GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Paycom or NATS spamming our members? (https://gfy.com/showthread.php?t=793881)

TheDoc 12-22-2007 11:18 AM

Quote:

Originally Posted by ThePornBrain (Post 13551191)
and here's my input, not accusing anyone, just something to look into for all NATS users:

splitfinity posted this in 2006:

http://www.gfy.com/showpost.php?p=11184768&postcount=26



on gfy theres user "k0nr4d" http://www.gfy.com/member.php?u=78744 with the signature



:upsidedow

Konrad, has worked for me for several years. He is a php coder / webmaster.

The other post is an older exploit, which came through apache but did target nats clients (not just nats machines). It would skim international traffic, spam of course, and was the cause of unstoppable username / password leaks.

I like several others had this exploit. It was way advanced, well past Mine and Konrads skills. If he created that and does php nats plugins for me I'm going to be rather pissed.

stevo 12-22-2007 11:23 AM

If you ban a user, isn't their username and password still active? But instead of getting access to the affiliate program they instead just get a page that states they were banned.

That's probably why you guys are still able to track his IP address entering the system.

I simply just deleted the account.

k0nr4d 12-22-2007 11:32 AM

Quote:

Originally Posted by ThePornBrain (Post 13551191)
and here's my input, not accusing anyone, just something to look into for all NATS users:

splitfinity posted this in 2006:

http://www.gfy.com/showpost.php?p=11184768&postcount=26



on gfy theres user "k0nr4d" http://www.gfy.com/member.php?u=78744 with the signature



:upsidedow


All I have to say on that topic is LOL.

RazorSharpe 12-22-2007 11:39 AM

Quote:

Originally Posted by TheDoc (Post 13551084)
You people are blaming the wrong Company... NATS has a protection system built in, straight in the admin - config section.

This isn't a NATS exploit - it's an exploit on programs that didn't use the NATS features to protect itself properly.

Every program, db, software, script.. all of it is hackable and with 100's of people using NATS it's going to be VERY targeted. Don't blame NATS, blame the damn programs - it's their fault for not using the protection and got exploited.

get a grip .... not informing clients IS solely the fault of TMM no matter how you want to spin this coz John is your friend.

k0nr4d 12-22-2007 11:41 AM

Just in case anyone is wondering, the other exploit did come in via apache and it was some script, basically a php console for a server that would execute whatever commands you wanted using exec...

It was called something like ratpack or some shit

notoldschool 12-22-2007 11:42 AM

shit reminds me of the idiots that blame windows because it is the most widely used OS so more people try to find exploits. I have only found more reliable data and better conversions with Nats than other companies that have shit made specifically for cheating their affiliates.

Doctor Dre 12-22-2007 11:43 AM

Quote:

Originally Posted by Paul Markham (Post 13550578)
Been reading this on and off during the day and what comes through is the fact that NATS were alerted by threads on the boards. They did not take the necessary action then and it seems a drama thread got the right response. So John consider that before you flame people.

He's not flaming people, he's left the building once again... GFY could have been an userfull tool for him but he chooses to ignore it once again

Dirty D 12-22-2007 12:10 PM

Quote:

Originally Posted by PBucksJohn (Post 13550409)
The amount of wrong information, assumptions, and completely wrong accusations here is astounding.

This will be my last post in this thread and possibly on this board. I am tired of people running around saying whatever they want and there being no repercussions for it. It is ridiculous and I'm not going to sit here and argue with them.

This fully appears to be a compromised password list. It is not an "exploit" in the software. It is not Fred spamming your members, etc. We have changed our policy so that we no longer maintain ANY passwords to ensure this does not happen via us ever in the future. We are also continuing to implement other protective measures.

Those of you who have actual valid feedback and comments I appreciate them. Anyone is welcome to contact us regarding this with their questions or concerns and we will be further communicating directly with our clients about it.

However as to dealing with the people who make their living making things up about other people, I'm done here.

How about this for a fact.
Yesterday, when I saw this thread and realized we have also been compromised.... I immediately opened a trouble ticket related to this issue.
It has been over 20 hours with no response to my ticket.

I would think this should be treated as the highest priority over at TMM.
This is very serious and something that ONLY TMM can resolve.
Please have one of your techs respond.

ladida 12-22-2007 12:13 PM

Quote:

Originally Posted by JDog (Post 13551157)
If a program get's hacked, it is the program owners responsibility to notify anybody that has had the slightest possibility that their data was stolen. Doesn't matter if it's because of NATS or not. There are laws in the US & from what this thread said the UK too, where you're suppose to contact anybody and everyone that had the possibility of their data being stolen.

Any data gets stolen, a company should make a statement. I know I would want to know, atleast then I could change my password to my affiliate account.

Hmm.. So how many of these have you seen in (let's be generous here), last 6 months?

I know from the top of my head 30 programs in that time having their data leaked, none made any statements, nor do i expect them.

milan 12-22-2007 12:28 PM

Quote:

Originally Posted by dustman (Post 13551499)
How about this for a fact.
Yesterday, when I saw this thread and realized we have also been compromised.... I immediately opened a trouble ticket related to this issue.
It has been over 20 hours with no response to my ticket.

I would think this should be treated as the highest priority over at TMM.
This is very serious and something that ONLY TMM can resolve.
Please have one of your techs respond.

read this, it should help you solve the problem...

http://www.gfy.com/showthread.php?t=794159

RazorSharpe 12-22-2007 12:51 PM

Quote:

Originally Posted by ladida (Post 13551510)
Hmm.. So how many of these have you seen in (let's be generous here), last 6 months?

I know from the top of my head 30 programs in that time having their data leaked, none made any statements, nor do i expect them.

crikey! you're still floating about acting important?

ladida 12-22-2007 01:02 PM

Quote:

Originally Posted by RazorSharpe (Post 13551645)
crikey! you're still floating about acting important?

I thought you went back to playing in your little sandbox? Unlike you, i'm giving facts. Anyway, just another troll to add to ignore.

TheDoc 12-22-2007 01:05 PM

Quote:

Originally Posted by RazorSharpe (Post 13551390)
get a grip .... not informing clients IS solely the fault of TMM no matter how you want to spin this coz John is your friend.

John is a business client - I use NATS. I have never hung out with John, we haven't bought each other drinks, we don't know anything about each others family's, and we don't talk about anything other than Business.

And you are wrong.. NATS DID INFORM clients. They have been telling clients about the IP ADMIN feature for a long time. And after every ticket they tell you to change FTP/SSH passwords and anything else they had access too. The program owner has total control over all admin accounts, who can and when they can access. This info is in the KB, it's talked about during the Setup, and is the first thing you see in the Config Admin.

We know TMM had a security issue of some sort. However if the Program used the basic 101 security features that comes with all NATS installs then they wouldn't have had the problem to begin with.

So yeah, I know TMM screwed up - but they aren't the only ones to blame.

RazorSharpe 12-22-2007 01:07 PM

Quote:

Originally Posted by ladida (Post 13551669)
I thought you went back to playing in your little sandbox? Unlike you, i'm giving facts. Anyway, just another troll to add to ignore.

facts? troll? you're bloody delusional. you've given no facts what-so-fucking-ever and the only troll here is you. You're blaming nats users for an issue that nats developers knew about several months ago and never notified said users about. i think you need a little time in the "sandbox" ...

RazorSharpe 12-22-2007 01:10 PM

Quote:

Originally Posted by TheDoc (Post 13551673)
John is a business client - I use NATS. I have never hung out with John, we haven't bought each other drinks, we don't know anything about each others family's, and we don't talk about anything other than Business.

And you are wrong.. NATS DID INFORM clients. They have been telling clients about the IP ADMIN feature for a long time. And after every ticket they tell you to change FTP/SSH passwords and anything else they had access too. The program owner has total control over all admin accounts, who can and when they can access. This info is in the KB, it's talked about during the Setup, and is the first thing you see in the Config Admin.

We know TMM had a security issue of some sort. However if the Program used the basic 101 security features that comes with all NATS installs then they wouldn't have had the problem to begin with.

So yeah, I know TMM screwed up - but they aren't the only ones to blame.

I NEVER got told to about the possibility of someone using the nats admin login to access my nats installation. I do change my ssh/ftp login. This was not a breach by ssh/ftp, this was a breach by someone using the nats login that I was told would be "appreciated to be left". So if you got different info from just about every NATS program then you're a lucky guy ....

baddog 12-22-2007 01:13 PM

So, how many people's holiday weekend has been effected by this latest revelation?

TheDoc 12-22-2007 01:18 PM

Quote:

Originally Posted by RazorSharpe (Post 13551687)
I NEVER got told to about the possibility of someone using the nats admin login to access my nats installation. I do change my ssh/ftp login. This was not a breach by ssh/ftp, this was a breach by someone using the nats login that I was told would be "appreciated to be left". So if you got different info from just about every NATS program then you're a lucky guy ....


You ALWAYS have to assume someone could access your admin areas. If people can brute force a paysite what would make anyone think you can't brute force affiliate logins?

I know it didn't happen through ssh/ftp, they tell you to change it and any other passwords they had access to.

Of course NATS now is going to have to crack down and force all clients to lock down the systems, and prob enforce some other changes/rules too. But no matter what, if I give a program my details - it's the programs responsibility to make sure it's safe and secure.

ladida 12-22-2007 01:56 PM

Quote:

Originally Posted by TheDoc (Post 13551697)
Of course NATS now is going to have to crack down and force all clients to lock down the systems, and prob enforce some other changes/rules too.

Yea, then wait and see people coming here annoyed that this is like this or that, or they can't do this or that. People in this business lack the understanding of security soooo much, and value it even less.

RazorSharpe 12-22-2007 02:11 PM

Quote:

Originally Posted by TheDoc (Post 13551697)
You ALWAYS have to assume someone could access your admin areas. If people can brute force a paysite what would make anyone think you can't brute force affiliate logins?

I know it didn't happen through ssh/ftp, they tell you to change it and any other passwords they had access to.

Of course NATS now is going to have to crack down and force all clients to lock down the systems, and prob enforce some other changes/rules too. But no matter what, if I give a program my details - it's the programs responsibility to make sure it's safe and secure.

I am no false impressions about software but I do expect that when I am pay to buy a software such as NATS and the developers of the software are aware of an issue that they will make it a priority to investigate the issue and make their clients aware of it and what they intend to do about it. I'm sure you can understand how i don't feel like this is too much to ask for.

This vulnerability specificaly targetted the NATS staff admin account and no others as far as i can tell which leads me to assume that it wasn't a brute force attack and if it were it was done because the nats staff account used the same username across multiple nats installations which is a total no-no in security 101 in and of itself.

...

Mark_E4A 12-22-2007 02:13 PM

WOW am I ever glad I had the balls and got ride of nats long ago :) :) :)

CCBILL is the way to go :thumbsup :thumbsup :thumbsup

RazorSharpe 12-22-2007 02:15 PM

Quote:

Originally Posted by ladida (Post 13551785)
Yea, then wait and see people coming here annoyed that this is like this or that, or they can't do this or that. People in this business lack the understanding of security soooo much, and value it even less.

it is totally possible to take the concept of security way too far and thus make normal workings of any software totally unusable. Where do you stop? I'm sure you've patched plenty of apache or mysql installs after hearing of vulnerabilities via security newsgroups or mailinglists or are you the type that finds all of them on your own? Don't treat your mind to illusions of its own grandeur ladida, it is making you seem rather foolish.

RP Fade 12-22-2007 02:15 PM

Quote:

Originally Posted by baddog (Post 13551690)
So, how many people's holiday weekend has been effected by this latest revelation?

I think quite a few are saying 'what holiday' right about now :Oh crap

RazorSharpe 12-22-2007 02:17 PM

Quote:

Originally Posted by RP Fade (Post 13551825)
I think quite a few are saying 'what holiday' right about now :Oh crap

what holiday? :)

jcsike 12-22-2007 02:19 PM

Quote:

Originally Posted by milan (Post 13551150)
After many MANY emails and VM's I will post what OC3 Networks discovered back in October after routine audit of 2 of our clients security.

We know this issue exist since mid Aug 2007, secured our customers and blocked the intruder IP’s from any access to our network.

We posted the thread {url]http://www.gfy.com/showthread.php?t=779742[/url] and got some lawsuit treat to sue us that we could have care less… BUT when our customers that we tracked the breach on their servers got treats as well and requested us to NOT come out public with it, we honored their request.


I've been involved with a high number of NATS clients and have found the following to be true:
*) Changing all admin level account passwords stops the intruder. He still attempts to login, but in vain.
*) As soon as TMM has admin access to NATS the intruder is back. Sometimes the same day.
*) Intruder is using an automation script that dumps the NATS members list. In some cases he is doing this every hour on the hour.

*) NATS was vulnerable to SQL injection attacks. I haven't investigated whether it still is.


P.S. Im hearing that there is a backdoor that TMM can use to get into your NATS, but I havent investigated so its speculation. Only reason I even mention this is because NATS is encrypted and you dont know. Im not interested in decrypting NATS just to find out. There are other ways. I hope this isn’t true.

of course there is a backdoor with nats. how else do they know what their customers plan levels are to bill them? the question is what other information gets passed

RazorSharpe 12-22-2007 02:20 PM

Quote:

Originally Posted by RazorSharpe (Post 13551816)
I am no false impressions about software but I do expect that when I am pay to buy a software such as NATS and the developers of the software are aware of an issue that they will make it a priority to investigate the issue and make their clients aware of it and what they intend to do about it. I'm sure you can understand how i don't feel like this is too much to ask for.

This vulnerability specificaly targetted the NATS staff admin account and no others as far as i can tell which leads me to assume that it wasn't a brute force attack and if it were it was done because the nats staff account used the same username across multiple nats installations which is a total no-no in security 101 in and of itself.

...

maybe i shouldn't drink and post ... corrections to my post follow:

I have no false impressions about software but I do expect that when I pay for a software such as NATS and the developers of the software are aware of an issue that they will make it a priority to investigate the issue and make their clients aware of it and what they intend to do about it. I'm sure you can understand how i don't feel like this is too much to ask for.

This vulnerability specifically targetted the NATS staff admin account and no others, as far as i can tell, which leads me to assume that it wasn't a brute force attack and if it were it was done because the nats staff account used the same username across multiple nats installations which is a total no-no in security 101 in and of itself.

Dirty D 12-22-2007 02:34 PM

People, keep in mind that the only admin account that has been compromised is the TMM admin account. For god's sake, delete this account immediately.

This breach would also explain the multiple waves of compromised user passwords that we have seen. User passwords are easy to see in NATS, affiliate passwords are not.

My members area security software has reported dozens of compromised passwords logging in within less than 5 minutes. This only happens when there is a compiled list of valid passwords, not from passwords obtained by brute force.

After over 20 hours, I finally got a response to my trouble ticket:

TMM ‎(3:55 PM):
I'm sorry and it look like I have to get you an full upgrade to have this new feature
TMM ‎(3:56 PM):
and we are currently develope on better security system on NATS and there will be release on Monday hopfully
TMM ‎(3:58 PM):
can we do the update on Monday instead?

Dirty D ‎(3:59 PM):
Keep in mind we are one of the MANY programs that the TMM admin login was compromised. Before I get pissed off, let me get this straight and make sure I understand.

#1. The IP Log feature won't work until the next release comes out... maybe monday

#2. NATS will not log the admin login info to a log file and the ONLY way to get admin login information is for me to WRITE A SCRIPT to accept a POST with info from NATS using these undocumented variables xxxxxx , xxxxxxx, xxxxxxxx, xxxxxxxx, xxxxxxx

#3. Nothing has been accomplished to resolve this Trouble Ticket

TMM ‎(4:05 PM):
#1 yes, we are currently develope on the security script on will try to get relase as soon as possble.
#2 Currently no, but I will add this to the feature request.
#3 I'm sorry about this, we are wokring on the relase, and will let you know as soon as it is ready.
TMM ‎(4:11 PM):
I'm sorry for any inconvenience that cause on this issue, please change the ssh password and disable the nats admin login, one of us will contact you as soon as the new release is ready.

AlienQ - BANNED FOR LIFE 12-22-2007 02:46 PM

WTF? They outsourcing to Russian programmers or something?
Thats some serious broken english.

And certainly not the brightest of decisions.

hateman 12-22-2007 02:46 PM

Holy shit, this is huge

Imagine how much data was stolen through this NATS fuck up

:eek2

hateman 12-22-2007 03:01 PM

Quote:

Originally Posted by milan
After many MANY emails and VM's I will post what OC3 Networks discovered back in October after routine audit of 2 of our clients security.

We know this issue exist since mid Aug 2007, secured our customers and blocked the intruder IP?s from any access to our network.

We posted the thread http://www.gfy.com/showthread.php?t=779742 and got some lawsuit treat to sue us that we could have care less? BUT when our customers that we tracked the breach on their servers got treats as well and requested us to NOT come out public with it, we honored their request.


I've been involved with a high number of NATS clients and have found the following to be true:
*) Changing all admin level account passwords stops the intruder. He still attempts to login, but in vain.
*) As soon as TMM has admin access to NATS the intruder is back. Sometimes the same day.
*) Intruder is using an automation script that dumps the NATS members list. In some cases he is doing this every hour on the hour.[/color]

*) NATS was vulnerable to SQL injection attacks. I haven't investigated whether it still is.


P.S. Im hearing that there is a backdoor that TMM can use to get into your NATS, but I havent investigated so its speculation. Only reason I even mention this is because NATS is encrypted and you dont know. Im not interested in decrypting NATS just to find out. There are other ways. I hope this isn?t true.

This is crazy!

:Oh crap

baddog 12-22-2007 03:03 PM

Quote:

Originally Posted by AlienQ (Post 13551948)
WTF? They outsourcing to Russian programmers or something?
Thats some serious broken english.

And certainly not the brightest of decisions.

Are you kidding me? You invented broken English.

crockett 12-22-2007 03:20 PM

Quote:

Originally Posted by PBucksJohn (Post 13550409)
The amount of wrong information, assumptions, and completely wrong accusations here is astounding.

This will be my last post in this thread and possibly on this board. I am tired of people running around saying whatever they want and there being no repercussions for it. It is ridiculous and I'm not going to sit here and argue with them.

This fully appears to be a compromised password list. It is not an "exploit" in the software. It is not Fred spamming your members, etc. We have changed our policy so that we no longer maintain ANY passwords to ensure this does not happen via us ever in the future. We are also continuing to implement other protective measures.

Those of you who have actual valid feedback and comments I appreciate them. Anyone is welcome to contact us regarding this with their questions or concerns and we will be further communicating directly with our clients about it.

However as to dealing with the people who make their living making things up about other people, I'm done here.

Every webmaster on this board whom has signed up as an affiliate of a NATS program, has a very good chance that their personal info has been compromised. You have done nothing but blame everyone else in this thread trying to make it seem like it's everyone else's bad security. Yet the finger keeps pointing back at one central point.

Real good choice you are taking there, ignoring not only the companies whom use your product, but also the affiliates whom promote those companies.

So first we had pornograph fiasco and now this.. What was that old saying? Fool me once shame on me... Fool me twice???

RazorSharpe 12-22-2007 03:51 PM

Quote:

Originally Posted by baddog (Post 13551988)
Are you kidding me? You invented broken English.

Actually the first time I have laughed at anything you've said.

Gordon G 12-22-2007 03:53 PM

Quote:

Originally Posted by crockett (Post 13552030)
Every webmaster on this board whom has signed up as an affiliate of a NATS program, has a very good chance that their personal info has been compromised. You have done nothing but blame everyone else in this thread trying to make it seem like it's everyone else's bad security. Yet the finger keeps pointing back at one central point.

Real good choice you are taking there, ignoring not only the companies whom use your product, but also the affiliates whom promote those companies.

So first we had pornograph fiasco and now this.. What was that old saying? Fool me once shame on me... Fool me twice???

he wont do jack shit about it. John thinks he is better than everyone else.

Gordon G 12-22-2007 03:54 PM

this thread should be a sticky.:2 cents:

TMM_John 12-22-2007 03:56 PM

Quote:

Originally Posted by Gordon G (Post 13552101)
he wont do jack shit about it. John thinks he is better than everyone else.

http://www.gofuckyourself.com/showthread.php?t=794219

hateman 12-22-2007 04:09 PM

Quote:

Originally Posted by PBucksJohn (Post 13552117)
This fully appears to be a compromised password list. It is not an "exploit" in the software. It is not Fred spamming your members, etc. We have changed our policy so that we no longer maintain ANY passwords to ensure this does not happen via us ever in the future. We are also continuing to implement other protective measures.

http://www.fanforhire.com/images/comical_ali.jpg

Gordon G 12-22-2007 04:21 PM

Quote:

Originally Posted by PBucksJohn (Post 13552117)

Oh wow, you have typed a bullshit statement, sorry yes you have done something about it.

Gordon G 12-22-2007 04:22 PM

Quote:

Originally Posted by hateman (Post 13552161)

:1orglaugh:1orglaugh

tom3k 12-22-2007 04:40 PM

heres a band aid solution for those who have dynamic ips and absolutely cant 'lock down' their admins to a specific ip... at least until the problem is resolved fully.

have your coder code up a small script:

w w w . d o m a i n . c o m /somesecretfile.php?key=somesecretkey

if the key is correct have it make the changes to allow the ip accessing the script to log into admin.

should take him about 15 minutes to code.

and security wise, even if someone found this file AND your key it wouldn't be a major compromise... all it would do is allow his ip to enter admin, nothing more... they would still need the password of course.

ciao.

Rui 12-22-2007 04:41 PM

Quote:

Originally Posted by baddog (Post 13551690)
So, how many people's holiday weekend has been effected by this latest revelation?

So, can you please clue us in regarding what seems to be your real agenda regarding this?


All times are GMT -7. The time now is 01:27 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123