View Single Post
Old 12-22-2007, 03:24 PM  
jcsike
Confirmed User
 
Industry Role:
Join Date: Jan 2006
Posts: 689
Quote:
Originally Posted by ThePornBrain View Post
intersting bump. i hope this turns out a little better than handling the security issues of NATS. but since you guys claim to be experienced in handling companies no matter what the biz is i have full trust of course.
you see this?

Quote:
Originally Posted by milan View Post
After many MANY emails and VM's I will post what OC3 Networks discovered back in October after routine audit of 2 of our clients security.

We know this issue exist since mid Aug 2007, secured our customers and blocked the intruder IP’s from any access to our network.

We posted the thread https://gfy.com/fucking-around-and-business-discussion/779742-oc3-networks-customers-urgent.html and got some lawsuit treat to sue us that we could have care less… BUT when our customers that we tracked the breach on their servers got treats as well and requested us to NOT come out public with it, we honored their request.


I've been involved with a high number of NATS clients and have found the following to be true:
*) Changing all admin level account passwords stops the intruder. He still attempts to login, but in vain.
*) As soon as TMM has admin access to NATS the intruder is back. Sometimes the same day.
*) Intruder is using an automation script that dumps the NATS members list. In some cases he is doing this every hour on the hour.[/color]

*) NATS was vulnerable to SQL injection attacks. I haven't investigated whether it still is.


P.S. Im hearing that there is a backdoor that TMM can use to get into your NATS, but I havent investigated so its speculation. Only reason I even mention this is because NATS is encrypted and you dont know. Im not interested in decrypting NATS just to find out. There are other ways. I hope this isn’t true.
__________________
jcsike is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote