Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


24khost Hacked - Page 4
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

24khost Hacked

1246

Comments

  • yomeroyomero Member

    Sounds funny, but certainly is always a possibility.

  • LeeLee Veteran

    No, just a plain old retard.

  • bnmklbnmkl Member

    image

  • You sir, have made my day.

  • LeeLee Veteran

    @24khost said: @GetKVM_Ash it wsan't me who didn't update the plugin. The plugin maker didn't update it.

    Being completely serious though. In fact, never mind, I think most people saw that statement for what it was.

  • 24khost24khost Member

    @W1V_Lee I don't search the code to find code errors. When there is an update announced on my wordpress I update the plugins. It is what it is. But it has been corrected, was corrected quick. It did not put any PII in danger. All is good.

  • sdotsensdotsen Member

    @24khost said: doesn't matter, no information was leaked. No data theft.

    Wow really? You couldn't stay on top of patches for your wordpress installation and you didn't know your site was hacked. Then you want to expand your services and want people to trust that they'll be placed on a node with less clients IF they pay you a little more money? So why should someone trust your company?

  • sleddogsleddog Member

    The way people continually beat up on shovehost (who is a kid) is simply incredible.

    If this was real life, you'd be arrested for abuse, or sued.

  • jarjar Patron Provider, Top Host, Veteran
    edited May 2013

    @sleddog said: The way people continually beat up on shovehost (who is a kid) is simply incredible.

    And in this case 24khost for being targeted by someone who clearly goes around targeting wordpress installations like it's a career.

    Thread should have ended at:
    1. That it was reported to be shovey on a website that apparently doesn't ask questions about that field and that said report could be linked to can in no way be interpreted as even evidence of guilt.
    2. Wordpress hacked. OMG. This is new. Problem solved, it's up to 24khost to oversee the rest.

  • @24khost said: But it has been corrected, was corrected quick.

    Only because of this thread! :)

  • LeeLee Veteran

    @serverian said: Only because of this thread! :)

    Confirmed by the fact he asked if anyone knew what time it had been down since.

  • nutjobnutjob Member
    edited May 2013

    As a customer, can I angrily and rudely demand my money back, on the basis of this?

    I don't really want my money back, but can I?

    @serverian said: Only because of this thread! :)

    Only because this thread was first, and only because shovenose is the perp.

  • LeeLee Veteran

    @nutjob said: As a customer, can I angrily and rudely demand my money back, on the basis of this?

    Most others would and do, what makes you special?

  • 24khost24khost Member

    @sdotsen, was on top of patches. Can't help it if the programmer of the plugin, doesn't keep it up to date. didn't know there was an issue with it till this happened.

  • 24khost24khost Member

    @jarland or any other host, how often do you visit your front page?

  • jarjar Patron Provider, Top Host, Veteran

    @24khost I'm probably not a good example, I'll get an alert in 30 seconds if my front page changes ;)

  • 24khost24khost Member

    @serverian do you check the front page of your website all the time. Nothing would have advised me that I had been hacked with out somebody telling me or such as the server never went down.

  • 24khost24khost Member

    @jarland what do you use to keep track of it?

  • jarjar Patron Provider, Top Host, Veteran
  • http://www.changedetection.com/

    -- ChangeDetection.com provides page change monitoring and notification services to internet users worldwide.

  • jarjar Patron Provider, Top Host, Veteran

    Changedetection always seemed a little slow to me. May have just been me.

  • ATHKATHK Member

    Wordpress attacks have risen like crazy the past few months, same with Joomla attacks..

    Most vulnerabilities have been patch so it's normally just as simple as upgrading everything.

    Which is easier said then done in some cases ....

  • @24khost said: @sdotsen, was on top of patches. Can't help it if the programmer of the plugin, doesn't keep it up to date. didn't know there was an issue with it till this happened.

    Are you for real? Apologies if this has been misread, but from what I can see.

    • 1 It's not my fault if MY website is injected because of files & software I put there!
    • WRONG! You should be proactive, give it the correct permissions, be a good systems administrator and be much more concious when it comes to your buisness.

    Visiting it once a day isnt going to kill you, have it load up when you start your Browser, what's that extra 1MB of ram going to do to load that page? Nothing. But it may save your ass one day if you're attacked like this again.

    What happens if they inject on your billing from a broken module? Oh fuck, sorry clients, your Personal Deetz' are all over the net, go blame my portal provider for not patching an unused module. Or having a zero-day exploit.

    You take responsibility for your clients data, I'm pretty damn sure there's a legislation in every country regarding Data Protection.
    NEED for DPA
    8 Principles for UK act

    I'd not waste the time of day dealing with anybody who feels this lazy about security.

    Have a good day.
    -Chris.

  • bobbybobby Member
    edited May 2013

    No offense.

    Your main entry to customers fucked -> impression? (regardless how secure your client-portal and control-panel is)?

    "Old, unpatched plugin by programmer" -> Same, but worse, tech savvy customers might question rest of your setup.

    edit: some typos and shit

  • DomainBopDomainBop Member
    edited May 2013

    All servers now have new root passwords.

    Using passwords and SSH on port 22. #winning...NOT. Changing the SSH port should be one of the basic security measures you take when you first setup a server.

    http://www.websitepulse.com/help/testtools.server-test.html

    Server Test results

    Service type: ssh://

    Hostname: 24khost.com
    Port: 22
    Test performed from: New York, NY
    Test performed at: 2013-05-03 21:56:09 (GMT +00:00)
    Status: OK
    Response Time: 0.177 sec
    DNS: 0.120 sec
    Connect: 0.025 sec
    Redirect: 0.000 sec

    Jarland said:

    Thread should have ended at:
    2. Wordpress hacked. OMG. This is new. Problem solved, it's up to 24khost to oversee the rest.

    Thread shouldn't have ended because some of 24k's comments in this thread, along with his running SSH on port 22 (not to mention using passwords instead of SSH keys) indicates we're dealing with a web host whose knowledge of security is...ummm...lacking.

    24khost said "doesn't matter, no information was leaked. No data theft."

    It does matter. Did you do a thorough security analysis of your entire system (i.e. not just the compromised wordpress installation) after being hacked, check for rootkits, backdoors, etc, etc?

    sdotsen said "Then you want to expand your services and want people to trust that they'll be placed on a node with less clients IF they pay you a little more money? So why should someone trust your company?"

    based on the port 22 and "doesn't matter" and other comments by 24khost in this thread I think sdotsen has a valid point.

  • dedicadosdedicados Member
    edited May 2013

    @DomainBop +1

    awesome..., even me, changing ssh port to 4 digit at least, is the MUST DO <1 min before server is installed.

    how can you forget it.

  • jarjar Patron Provider, Top Host, Veteran
    edited May 2013

    Yesterday if you tried to ssh into my nodes as root on port 22 you'd have been presented with a password prompt. Every day before it as well, since we started using virtpanel. This alone would be indication that it wasn't secured?

    (Hint: It won't even accept the right one, but it'll ask.)

    More than one way to secure a server.

  • well, and what about firewalls??, 3 failed and bang! you are blocked and ignored.

    ssh/smtp/apache/pop

    can be done with CSF

  • LeeLee Veteran
    edited May 2013

    @jarland said: This alone would be indication that it wasn't secured?

    No but it makes it slightly more interesting and worth checking into further, whereas if it's not on a standard port it more likely indicates a level of seriousness about security and I am better looking somewhere else.

Sign In or Register to comment.