Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
08-06-2014, 06:34 AM | #1 |
So Fucking Banned
Industry Role:
Join Date: Dec 2008
Location: Teen Land
Posts: 2,001
|
Russia gang hacks 1.2 billion usernames and passwords
http://www.bbc.com/news/technology-28654613
A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses, according to Hold Security - a US firm specialising in discovering breaches. Hold Security described the hack as the "largest data breach known to date". It claimed the stolen information came from more than 420,000 websites, including "many leaders in virtually all industries across the world". Hold Security did not give details of the companies affected by the hack. "They didn't just target large companies; instead, they targeted every site that their victims visited," Hold Security said in its report. "With hundreds of thousands of sites affected, the list includes many leaders in virtually all industries across the world, as well as a multitude of small or even personal websites." Continue reading the main story ?Start Quote These databases were used to attack e-mail providers, social media, and other websites to distribute spam to victims and install malicious redirections on legitimate systems? Hold Security The New York Times, which first reported the findings, said that on its request "a security expert not affiliated with Hold Security analysed the database of stolen credentials and confirmed it was authentic". "Another computer crime expert who had reviewed the data, but was not allowed to discuss it publicly, said some big companies were aware that their records were among the stolen information," the paper said. The paper added: "Hold Security would not name the victims, citing nondisclosure agreements and a reluctance to name companies whose sites remained vulnerable." The Wall Street Journal later revealed that Hold Security intended to offer website owners the ability to check whether they had been affected, but only if they paid a fee. The firm initially posted a message on its site saying it would charge $120 (£71) a month for the "breach notification service", however the details have since been replaced with a message saying "coming soon!". One computer security expert said he was surprised by this approach. "This situation is quite unusual in that the company has decided to charge for this information," Dr Steven Murdoch from University College London's computer science department told the BBC. "Usually they would do an initial disclosure [of who had been affected] for free and then offer their services for a fee at a later stage. "The company rightly points out that there is going to be a huge amount of work to securely contact all the affected websites, but a common solution to this is to partner with a government or industry-funded organisation to help with that." Despite the large amount of credentials said to have been compromised, Dr Murdoch added that it would be premature to advise the public to reset all their passwords. "Although there's a large amount of passwords involved, a lot of them could be irrelevant and many of the websites tiny," he said. "It's not necessarily the case that a large proportion of internet users have been affected. Until we get more statistics we won't know that. "So, there's no reason to panic now, but perhaps it's a good reminder to follow best practice of not using the same password on multiple websites, because this will not be the last time such a breach happens." Multi-pronged attack? Hold Security, which has previously reported about hacks on Adobe and Target, said it took more than seven months of research to discover the extent of the latest hack. The firm claimed the gang initially acquired databases of stolen credentials from fellow hackers on the black market. "These databases were used to attack e-mail providers, social media, and other websites to distribute spam to victims and install malicious redirections on legitimate systems," Hold Security said. The hackers also got access to data from botnets - a network of computers infected with malware to trigger online fraud. Hold Security said the botnets helped the hacking group - which it dubbed CyberVor - identify more than 400,000 websites that were vulnerable to cyber attacks. "The CyberVors used these vulnerabilities to steal data from these sites' databases," the firm said. "To the best of our knowledge, they mostly focused on stealing credentials, eventually ending up with the largest cache of stolen personal information, totalling over 1.2 billion unique sets of e-mails and passwords." |
08-06-2014, 06:36 AM | #2 |
Too lazy to set a koala
Industry Role:
Join Date: Jan 2007
Location: CZ/EU forever!
Posts: 16,136
|
420,000 websites, that tooks a bit of time ... now what are those informations good for? just tons of wasted time ... or they can use those sites for backlinks and voila ...
__________________
|
08-06-2014, 07:10 AM | #3 |
<&(©¿©)&>
Industry Role:
Join Date: Jul 2002
Location: Chicago
Posts: 47,883
|
translation: 420k wordpress blogs were hacked
__________________
Custom Software Development, email: woj#at#wojfun#.#com to discuss details or skype: wojl2000 or gchat: wojfun or telegram: wojl2000 Affiliate program tools: Hosted Galleries Manager Banner Manager Video Manager Wordpress Affiliate Plugin Pic/Movie of the Day Fansign Generator Zip Manager |
08-06-2014, 07:19 AM | #4 |
Likes Pie
Industry Role:
Join Date: Dec 2007
Location: The land that liberated porn
Posts: 12,400
|
__________________
Get 5% for life on Model Earnings and Fan token buys with AdultNode.com - Studio Link - Creators keep 100% of your earnings
|
08-06-2014, 07:40 AM | #5 |
Too lazy to set a custom title
Join Date: Dec 2006
Posts: 29,035
|
A Russian can steal your password by just looking at you.
__________________
|
08-06-2014, 07:41 AM | #6 |
Special Ops Consultant
Industry Role:
Join Date: Sep 2003
Location: Canuckstikan
Posts: 22,508
|
Hey wassup Copy/Past... how you doing?
__________________
Porn.ai Deepfake.com ai-dreamgirls.com email: [email protected] skype: jean.francois.laverdiere TG: @jman1216 |
08-06-2014, 08:09 AM | #7 |
Confirmed User
Industry Role:
Join Date: Apr 2012
Location: NJ
Posts: 1,629
|
good thing all my passwords are 12344321 LOL GOOD LUCK RUSSIA
__________________
AIM - thePardovich Email - [email protected] A World Wide Leader In Hosting! * CHOOPA.COM * Order Now! |
08-06-2014, 08:15 AM | #8 |
Confirmed User
Industry Role:
Join Date: Sep 2013
Posts: 767
|
Hope they didn't hacked my WOW account
__________________
LifeSelector Affiliates - Make money today promoting the online porn of tomorrow. tom [at] lifeselector.com skype: tom-ia icq: 684001976 |
08-06-2014, 08:16 AM | #9 |
Likes Pie
Industry Role:
Join Date: Dec 2007
Location: The land that liberated porn
Posts: 12,400
|
__________________
Get 5% for life on Model Earnings and Fan token buys with AdultNode.com - Studio Link - Creators keep 100% of your earnings
|
08-06-2014, 08:18 AM | #10 |
Confirmed User
Industry Role:
Join Date: Sep 2013
Posts: 196
|
That's the only thing I was worried about when I read this.
__________________
info[at]gallerytraffic.net Icq: 680 - 927 - 770 |