Under attack
#1
Posted 23 October 2010 - 11:58 PM
As some of you might have noticed, the site was down for some hours some hours earlier today. Die is due tot he fact that some people or a group is/are currently trying to get brute-force access to our server, I was able to restore all of the crashed databases and was able to reset the server successfully after 3 retries.
I currently know that damage to our OS has been done since we are not able to successfully perform any updates to our system at current time.
The bad thing is, I have no fix for this yet. The good thing is, I know who is behind it and was able to contact his/her provider. Ia m currently awaiting feedback from that provider.
Kind regards,
Stan
#2
Posted 24 October 2010 - 01:35 AM
#3
Posted 24 October 2010 - 01:36 AM
#4 Guest_Francis_*
Posted 24 October 2010 - 02:42 AM
Can You tell us who did it and why ?
No. That's a private information.
Are our accounts and information safe?
Everything is safe, except email addresses and usernames, if they wanted to check them. But I doubt they downloaded a copy of the database only to see the email addresses. Don't worry.
#5
Posted 24 October 2010 - 05:04 AM
But a brute force attack vs. a server was their calling card or some crap.
EDIT: I can see no clear evidence but it's higly likely. Or just someone else.
#6
Posted 24 October 2010 - 07:42 AM
More on signature rules can be found here.
Feel free to remove this message once your signature is compliant!
#7
Posted 24 October 2010 - 08:08 AM
This means all information is safe. All they can do is overload the server.
#8
Posted 24 October 2010 - 02:38 PM
#9
Posted 24 October 2010 - 02:50 PM
#10 Guest_Francis_*
Posted 24 October 2010 - 03:05 PM
Our password hashes are salted right?
IPB's password hash:
$salt = md5("some string here" . strtolower($username . $password) . md5(rand(1000000, 9999999));
$passwordHash = md5(strtolower($username . $password) . "(some string here, depends)" . $salt));
I may have missed something though. I haven't checked in years.
#11
Posted 24 October 2010 - 10:41 PM
Our password hashes are salted right?
I remember having answered you that question already some time ago but anyways: Their goal is absolutely not to get your account information, which is of zero interest for anyone.
#12
Posted 25 October 2010 - 11:38 AM
Maybe it's 4Chan demanding Hoppah to make a new LA mod
#13
Posted 25 October 2010 - 03:19 PM
Maybe it's 4Chan demanding Hoppah to make a new LA mod
Unless the LA mod was made of underage porn, it's unlikely.
-Cal Naughton Jr.
#14 Guest_Francis_*
Posted 25 October 2010 - 03:44 PM
Congratz, you made me lol in my classroom.Unless the LA mod was made of underage porn, it's unlikely.
#15
Posted 25 October 2010 - 07:47 PM
Congratz, you made me lol in my classroom.
And myself just now, BTW Voodoo, you owe me a new computer monitor, mine is now covered in chocolate milk.
Also @stan, yeah I remember asking, I just didn't feel like looking back or doing a wire shark to find out.
#16
Posted 26 October 2010 - 06:59 AM
Fire Fighter 2, HazMat Tech, ARFF, D/O Structural Pumper, D/O Mobile Water Supply, D/O ARFF, EMT-B,
#17
Posted 27 October 2010 - 02:42 AM
#18
Posted 27 October 2010 - 03:25 AM
They're stupid. Anyone that tries to hack a site for a reason like that is plain out stupid.
Wanna play multiplayer without any of the commitment? Emergency Planet hosts casual multiplayer to all its members! Contact me for more information
Executive Director: EMP Gulag
Do you have a warning that you want to go away, or are you facing another punishment you don't want? Contact me for the NEW alternative!
#19
Posted 02 November 2010 - 02:08 PM
They might. They can sell that list to companies to harvest for spam bots. Seen it done before.But I doubt they downloaded a copy of the database only to see the email addresses. Don't worry.
Please DO NOT PM ME for help. Ask your questions on the forum to help others with the same issue.
Enhance your LA Mod Freeplay Experience with LA Mod 2.0 4x4 Submod.
Los Angeles Mod v2.0 4x4 W00ds Map v1 - BETA RELEASE
If you appreciate my work, then please donate. Every little bit helps!
#20
Posted 03 November 2010 - 02:18 AM
So you mean that "the hacker" got everyones email? They can be used for spam mail etc.Everything is safe, except email addresses and usernames, if they wanted to check them. But I doubt they downloaded a copy of the database only to see the email addresses. Don't worry.