Under attack
#1
Geschrieben 23 Oktober 2010 - 11:58
As some of you might have noticed, the site was down for some hours some hours earlier today. Die is due tot he fact that some people or a group is/are currently trying to get brute-force access to our server, I was able to restore all of the crashed databases and was able to reset the server successfully after 3 retries.
I currently know that damage to our OS has been done since we are not able to successfully perform any updates to our system at current time.
The bad thing is, I have no fix for this yet. The good thing is, I know who is behind it and was able to contact his/her provider. Ia m currently awaiting feedback from that provider.
Kind regards,
Stan
#2
Geschrieben 24 Oktober 2010 - 01:35
#3
Geschrieben 24 Oktober 2010 - 01:36
#4 Guest_Francis_*
Geschrieben 24 Oktober 2010 - 02:42
Can You tell us who did it and why ?
No. That's a private information.
Are our accounts and information safe?
Everything is safe, except email addresses and usernames, if they wanted to check them. But I doubt they downloaded a copy of the database only to see the email addresses. Don't worry.
#5
Geschrieben 24 Oktober 2010 - 05:04
But a brute force attack vs. a server was their calling card or some crap.
EDIT: I can see no clear evidence but it's higly likely. Or just someone else.
#6
Geschrieben 24 Oktober 2010 - 07:42
More on signature rules can be found here.
Feel free to remove this message once your signature is compliant!
#7
Geschrieben 24 Oktober 2010 - 08:08
This means all information is safe. All they can do is overload the server.
#8
Geschrieben 24 Oktober 2010 - 02:38
#9
Geschrieben 24 Oktober 2010 - 02:50
#10 Guest_Francis_*
Geschrieben 24 Oktober 2010 - 03:05
Our password hashes are salted right?
IPB's password hash:
$salt = md5("some string here" . strtolower($username . $password) . md5(rand(1000000, 9999999));
$passwordHash = md5(strtolower($username . $password) . "(some string here, depends)" . $salt));
I may have missed something though. I haven't checked in years.
#11
Geschrieben 24 Oktober 2010 - 10:41
Our password hashes are salted right?
I remember having answered you that question already some time ago but anyways: Their goal is absolutely not to get your account information, which is of zero interest for anyone.
#12
Geschrieben 25 Oktober 2010 - 11:38
Maybe it's 4Chan demanding Hoppah to make a new LA mod
#13
Geschrieben 25 Oktober 2010 - 03:19
Maybe it's 4Chan demanding Hoppah to make a new LA mod
Unless the LA mod was made of underage porn, it's unlikely.
-Cal Naughton Jr.
#14 Guest_Francis_*
Geschrieben 25 Oktober 2010 - 03:44
Congratz, you made me lol in my classroom.Unless the LA mod was made of underage porn, it's unlikely.
#15
Geschrieben 25 Oktober 2010 - 07:47
Congratz, you made me lol in my classroom.
And myself just now, BTW Voodoo, you owe me a new computer monitor, mine is now covered in chocolate milk.
Also @stan, yeah I remember asking, I just didn't feel like looking back or doing a wire shark to find out.
#16
Geschrieben 26 Oktober 2010 - 06:59
Fire Fighter 2, HazMat Tech, ARFF, D/O Structural Pumper, D/O Mobile Water Supply, D/O ARFF, EMT-B,
#17
Geschrieben 27 Oktober 2010 - 02:42
#18
Geschrieben 27 Oktober 2010 - 03:25
They're stupid. Anyone that tries to hack a site for a reason like that is plain out stupid.
Wanna play multiplayer without any of the commitment? Emergency Planet hosts casual multiplayer to all its members! Contact me for more information
Executive Director: EMP Gulag
Do you have a warning that you want to go away, or are you facing another punishment you don't want? Contact me for the NEW alternative!
#19
Geschrieben 02 November 2010 - 02:08
They might. They can sell that list to companies to harvest for spam bots. Seen it done before.But I doubt they downloaded a copy of the database only to see the email addresses. Don't worry.
Please DO NOT PM ME for help. Ask your questions on the forum to help others with the same issue.
Enhance your LA Mod Freeplay Experience with LA Mod 2.0 4x4 Submod.
Los Angeles Mod v2.0 4x4 W00ds Map v1 - BETA RELEASE
If you appreciate my work, then please donate. Every little bit helps!
#20
Geschrieben 03 November 2010 - 02:18
So you mean that "the hacker" got everyones email? They can be used for spam mail etc.Everything is safe, except email addresses and usernames, if they wanted to check them. But I doubt they downloaded a copy of the database only to see the email addresses. Don't worry.