will be submitting a ticket now. thanks for the help and attention in this matter.

Thank you. We are doing a mass change of any password our guys have, but I believe that should not affect the join date. I appreciate your help on this.

chri$tian 12-21-2007 04:26 PM

Quote:

Originally Posted by tdfcash3 (Post 13548406)
Exactly and how many sponsors are we talking, how much info in total has been compromised?

With this post and the people I have spoken with personally, its about 10 to 15 confirmed. But ya have to think it many more, if its that easy. After everything is changed and locked down on the server level, there wont be any, easy fix.

SiMpLe 12-21-2007 04:26 PM

Quote:

Originally Posted by justsexxx (Post 13548299)
Had the same...I was on my own paysite as member to check if mails would come in etc. Within a few days I received spam!

It really sucks hard, and I'm sure many sites are affected. The one who made the script, knows exactly what he/she did, and I'm sure he//she is making a LOT of money with those emails.

And I understand NATS doesn't want to discuss it on a public forum. But an email to customers would be welcome(which is send now)

I am just curious of this was not posted if it would have arrived that fast too...

This is not new as of today justsexxx as I've found out from current nats clients this has effected in the past. But NATS did finally alert every single one of their clients to this issue on 12/21/07 - Merry Xmas

The ICQ's I have been getting all day are fucking unreal as to who knew about the exploit as it effected them as far back as a YEAR. This has been going on for a long time to lots of programs and I am totally disgusted right now.

Take it a step further - The programs benefiting from these lists being used/mailed promoting their products :disgust Anyone here feeling fucking violated?

John again thank you for your support and getting that email out. I'm still shaking my head as to why it took you so long. You've know about this for a long time there is 100% no question about that. But at least you did it and now people are aware and can lock down to stop this shit.

Instead of covering this issue up you now look like a hero just from that one email. Go figure

tdfcash3 12-21-2007 04:31 PM

Quote:

Originally Posted by AtlasChris (Post 13548461)
With this post and the people I have spoken with personally, its about 10 to 15 confirmed. But ya have to think it many more, if its that easy. After everything is changed and locked down on the server level, there wont be any, easy fix.

yeh ive just swapped all details on current admins and disabled the nats admin, ill look over their other info to secure it.

TampaToker 12-21-2007 04:32 PM

Quote:

Originally Posted by Luca_Triple 10 (Post 13548448)
it says they logged in and joined today.

i will be submitting a ticket now. thanks for the help and attention in this matter.

Showing they joined today as well.........

TMM_John 12-21-2007 04:32 PM

Quote:

Originally Posted by SiMpLe (Post 13548465)
This is not new as of today justsexxx as I've found out from current nats clients this has effected in the past. But NATS did finally alert every single one of their clients to this issue on 12/21/07 - Merry Xmas

The ICQ's I have been getting all day are fucking unreal as to who knew about the exploit as it effected them as far back as a YEAR. This has been going on for a long time to lots of programs and I am totally disgusted right now.

Take it a step further - The programs benefiting from these lists being used/mailed promoting their products :disgust Anyone here feeling fucking violated?

John again thank you for your support and getting that email out. I'm still shaking my head as to why it took you so long. You've know about this for a long time there is 100% no question about that. But at least you did it and now people are aware and can lock down to stop this shit.

Instead of covering this issue up you now look like a hero just from that one email. Go figure

What we have found in the past lead us to believe it was not widespread and that we could prevent it via doing what we did. I think we prevented a lot of it and I do not believe it as far wide spread as some people here seem to enjoy making it out to be. As we have now seen the issue pop up again we have taken even further action against any problems continuing.

Nothing is going to prevent this from happening 100% in the future. The average server security in this industry is horrible. And many people with very bad security insist they know everything about it and are 100% secure. We have assisted a number of clients privately in helping them secure their servers which they claimed were bullet proof.

Unfortunately we are dealing with criminals here. They will continue to hack servers, be they NATS clients, clients of other software, or whatever. If NATS could magically prevent people's servers from being compromised I would be a very retired man.

TMM_John 12-21-2007 04:34 PM

Quote:

Originally Posted by TampaToker (Post 13548496)
Showing they joined today as well.........

Please submit a ticket also so we can have our guys get a good look. This is making me worry someone is somehow injecting these. Our code is routinely audited for SQL injections however that doesn't guarantee there are other ways to do it, or that someone is doing it directly to your MySQL server or in some other way. Please get a ticket submitted so we can take a look.

TMM_John 12-21-2007 04:38 PM

According to Fred in v3 the Join Date you are being shown is the date the account info was last modified and it is the password update that is causing the dates to be showing as today.

jcsike 12-21-2007 04:39 PM

Quote:

Originally Posted by PBucksJohn (Post 13548497)
If NATS could magically prevent people's servers from being compromised I would be a very retired man.

through your username/password, you mean. you couldnt call up your clients, one at a time and ask them to change the pw and upgrade their security?

TMM_John 12-21-2007 04:41 PM

Quote:

Originally Posted by jcsike (Post 13548527)
through your username/password, you mean. you couldnt call up your clients, one at a time and ask them to change the pw and upgrade their security?

Those who we had an indication had a problem were notified. And we changed all passwords.

It is my belief that someone is accessing the server that NATS is on and retrieving the admin password directly from the server. Then using that password in whatever script they have to login as it is less obvious than them accessing your box directly on a regular basis.

We are however changing our policy to no longer keep any NATS admin passwords as we have done with SSH info in the past to be sure it is not something on our end.

borked 12-21-2007 04:45 PM

Quote:

Originally Posted by PBucksJohn (Post 13547959)
Exactly. Discussing the details of a security issues and the actions taken on it in a public forum, especially one with the member base we have here, is absurd.

How is making people aware of an exploit that's been going on for some time a security issue? Nobody has posted how the exploit is achieved - just forewarning others that the issue is a real issue, which has made you sit up and take action. Isn't that a Good Thing??

TMM_John 12-21-2007 04:49 PM

Quote:

Originally Posted by borked (Post 13548549)
How is making people aware of an exploit that's been going on for some time a security issue? Nobody has posted how the exploit is achieved - just forewarning others that the issue is a real issue, which has made you sit up and take action. Isn't that a Good Thing??

I did not say pointing it out is a bad thing. I said discussing the details of it, what is being done, and what is being done to combat it isn't the smartest.

datatank 12-21-2007 04:51 PM

Quote:

Originally Posted by kristin (Post 13548367)
What about our templates, webmaster info, sales stats?

My NATS is VERY customized and I've spent too much time and money to have someone able to just gank or even delete my templates.


It takes all of 1 min to back up your nats templates. I would suggest you do that now

kristin 12-21-2007 04:57 PM

Quote:

Originally Posted by datatank (Post 13548565)
It takes all of 1 min to back up your nats templates. I would suggest you do that now

They all are, not the point.

borked 12-21-2007 05:02 PM

Quote:

Originally Posted by PBucksJohn (Post 13548558)
I did not say pointing it out is a bad thing. I said discussing the details of it, what is being done, and what is being done to combat it isn't the smartest.

I'm not quite sure what you mean by discussing the details of it. All that has been posted are a set of IPs from a scammer, so that others can check their logs. Like you said:

Quote:

Originally Posted by PBucksJohn (Post 13548497)
I do not believe it as far wide spread as some people here seem to enjoy making it out to be.

Through this very thread, started by someone wanting to know what was happening, other people have stepped forward with information that has helped others realise what has gone on. Followed on by your email, now all NATS clients realise there is a problem. Nothing untoward or compromising to others has been discussed.

borked 12-21-2007 05:03 PM

Quote:

Originally Posted by datatank (Post 13548565)
It takes all of 1 min to back up your nats templates. I would suggest you do that now

for those that aren't sure - just a mysql dump/backup, which you are all doing regularly anyway right :winkwink: takes care of all that

TMM_John 12-21-2007 05:06 PM

Quote:

Originally Posted by borked (Post 13548607)
I'm not quite sure what you mean by discussing the details of it. All that has been posted are a set of IPs from a scammer, so that others can check their logs. Like you said:



Through this very thread, started by someone wanting to know what was happening, other people have stepped forward with information that has helped others realise what has gone on. Followed on by your email, now all NATS clients realise there is a problem. Nothing untoward or compromising to others has been discussed.

You're right, the end result has been a good thing. It has also resulted in us making a policy change. Although I don't think it is the root of the issue it is better to be safe than sorry.

I am not saying things people have said are horrendous. People have asked me to go into details about what we know and what we have done in the past here. I'm simply saying I think this is not the place for that.

tdfcash3 12-21-2007 05:06 PM

Im still in a state of utter disbelief that they knew or so long and didnt think to tell us.

Nysus 12-21-2007 05:06 PM

Quote:

Originally Posted by PBucksJohn (Post 13548534)
Those who we had an indication had a problem were notified. And we changed all passwords.
...

Not to bust balls, but hasn't the only indication so far been members who have signed up and cared enough to sign up with a unique email address to then determine they were receiving spam? That's a pretty rare thing to happen..

I'm wondering if you have or are going to contact the authorities?

TMM_John 12-21-2007 05:15 PM

Quote:

Originally Posted by tdfcash3 (Post 13548627)
Im still in a state of utter disbelief that they knew or so long and didnt think to tell us.

We were not under the impression it was a widespread problem or we would have made an announcement as we have in the past.

I still do not believe it is a completely widespread issue but we are taking strong action anyway.

TMM_John 12-21-2007 05:16 PM

Quote:

Originally Posted by Nysus (Post 13548628)
Not to bust balls, but hasn't the only indication so far been members who have signed up and cared enough to sign up with a unique email address to then determine they were receiving spam? That's a pretty rare thing to happen..

I'm wondering if you have or are going to contact the authorities?

After we collect all of the info we can we will see what we can do with it. However, I'm sure they will wish to speak with those who are having their systems accessed. We can not act on your behalf in that regard.

tdfcash3 12-21-2007 05:21 PM

Strong action doesnt mean shit now its happened, you have totally lost my confidence in your software, there has been a lot of talk everywhere about whats best NATS or CCbill, I think this turn of events has just answered that common thread topic!

TMM_John 12-21-2007 05:23 PM

Quote:

Originally Posted by tdfcash3 (Post 13548679)
Strong action doesnt mean shit now its happened, you have totally lost my confidence in your software, there has been a lot of talk everywhere about whats best NATS or CCbill, I think this turn of events has just answered that common thread topic!

I'm sorry to hear that.

borked 12-21-2007 05:24 PM

Quote:

Originally Posted by Nysus (Post 13548628)
Not to bust balls, but hasn't the only indication so far been members who have signed up and cared enough to sign up with a unique email address to then determine they were receiving spam? That's a pretty rare thing to happen..

I'm wondering if you have or are going to contact the authorities?

tdfcash3 raised this point and a very valid one. European law for example is extremely strict and clear on this matter, and all programme owners anyway, but especially Europe need to take data security very VERY seriously. The end user of any software that implements personal data storage is ultimately responsible for the security of that data. Not TMM. Most all business software is closed source, so everyone in this industry needs to not be complacent that because XYZ is their software that it's secure.

It looks like NATS has a security hole which is/is being/has been closed, I dunno. But you all need to be taking your customer's data security seriously and checking login logs periodically. You, the user are ultimately responsible for that.

We are proactive on these matters, which is why we've been breach-free for some time now

TMM_John 12-21-2007 05:24 PM

I am out of town and getting on a plane shortly. This will be my last post in this thread for at least hours. Please submit tickets if you have any further questions.

tdfcash3 12-21-2007 05:29 PM

It seems clear to me until TMM sorts its issues out sponsors can either wait and see or move now, theres plenty of options that john seriously needs to address namely MPA3 and Epoch are looking like a better option right now.

DVTimes 12-21-2007 05:32 PM

Quote:

Originally Posted by borked (Post 13548692)
tdfcash3 raised this point and a very valid one. European law for example is extremely strict and clear on this matter, and all programme owners anyway, but especially Europe need to take data security very VERY seriously. The end user of any software that implements personal data storage is ultimately responsible for the security of that data. Not TMM. Most all business software is closed source, so everyone in this industry needs to not be complacent that because XYZ is their software that it's secure.

It looks like NATS has a security hole which is/is being/has been closed, I dunno. But you all need to be taking your customer's data security seriously and checking login logs periodically. You, the user are ultimately responsible for that.

We are proactive on these matters, which is why we've been breach-free for some time now

Thats a good point.

I know firms in the UK facing BIG fines. I presume that websites based in the UK could also be subject to BIG fines.

Dirty D 12-21-2007 05:33 PM

Looks pretty widespread to me...

ShotGun 12-21-2007 05:34 PM

The scary thing is how easy MPA and Nats are to hack. The even scarier thing is both of those companies think their program can not be hacked. If they'd get off their high horse for a second they'd realize how many exploits each of them has they may be able to actually secure their script. Instead they are too busy getting drunk on their own kool aid.

Anybody thinking of buying Nats should read John's posts in this thread. Is that the type of guy you want to do business with?

ladida 12-21-2007 05:39 PM

Quote:

Originally Posted by tdfcash3 (Post 13548722)
It seems clear to me until TMM sorts its issues out sponsors can either wait and see or move now, theres plenty of options that john seriously needs to address namely MPA3 and Epoch are looking like a better option right now.

You think MPA doesn't have issues like this? Or any other software paysites use for that matter like the various number of CMS's? Ask around...

People in this thread are funny. Noone cares about their security untill it's either
a) posted on a public board
b) starts receiving complaints from members


All times are GMT -7. The time now is 01:23 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123