@renaudbedard So, any comment on how the 1.5GB zip file was last modified 4 hours before the hack, and on FAT32? Hackers use Win98 or USB?
If it wasn't clear : Polytron has been hacked in a pretty huge way, don't believe anything you read from the past 10 hours.
-
-
- View other replies
-
@DNSDies ...and THEN the web server, using password information found in the dropbox.0 retweets 0 likes -
@renaudbedard Still doesn't explain the Mac OSX files in the archive, or that it was made on a FAT32 partition, that means removable storage0 retweets 0 likes -
@DNSDies I don't have all the answers. I doubt I'll ever have those answers. You're asking as if I knew how the hack was performed.0 retweets 1 like -
@renaudbedard Here's one you should be able to answer, brute force or rainbow table?0 retweets 0 likes - View other replies
-
-
@renaudbedard check the logs. Frequent failed logins = brute force single authentication = rainbow tables, or they knew the pass already.0 retweets 0 likes - View other replies
-
@DNSDies the initial attack (as far as I can tell) was on Phil's Dropbox. I'm trying to get access logs for that, but it's not our servers.0 retweets 0 likes
-
-
-
-
@Slidebite yes? that’s precisely what’s going on. We were hit, and now i try to limit further damage.0 retweets 0 likes -
- View other replies
-
@Slidebite believe or not preparing a proof document for the internet isn't priority number one when your identity gets stolen0 retweets 5 likes - View other replies
-
@renaudbedard If you were so concerned about it you wouldn't even bother replying. http://www.ic3.gov/default.aspx Reminder this is an option.0 retweets 0 likes -
@Slidebite yup, aware of that. Gathering evidence to build a claim takes time, working our way there.0 retweets 1 like
-
-
-
@renaudbedard prove this wrong please? pic.twitter.com/1JPotRuKfw
3:38 AM - 22 Aug 2014 · Details0 retweets 0 likes -
@MacTahMac it's not hosted on CloudFlare, CloudFlare offers their services to many hosts including ours. We've been hacked.
2 retweets 1 like -
@renaudbedard not trying to harass you just get info so I know who to argue for. It appears it is hosted by CF tho pic.twitter.com/QxScsoC6f7
3:43 AM - 22 Aug 2014 · Details0 retweets 0 likes - View other replies
-
@MacTahMac not going to give anyone ammunition by giving more detail, if you don't mind
0 retweets 0 likes - View other replies
-
@renaudbedard ah found documentation on this as well! pic.twitter.com/p0STTXJB8K
3:49 AM - 22 Aug 2014 · Details0 retweets 1 like -
@MacTahMac
@renaudbedard in short, Cloudflare got service to protect the server, and the only one that can make changes is the server owner?0 retweets 0 likes - View other replies
-
@kesadisan@renaudbedard no actually the opposite if he's telling the truth, the cloud flare caches the website to protect it against DDOS0 retweets 0 likes -
@MacTahMac
@kesadisan yup, this. Strictly a caching layer. Anyway this point is moot as I don’t think the website was the vulnerability0 retweets 0 likes - View other replies
- Show more
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Renaud Bédard
Alex
Hi, I'm Mac
Albert Van Otto