And a Russian guy (such as me) spotted them first.
same mentality ?
Printable View
If they can already access your password for RS, what good does it do to change it? They would still be able to get the new one, wouldn't they? If so, need to wait until it is fixed, then reset a new password and then change that password if used on other sites, etc.. Make sense, or just ignorant of how this all works?
As a tip on the whole password thing that I thought was brilliant, but then... I set up separate passwords for every account I have, generally 12 + letters plus numbers. Nonsense stuff like 5ksjel48frl248, obviously I had to write them down, then I set my windows password to something hard to crack but easy for me to remember so it does not have to be written down. Of course most cyber attacks will come from external sources, but if someone busts in my office and finds the password list they will still be SOL.
Another excellent free password manager browser addon is LastPass
Most of my non financial sites RS, Gmail, FB etc the passwords are stored with the browser somehow. On financial sites the none of my passwords are stored and the sites usually have some additional level of browser protection (prompting additional questions from a different IP upon log in). My question is with one of the password managers, what happens if your computer becomes compromised? Could someone not then log in as if they were you?
BTW, I see you guys got rid of the new admins. You should be aware that I still get all the connections that made me start the thread, though. There is pretty clearly some rogue code still floating around, which may well allow hacker to make new new admins.
Just blame everything on Ken Russo.
Honestly after that painfully long DDoS attack I wouldn't be surprised if someone was paid off to mess with the site.
I hope im wrong.
Perhaps this is one of the new admins. They sent me a message over on Facebook, some gibberish. When I check his friends list, shock of all shockers many claim to be hackers or have that Guy Fawkes mask as their profile pic. https://www.facebook.com/farenzy.turke
Good thing Facebook takes things seriously.
Attachment 5846
What grand scheme did you guys uncover to garner a fan base that is willing to take over ownership of a scam board full of people who use ad-blocker anyway.
Well, the site still loads slow for me, as well as accessing the threads. I was hoping once this issue was fixed that would solve the problem. I keep running scans (malware and virus) thinking it might be at my end, but my system is safe. I ran four different virus programs and nothing found. Anyone else having the site load slow for them, or am I the only one?
The boss is in his counting house,counting out his moneyupgrading the software as we speak, so most of the problems should be fixed.
Other than that, the forum is loading normally for me.
As a temporary solution, everyone can add this line to their hosts fileCode:127.0.0.1 damnxd.org www.jobless-jack.com
it will break connections to those ad sites .
Location of hosts file:
WIN - C:/Windows/System32/drivers/etc/hosts
MAC & LINUX - /etc/hosts
more info: Patching the Hosts File to Stop Hackers and Block Websites | PC Memoirs
Still seeing the odd extra sites loading.
Removed the code below from the footer templates.
<div id="footer_morecopyright" class="shade footer_morecopyright">
<!-- Do not remove cronimage or your scheduled tasks will cease to function -->
{vb:raw cronimage}
<!-- Do not remove cronimage or your scheduled tasks will cease to function -->
{vb:raw vboptions.copyrighttext}
{vb:raw template_hook.footer_copyright}
</div>
The hackers that created admin accounts using the upgrade.php hole must have added this code to the footer templates.
Firefox is no longer showing these redirects at the bottom of each page.
Well that was dumb. The place where the injected crap was put in the copyright text in the AdminCP. Just took friggin forever to figure this one out.
Site Name / URL / Contact Details
Thanks for fixing it! Now it loads like always....FAST! Tell everyone involved thanks for fixing this. It is appreciated.
Well at-least it didn't take almost a month to fix like the DDoS.
So it looks like some wannabe hackers exploited a common bug that was passed around the hacker community. They probably just read some guide on how to break v-bulletin(insert version here) and got supa-excited about it!
It took all but a few days to fix it, and now RS has more publicity. Brilliant plan Russian geek squad crew.