Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Mon Apr 15, 2013 2:31 pm 
Offline
Senior Newbie

Joined: Sat Dec 13, 2008 6:36 pm
Posts: 10
http://slashdot.org/firehose.pl?op=view ... id=2603667

An anonymous reader writes "On Friday Linode announced a precautionary password reset due to an attack despite claiming that they were not compromised. The attacker has claimed otherwise, claiming to have obtained card numbers and password hashes. Password hashes, source code fragments and directory listings have been released as proof. Linode has yet to comment on or deny these claims."


Top
   
PostPosted: Mon Apr 15, 2013 2:35 pm 
Offline
Newbie

Joined: Sun Apr 17, 2011 8:43 pm
Posts: 4
There is more discussion about this topic over on HackerNews: https://news.ycombinator.com/item?id=5552756

I'd really like to hear confirmation from Linode if CCs were taken or not.

EDIT: re-reading Linode's blog post, it says:
Quote:
In addition, we have found no evidence that payment information of any customer was accessed.

So I guess we can assume not CCs were taken.


Top
   
PostPosted: Mon Apr 15, 2013 5:33 pm 
Offline
Senior Member
User avatar

Joined: Tue May 26, 2009 3:29 pm
Posts: 1691
Location: Montreal, QC
Nothing anybody on slashdot or ycombinator linked to demonstrates that anything more than the linode.com webserver and forums were compromised. There was a claim that Linode stored customer credit card information on a compromised server effectively unprotected (encrypted but keys stored in the same location), but there was no evidence of this provided.


Top
   
PostPosted: Mon Apr 15, 2013 6:19 pm 
Offline
Junior Member

Joined: Sun Oct 21, 2012 4:00 pm
Posts: 28
I'm a little suspicious that I was allowed to just type in my new password twice in order to reset.

Doesn't changing the password from within the usual linode manager interface...

... like, I thought it requires the old password be entered in order to reset a password or make other changes?


Top
   
PostPosted: Mon Apr 15, 2013 6:30 pm 
Offline
Senior Member
User avatar

Joined: Thu Nov 24, 2011 12:46 pm
Posts: 139
Location: Mesa AZ
kuzetsa wrote:
I'm a little suspicious that I was allowed to just type in my new password twice in order to reset.

Doesn't changing the password from within the usual linode manager interface...

... like, I thought it requires the old password be entered in order to reset a password or make other changes?

You had to log in first with a original password. You should also have gotten notification that you password changed via email to your contact email address.

I went and changed it again a few hours later using the normal password change process.

_________________
Kevin a.k.a. Dweeber


Top
   
PostPosted: Mon Apr 15, 2013 8:49 pm 
Offline
Newbie

Joined: Sun Apr 17, 2011 8:43 pm
Posts: 4
Guspaz wrote:
Nothing anybody on slashdot or ycombinator linked to demonstrates that anything more than the linode.com webserver and forums were compromised. There was a claim that Linode stored customer credit card information on a compromised server effectively unprotected (encrypted but keys stored in the same location), but there was no evidence of this provided.

Then you aren't reading: http://seclists.org/nmap-dev/2013/q2/3

Seclist admin clearly states:

Quote:
I'm sorry for the downtime over the last week, but someone compromised our hosting provider (Linode) and used that access to break into some of our virtual private server (VPS) systems.


Top
   
PostPosted: Tue Apr 16, 2013 3:12 am 
Offline
Senior Member
User avatar

Joined: Tue Jan 04, 2005 7:32 am
Posts: 277
Website: http://www.betadome.com/
Location: Ă…lesund, Norway
Skype: neonnero
Twitter: neonnero
A lookup on the IP address for nmap.org shows that the NMAP website is hosted on a Linode server. I would assume that the attackers wishing to comprimise the nmap.org website (and the NMAP tool) noticed that the reverse lookup on that IP address showed up as ending with ".members.linode.com", and started their directed attack from there. As Linode themselves stated, the attack on Linode was directed at one specific customer/account, assuming with a brute force attack, so it's most likely that if any account was comprimised, it was limited to that specific account.


Top
   
PostPosted: Tue Apr 16, 2013 2:14 pm 
Offline
Senior Member

Joined: Sat Jun 05, 2004 12:49 am
Posts: 333
Quote:
As Linode themselves stated, the attack on Linode was directed at one specific customer/account, assuming with a brute force attack, so it's most likely that if any account was comprimised, it was limited to that specific account.


Yea, and they just also stated that they did take credit card details.

Quote:
As a result of the vulnerability, this group gained access to a web server, parts of our source code, and ultimately, our database.


Top
   
PostPosted: Tue Apr 16, 2013 2:36 pm 
Offline
Senior Member
User avatar

Joined: Sun Dec 27, 2009 11:12 pm
Posts: 1038
Location: Colorado, USA
This is why I ALWAYS use one-use credit cards for online purchases.

Pretty much any big credit card vendor offers them.

Then if they're lost/stolen/hacked - they're already used and of ZERO value.

_________________
Either provide enough details for people to help, or sit back and listen to the crickets chirp.
Security thru obscurity is a myth - and really really annoying.


Top
   
PostPosted: Tue Apr 16, 2013 4:36 pm 
Offline
Newbie

Joined: Tue Nov 08, 2011 10:12 pm
Posts: 4
Website: http://blog.michaelfmcnamara.com
We really need more details concerning this incident... was it a brute force password attack such as that we're seeing against WordPress? It certainly doesn't sound like that from the information available. Linode needs to provide additional details, what vulnerability? What fix?

Is this a case of doing the right thing or lawyer-ing up?

Hopefully, it's an unknown vulnerability and Linode is just allowing time for developers to close the loophole before disclosing the actual details. Hopefully!


Top
   
PostPosted: Tue Apr 16, 2013 4:47 pm 
Offline
Senior Member

Joined: Mon Sep 01, 2008 5:14 pm
Posts: 92
MichaelMcNamara wrote:
We really need more details concerning this incident... was it a brute force password attack such as that we're seeing against WordPress? It certainly doesn't sound like that from the information available. Linode needs to provide additional details, what vulnerability? What fix?

Is this a case of doing the right thing or lawyer-ing up?

Hopefully, it's an unknown vulnerability and Linode is just allowing time for developers to close the loophole before disclosing the actual details. Hopefully!


Read the blog: http://blog.linode.com/2013/04/16/secur ... nt-update/


Top
   
PostPosted: Tue Apr 16, 2013 6:04 pm 
Offline
Senior Member
User avatar

Joined: Tue Mar 17, 2009 5:11 am
Posts: 129
Location: UK
Linode breached again?? Seriously not impressed


Top
   
PostPosted: Tue Apr 16, 2013 6:43 pm 
Offline
Junior Member

Joined: Wed Jan 27, 2010 1:48 pm
Posts: 22
Location: Las Vegas, NV
OverlordQ wrote:
Quote:
As Linode themselves stated, the attack on Linode was directed at one specific customer/account, assuming with a brute force attack, so it's most likely that if any account was comprimised, it was limited to that specific account.


Yea, and they just also stated that they did take credit card details.

Quote:
As a result of the vulnerability, this group gained access to a web server, parts of our source code, and ultimately, our database.


Where did you see that? I didn't see it in the couple of articles I read.


Top
   
PostPosted: Tue Apr 16, 2013 6:57 pm 
Offline
Senior Member
User avatar

Joined: Tue May 26, 2009 3:29 pm
Posts: 1691
Location: Montreal, QC
lvthunder wrote:
Where did you see that? I didn't see it in the couple of articles I read.


Look two posts above yours.


Top
   
PostPosted: Wed Apr 17, 2013 6:22 pm 
Offline
Senior Member
User avatar

Joined: Wed Mar 17, 2004 4:11 pm
Posts: 554
Website: http://www.unixtastic.com
Location: Europe
Dammit, This is really worrying. It's one phone call to get a credit card canceled and a new one in the post. If I'm not told I can't make that call.

I'd be interested in finding out who was trying to h4x0r nmap though.

EDIT: Thought I was on slashdot and commented without reading the blog.


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 4 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group