Receiving spam from anandtech smtp server?

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

zeruty

Platinum Member
Jan 17, 2000
2,276
2
81
I have nuked the Affiliate sub forum and removed all permissions from the account they were using.

Perk, can you get the IP they posted with to permaban the IP?

In another thread (in OT), Quintox posted links to other forums where the site was posted.

The user doing that used an account named Retrospector at the first forum, and the third one he signed his post as ~ Retrospector ~.

Maybe that can help you track down the bastard (ban if he has an account here)

 

Ken g6

Programming Moderator, Elite Member
Moderator
Dec 11, 1999
16,284
3,905
75
If it's any help, I notice that at least viewing single posts (showpost.php) is returning status code 500 (Internal Server Error), though the HTML is as normal. I wouldn't have noticed except that I'm working on a Greasemonkey script with AJAX.
This is still happening. And it wasn't happening before the short "scheduled maintenance" message last night. Something tells me he may have penetrated deeper than you thought.
 

Crusty

Lifer
Sep 30, 2001
12,684
2
81
Disclaimer: IANAA(dmin)

Hate to say it, but consider this a FUCK YES. I'm not intentionally trying to set off a panic here, but if the admin accounts were hacked, and they were, you may as well consider all of your data here compromised, even if superficially it wasn't.

While I agree that changing your passwords is a good thing to do after an incident like this, don't forget that your passwords are stored encrypted in the database so it's not like the hacker has the plaintext password of all users here just from gaining access to the database.

Does anyone know if vB uses MD5 or SHA1? Also, are the passwords salted before they are hashed?

What IS worrisome is that if they hacker rooted the server and dropped in code to skim logins before they hit the actual forum code, which you won't really know unless you format/reinstall the server or audit every single line of php on the server.

Although if the server did actually get rooted I wouldn't expect them to be still running(they wouldn't be if I managed them).
 

ViRGE

Elite Member, Moderator Emeritus
Oct 9, 1999
31,516
167
106
While I agree that changing your passwords is a good thing to do after an incident like this, don't forget that your passwords are stored encrypted in the database so it's not like the hacker has the plaintext password of all users here just from gaining access to the database.

Does anyone know if vB uses MD5 or SHA1? Also, are the passwords salted before they are hashed?

What IS worrisome is that if they hacker rooted the server and dropped in code to skim logins before they hit the actual forum code, which you won't really know unless you format/reinstall the server or audit every single line of php on the server.

Although if the server did actually get rooted I wouldn't expect them to be still running(they wouldn't be if I managed them).
vB is MD5 + salt.
 

hclarkjr

Lifer
Oct 9, 1999
11,375
0
0
have subscription updates been disabled because of this? i notice i am not getting them now for threads i have subscribed too
 

Crusty

Lifer
Sep 30, 2001
12,684
2
81
why is it someone suggesting to change pw...

Just a precaution. If someone rooted the server you have no idea what information they are capturing in realtime from the servers(including passwords).
 

SunnyD

Belgian Waffler
Jan 2, 2001
32,674
145
106
www.neftastic.com
why is it someone suggesting to change pw...

Because, if the database itself was compromised, then the previously stored MD5 is all they need to replicate access to an account. The salt is readily available in the vB code.

Changing your password changes the MD5 stored in the database.
 

Dualist

Platinum Member
Dec 5, 2005
2,395
0
86
May as well change our passwords after this latest attack on AT. I think otherwise our accounts could be their next target.
 

ivan2

Diamond Member
Mar 6, 2000
5,808
0
0
www.heatware.com
Because, if the database itself was compromised, then the previously stored MD5 is all they need to replicate access to an account. The salt is readily available in the vB code.

Changing your password changes the MD5 stored in the database.

that won't be easy on any reasonable pw, with salt or not. just don't want to fuel the panic.
 

SunnyD

Belgian Waffler
Jan 2, 2001
32,674
145
106
www.neftastic.com
that won't be easy on any reasonable pw, with salt or not. just don't want to fuel the panic.

Let me fix that for you - it wouldn't be easy provided they have no access to the DB or web server. Given that it's already been compromised... The fact is if you have what's stored in the database, you don't need to decrypt anything. You use THAT as is to generate authentication.

Anyway, there shouldn't be any need to panic anyway. After all, you guys aren't realistically using the same password on some random internet forum as you are for, lets say... you BANK account, right?
 

sandorski

No Lifer
Oct 10, 1999
70,130
5,658
126
Let me fix that for you - it wouldn't be easy provided they have no access to the DB or web server. Given that it's already been compromised... The fact is if you have what's stored in the database, you don't need to decrypt anything. You use THAT as is to generate authentication.

Anyway, there shouldn't be any need to panic anyway. After all, you guys aren't realistically using the same password on some random internet forum as you are for, lets say... you BANK account, right?

 

PokerGuy

Lifer
Jul 2, 2005
13,650
201
101
Anyway, there shouldn't be any need to panic anyway. After all, you guys aren't realistically using the same password on some random internet forum as you are for, lets say... you BANK account, right?

No!... of course not! who would be so stupid. Certainly not me. <opens other window to change Citibank account info>
 

robertk2012

Platinum Member
Dec 14, 2004
2,134
0
0
The big question is whether or not they had their emails visible. Did they receive and infraction?
 

VirtualLarry

No Lifer
Aug 25, 2001
56,452
10,120
126
If it's any help, I notice that at least viewing single posts (showpost.php) is returning status code 500 (Internal Server Error), though the HTML is as normal. I wouldn't have noticed except that I'm working on a Greasemonkey script with AJAX.

It's doing that now for me.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |