Originally posted by NotAllThere
View Post
- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Have I been hacked here?
Collapse
X
-
Public Service Posting by the BBC - Bloggs Bulls**t Corp.
Officially CUK certified - Thick as f**k. -
Originally posted by NotAllThere View PostWhat's stored is the MD5 hash of the logged in user's password. It's extremely difficult to recover the password from the hash alone.
I've passed Fred Blogg's concern to admin.Comment
-
Originally posted by vwdan View PostPure MD5 is a piece of piss to reverse nowadays.Down with racism. Long live miscegenation!Comment
-
Cheers for the heads up NAT, only just seen your PM. I have had a couple of these come through recently:
Subject: MyName - ******
I am well aware ****** one of your password. Lets get straight to the purpose. Not one person has compensated me to investigate about you. You do not know me and you are probably thinking why you are getting this mail?
In fact, I installed a software on the X video clips (porn) web site and there's more, you visited this website to experience fun (you know what I mean). While you were viewing videos, your internet browser began working as a Remote Desktop with a key logger which provided me accessibility to your display screen as well as webcam. Immediately after that, my software program gathered every one of your contacts from your Messenger, Facebook, as well as e-mailaccount. Next I made a double video. 1st part displays the video you were viewing (you've got a nice taste : )), and 2nd part shows the recording of your web cam, yea it is u.
You have not one but two options. We will read up on each of these choices in details:
1st option is to neglect this email. In this situation, I most certainly will send your actual tape to each of your your contacts and also visualize concerning the shame you will definitely get. And definitely in case you are in an affair, just how it will certainly affect?
Latter choice will be to give me $6000. Let us refer to it as a donation. As a result, I most certainly will immediately erase your videotape. You will continue on with your daily life like this never happened and you would never hear back again from me.
You will make the payment via Bitcoin (if you do not know this, search for "how to buy bitcoin" in Google search engine).
BTC Address: 196V1q5ewBcDxTfeiTGdbQYBtNZWseM7g5
[case-SENSITIVE, copy and paste it]
In case you are looking at going to the police, okay, this email cannot be traced back to me. I have dealt with my moves. I am also not looking to charge you so much, I just want to be rewarded. I've a unique pixel within this email, and at this moment I know that you have read this email message. You now have one day to pay. If I do not get the BitCoins, I will certainly send out your video recording to all of your contacts including close relatives, coworkers, and so on. However, if I do get paid, I will erase the recording right away. It's a non-negotiable offer that being said please do not waste my personal time & yours by responding to this message. If you really want proof, reply with Yup! then I definitely will send your video recording to your 12 contacts.=
As others have said, this site definitely doesn't have plain text passwords - but the encryption is easy to bust so if someone got the DB then your details could have been nabbed.
Hand on heart I have never seen a full on break in to the forum in the whole time that I have hosted it. I have had a couple of client sites (Wordpress) that only had the admin accounts on them zipped up and downloaded via WeShare or some other tulipe. Usually there are tell-tale signs when you are hackable, some will just pinch all the details but others will run spam through the server or use it to host DoS attacks etc, so when you are that vulnerable you tend to get hit more than once, I have never seen anything like this with the forum. Nothing ever written to the filesystem, no amended files etc. So while I am not saying that the DB hasn't been pinched at some time I am not aware of it ever having happened or I would have told you about it, to secure your passwords if nothing else. They do say the best hackers leave no trace though...
I have all the sites I run in Git repos and every so often I download the production sites over the top and run git status to see if any of the files have changed and to put user generated content in to the repo as a back up method. Like I said, nothing on the forum has led me to believe it has been compromised at any time.Comment
-
Had a bit of think about this, I know some people are ultra careful and will use a wildcard email address and sign up to places like this with things like cuk@ or cukforum@ - so did a quick wildcard query on the email records in the user database on the forum and checked 10 of them on https://haveibeenpwned.com/ - they have all come up as having never been hacked. And the oldest record I checked was from 2005. So I am claiming not guilty for loss of data. On this occasionComment
-
Thanks. I am guessing the LinkedIn connection is most likely. I use it daily. By the sound of it CUK is unlikely to have been compromised. I will change my details at LinkedIn. Cheers.
Edited to add - At one point, yes the password would have been the same as here and LinkedIn. I did change the password now that I think about it but at LinkedIn, but not here. It would be historical data then, most likely from a leak at LinkedIn published on one of the sources you identified.Last edited by Fred Bloggs; 22 July 2018, 23:35.Public Service Posting by the BBC - Bloggs Bulls**t Corp.
Officially CUK certified - Thick as f**k.Comment
-
Thanks to admin, I have determined that indeed it is either LinkedIn or Avast where my data has been leaked to.
As I said, thinking about it, my LinkedIn in password was changed and two factor authentication enabled. I am wondering now if I ought to dump my Gmail account? Obviously, the password on there is unique and I have two factor authentication enabled, but I really do not want anyone poking around in the associated Gdrive, photos etc. Should I dump my Gmail account?
Thanks again, this has been very enlightening for me. I take identity theft seriously, hence my tightening up my LinkedIn and Facebook accounts, not using real data where possible etc.
To be honest, my biggest concern on line is companies house and the data held there.Public Service Posting by the BBC - Bloggs Bulls**t Corp.
Officially CUK certified - Thick as f**k.Comment
-
Originally posted by Fred Bloggs View PostThanks for thoughts. Though cannot be a key logger? I haven't keyed my PW in for ages, CUK auto logs me in. I immediately deleted the mail, but yes, passwords are changed. Edited to add - It was gmail that had automatically sent the mail to the spam folder, if that is of any significance.
https://www.us-cert.gov/ncas/alerts/TA18-201ASee You Next TuesdayComment
-
Originally posted by Fred Bloggs View PostThanks to admin, I have determined that indeed it is either LinkedIn or Avast where my data has been leaked to.
As I said, thinking about it, my LinkedIn in password was changed and two factor authentication enabled. I am wondering now if I ought to dump my Gmail account? Obviously, the password on there is unique and I have two factor authentication enabled, but I really do not want anyone poking around in the associated Gdrive, photos etc. Should I dump my Gmail account?
Thanks again, this has been very enlightening for me. I take identity theft seriously, hence my tightening up my LinkedIn and Facebook accounts, not using real data where possible etc.
To be honest, my biggest concern on line is companies house and the data held there.
The issue came about when LI got hacked, this was an early one I signed up with and just used my usual 6 character password that I also used on Facebook and lots of other sites at the time, I now use random ones for every site I use and a password manager to remember them all. Sounds like you were the same, LI was originally hacked in 2012 according to the hibp site, encrypted passwords but no salt so short, dictionary words etc were quickly cracked. The new development of these emails, and I must admit to a sneaking admiration to whoever came up with it, is just using that LI dump to email people with the password they had at that time with the hope that a few suckers will cough up.
So, unless you some extremely filthy phots of yourself that would kill you if they got into the public realm, then I would not worry about changing your Gmail account, even if at some point it had the same password as here and your LI account. Mind you, if you do have photos that you don't ever want to get compromised, or anything else that is so sensitive that you would worry about anyone else ever seeing it, the best thing is to never put it anywhere near a web server at all. Ever.Comment
-
Originally posted by administrator View PostHad a bit of think about this, I know some people are ultra careful and will use a wildcard email address and sign up to places like this with things like cuk@ or cukforum@ - so did a quick wildcard query on the email records in the user database on the forum and checked 10 of them on https://haveibeenpwned.com/ - they have all come up as having never been hacked. And the oldest record I checked was from 2005. So I am claiming not guilty for loss of data. On this occasionComment
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers
Contractor Services
CUK News
- Which IT contractor skills will be top five in 2025? Jan 2 09:08
- Secondary NI threshold sinking to £5,000: a limited company director’s explainer Dec 24 09:51
- Reeves sets Spring Statement 2025 for March 26th Dec 23 09:18
- Spot the hidden contractor Dec 20 10:43
- Accounting for Contractors Dec 19 15:30
- Chartered Accountants with MarchMutual Dec 19 15:05
- Chartered Accountants with March Mutual Dec 19 15:05
- Chartered Accountants Dec 19 15:05
- Unfairly barred from contracting? Petrofac just paid the price Dec 19 09:43
- An IR35 case law look back: contractor must-knows for 2025-26 Dec 18 09:30
Comment