Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


GalaxyHostPlus Suspected Breach of Contact Details - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

GalaxyHostPlus Suspected Breach of Contact Details

2»

Comments

  • @Skyrider said:
    And the dark cloud hosting site is down. Giving a 404. Galaxyhostingplus said that they have taken action against them.

    Hello,
    We have turned our website down to express our sadness of the matter happened yesterday's evening the website's back to it's normal and it is still in our custody!
    However this situation have been dealt with successfully.

    Friendly reminder : WE DO NOT TOLERATE SUCH ACTIVITES AND WE HEREBY DO NOT PROMOTE THEM

  • Virtualizor said that they have not found any issues in Virtualizor but are following it up with galaxyhostplus, so should be safe to keep using!

    @DarkCloud said:
    Dear members,
    E-Mails were sent directly to Janusz address to discover together this breach.
    However we've announced that we're aware of the staff member caused in this security breach and therefor been terminated and permanently restricted from reaching our official contact members and servers.
    We will contact Virtualizor as soon as we can catch them to figure out their issues!
    We regret again on such action and we're deeply sorry for the inconvenience caused!

    Did you mean to post using your galaxyhostplus account?

    Thanked by 1zafouhar
  • BlazingServersBlazingServers Member, Host Rep

    Here is the response of Virtualizor:

    Response

  • @linuxthefish said:
    Virtualizor said that they have not found any issues in Virtualizor but are following it up with galaxyhostplus, so should be safe to keep using!

    Yes, we are. We have got the web logs and as of now, there isnt anything concrete. We are still investigating and also GalaxyHost is searching from their end.

  • Hello.

    Few updates we working with Virtualizor to find how this happened.

    We found guy called Jamie who was sending these emails on the 9th of January. We have taken actions to migrate to SolusVM during that time. On 11/03/2016 no data was affected. Emails are based on same adress like on 9th January 2016. only 320 Adress out of 2000 are affected on Virtualizor panel.

    Virtualizor panel logs looks to be fine so I say it's safe to use.
    We still looking how did such data go to Jamie hand we trying to contact Jamie at this moment.

    We are now on chat with Dark Host we are working to resolve this and track Jamie.
    If anyone have anymore info about it let us know.

  • ehabehab Member

    @GalaxyHostPlus, thanks for the updates even thou i am not a client with you but now considering it :) hope you have less stressful sunday.

    Thanked by 1GalaxyHostPlus
  • @ehab said:
    GalaxyHostPlus, thanks for the updates even thou i am not a client with you but now considering it :) hope you have less stressful sunday.

    Thank you for your positive comment.

    We hope everything is now resolved.
    Also to include we are lucky only emails are stolen nothing else due our high security.
    SolusVM will allow us for higher security included admin panel protection which was not possible with old panel. means IPs whitelist.

    I was online all night and cross check all our clients to make sure only old VPS panel is affected which in this cause only 320 accounts are affected on 6 January 2016 which we took actions shut their service down. we are now on hunsting with virtualizor and dark cloud for Mr Jamie. We got more information of included his IP from Egypt.

    I hope everyone have a nice day all is save so don't worry if you require more info fell free to contact us.

    Kind Regards
    Janusz C

    Thanked by 1ehab
  • BlazingServersBlazingServers Member, Host Rep

    So @GalaxyHostPlus, is it safe to conclude that Virtualizor is safe?

    I think it is.

  • @BlazingServers said:
    So GalaxyHostPlus, is it safe to conclude that Virtualizor is safe?

    I think it is.

    Hello.

    It should be safe to use. but monitor your connections.
    Best way to check is
    /usr/local/emps/var/log/mysqld.log
    and main to monitor
    /usr/local/emps/var/log/web.access.log

    Everything else is safe. We can say everything back to normal.

  • BlazingServersBlazingServers Member, Host Rep

    @GalaxyHostPlus said:
    Everything else is safe. We can say everything back to normal.

    Yes...thanks...(I setup a couple of servers yesterday with that)

  • I vouch for Virtualizor they are amazing with support and are always improving, solusvm can be less buggy but support is rubbish.

    Thanked by 1netomx
  • GalaxyHostPlus said: We found guy called Jamie who was sending these emails on the 9th of January

    Just wondering, what's the affiliation with this person and your company. If he's outside the company, it'd still be good to know how he managed to acquire said addresses.

    Also, TBF, you've emailed your customer based with a title '[Critical] Virtualizor Breach of Email Data', about 2 hours after you'd became aware of the situation. Maybe a bit too quick to have stated that as fact?

  • @ricardo said:

    We take security very seriously probably yes email was little too fast it could be sent a lot better during night. We are happy to say all personal data is safe so should not affect the service.

  • MarkTurnerMarkTurner Member
    edited March 2016

    GalaxyHostPlus said: Virtualizor Only store email addresses in this case it looks like sql injection were made which shown full list of Emails addresses.

    I would be surprised if this is the case. We have audited Virtualizor and have not discovered any SQL injection vectors so far. That doesn't mean that they don't exist, but from our review we have not discovered any so far.

    You need to be careful disparaging them and calling into question the security of their product until you can actually demonstrate evidence that proves it.

    @virtualizor have you reviewed this allegation? What have you found so far?

    Thanked by 2netomx telephone
  • shovenose said: Fuck, so Virtualizor is insecure? Crap, literally just set up multiple servers with it. Time to switch to SolusVM again :'(

    I wouldn't say that, my money is on Virtualizor being in the clear and this being a PEBCAK on the operators side.

    Thanked by 2MCHPhil Clouvider
  • @MarkTurner said:

    Yes we are working on it. But nothing found as of now.

  • ricardoricardo Member
    edited March 2016

    Yet another email, but this time from darkcloudhosting.co.uk, from "Inspector General" (har har)

    Inspector General Notice

    To whom it may concern.

    Yesterday a breach was announced on the GHP's side, one of our ex-operatives exploited their panel database which we can not deny!
    We had no idea about this matter and investigations were made and resulted in major improvements to both companies..
    Discussions were made with the other side's company and we replied to their questions accordingly.
    We hope that no issues will happen later on.

    Best regards,
    Albert Setland
    Inspector General
    Dark Cloud Hosting

    TBH, ESL aside... I'm not buying either side's story. I think the data was sold, or they're both party to the same company (or were). I've no evidence of that, but there's just way too many inconsistencies in the explanations. One for the kangaroo court, I've put the info out there and can't see how any further explanation would be useful to me.

  • @ricardo said:
    Yet another email, but this time from darkcloudhosting.co.uk, from "Inspector General" (har har)

    No data was sold and we are not the same company. I first time hear about Dark Hosting was on 11th of March. Also why would I waste 2 Years of hard work collecting my clients it just make no sense to loss such work by selling data. I work hard on this company on free time doing courses to improve from my side so selling data makes no sense here.

    If anyone need send any inspector to my company fell free I give permission to check my PC and chat history to prove I'm clear and this was real hack or glitch with VPS Panel as only 320 Addresses are out which I could have other theory which I will ask Vir later about it.

    Please think again before making any judgment as I'm also victim here I think no one want to be on my position today while he know his doing his best to protect from such things. I hope for the best and hope this is the last cause like this.

    Kind Regards

    Janusz Czeropski

    Galaxy Digital Networks

  • ehabehab Member

    Janusz, close the browser/pc and have a break/sleep, comeback tomorrow ...

    Thanked by 1GalaxyHostPlus
  • @ehab said:
    Janusz, close the browser/pc and have a break/sleep, comeback tomorrow ...

    Wish to do that but no one will do the work for me :)

    Also need finish migration to SolusVM today to make sure everything full safe.

    Have a nice Sunday.

  • ricardoricardo Member
    edited March 2016

    No data was sold and we are not the same company. I first time hear about Dark Hosting was on 11th of March. Also why would I waste 2 Years of hard work collecting my clients it just make no sense to loss such work by selling data. I work hard on this company on free time doing courses to improve from my side so selling data makes no sense here.

    I guess that's a rhetorical question because I'm not up to speed on your motivations and work history, nor should I be. I imagine the rest of the customer base is in the same boat.

    If anyone need send any inspector to my company fell free I give permission to check my PC and chat history to prove I'm clear and this was real hack or glitch with VPS Panel as only 320 Addresses are out which I could have other theory which I will ask Vir later about it.

    To be fair, you (edited out) a post saying it was person X, then you said it was Virtualizor, then not Virtualizor... and now some mysterious person called Jamie. If anything needs to be done, just come back in a couple of days, maybe 3, maybe 4 and giving the final analysis would probably be a nice course of action.

    Please think again before making any judgment as I'm also victim here I think no one want to be on my position today while he know his doing his best to protect from such things. I hope for the best and hope this is the last cause like this.

    Not singling you out here, but I notice this with many LET hosts (not all). You want some kind of charitable status because you're costing 10 bucks a year and suddenly it's "understandable" that you leak private data, or you're doing the customer a favour by offering such a service, or that because WHMCS/SolusVM/Virtualizor make a hosts job more convenient, that it's a legitimate reason to be excused for whatever can/can't happen.

    All I'm actually saying here is that leaking data is probably the worst thing a provider could do, for everyone involved. You're definitely not a victim if you choose to run buggy software for your convenience at the expense of customer integrity, it's a bit rich to say that. Also, what you've said so far is pretty patchy and you're swinging in between blaming a bit of software and some random person who you've gave no background on. I reserve the right to be sceptical :)

    Maybe get your head around the problem and then communicate what actually happened when you are more sure about it. And sorry, there's no excuses or acceptable reasons for that info being leaked out. Tis how it is. :)

    I should add, the service you have given has been absolutely fine, no downtime and nice value. I'd hope that you can find a clear-cut answer to this little ... mishap.

  • @ricardo said:

    I got the info about Jamie from Leo who own mountrix where the emails were sent out.

    When we start with Vir everything was stable during that time. Issues only started after 1000VMs.

    I leave the rest uncomment I already said what I have to said.

  • virtualizor said: Yes we are working on it. But nothing found as of now.

    I still maintain my belief that this is nothing to do with Virtualizor.

    If there is no evidence to support this then the provider needs to retract their allegation and examine their internal processes for the cause of the leak.

  • WHTWHT Member
    edited March 2016

    Wow 1.000 vps on a server?

    @GalaxyHostPlus said:
    I leave the rest uncomment I already said what I have to said.

  • edited March 2016

    @WHT said:

    Wow 1.000 vps on a server?

    Nope. We have more than one server even more.

    Update.
    More soon once got more info correctly from the source.
    Looks like it will be hard cause.

  • You don't name and shame and contact police unless you want to be the one that gets arrested. If it's criminal activity contact the police and your lawyer and speak no further of it in public domain other than information required for security.

    Thanked by 1ehab
  • WHTWHT Member

    So someone was advertising for darkdickhost with your emails and now you have found who was spamming?
    Darkdickhost told you that they are not involved in this and you trusted them? After blaming virtualizor now you say database was not hacked? Wtf is this?

  • Dear Client's.

    We have investigate about Emails where were send out on 9th January and 11th March.
    We have finally find out what happened and how emails were taken from GalaxyHostPlus.

    Our X Staff member have copy and paste 320 Email Addresses out of GalaxyHostPlus to Mountrix on the 9th January which is strongly against our rules.
    We have taken actions against Mountrix and shut their website down with legal help.

    We are ready to take legal actions against our X Staff which was fired from his position back in February. however his access was taken back in January after emails were out of GalaxyHostPlus same with other staff members.

    X staff was Level 1 support which means he was limited only to support ticket and live support and basic settings. No other data was affected based on his custom permission. X staff was behaving very well during this time and was working normal like all our staff which is actually shocked for us what happened. thank you to people who helped us in this Investigation.

    We have full details of X Staff which we collect from all our staff. we cannot name him due legal issues it may cause.

    I Janusz CEO of Galaxy Digital Networks want also Apologize officially to @Virtualizor for false judgment on data leak from their VPS Panel.

    We deeply apologize for any inconvenience this may have caused.

    Also note from other providers please be careful with your staff even if its trusted you may also have his IDs and so on it's still not safe even with limited access.

    Kind Regards
    Janusz Czeropski
    CEO & Founder, Galaxy Digital Networks

  • JacobJacob Member

    So if he had 'very limited access', how did he get an email address export?

  • @Jacob said:
    So if he had 'very limited access', how did he get an email address export?

    He copy and past manually from VPS panel he heaved basic access such as reboot and start in panel.

Sign In or Register to comment.