網域名稱俱樂部


返回   網域名稱俱樂部 > 電腦與網路技術 > 數位化世界新聞與觀察評論
論壇幫助 社區 日曆事件 今日新文章 搜尋

回覆
 
主題工具
  #1  
舊 2013-05-12, 12:52 AM
best-url 的頭像
best-url best-url 目前離線
站務管理
 
註冊日期: 2003-08-11
住址: IDN Club
文章: 9,925
發送 MSN 消息給 best-url
預設 Name.com & Moniker.com Respond to Hack Claims

Moniker.com and Name.com Respond to Hack Claims
by Adam Strong 05|10|2013

引用:
Wednesday DNN ran an article about a purported hack of several domain name registrars by HTP (Hack the Planet). While HTP claimed that the hosting company Linode.com was the intended target, the group also claimed they were able to hack in to Melbourne IT, Name.com, Moniker and Xinnet and provided “evidence” of this on their HTP5 zine in a file called registrar-data.txt .

Linode.com acknowledged the hack in a blog post.

Name.com has not responded specifically to the claims made by HTP, but the company sent out an email on the same day of our story alerting customers to change their passwords.

Name.com recently discovered a security breach where customer account information including usernames, email addresses, and encrypted passwords and encrypted credit card account information may have been accessed by unauthorized individuals. It appears that the security breach was motivated by an attempt to gain information on a single, large commercial account at Name.com.

Moniker.com representatives sent DNN a statement today about the claims made by HTP. As we had mentioned in the earlier article, the information published (which we are not reprinting for obvious reasons) contained a handful of user names and passwords for administrative personnel with email addresses using @oversee.net. Moniker is no longer owned by Oversee and some of the employees on that list are no longer with Moniker or Oversee for that matter. The information seemed dated at best.

Moniker’s letter to DNN stated :

“In regards to the alleged attack, our investigation has revealed the following facts.

-The published file does not contain any access or information related to or about Moniker customers, their accounts or their domains.

-The information was also not accessed through the Moniker registrar platform.

-The information included in the file contained access to a discontinued standalone content only site intended for public viewing.

We take any security questions extremely seriously and felt it important to provide a detailed response.”

From what DNN saw in the HTP published files, there did not appear to be any customer user names or passwords from any of the registrars mentioned including Melbourne IT, Name.com, Moniker.com or Xinnet. (In other words, your log-in information isn’t published somewhere online for everyone to grab.) The published file seems to be more of a “look what we saw” snapshot.
IDNs.pro
回覆時引用此篇文章
回覆


發文規則
不可以發表新主題
不可以發表回覆
不可以上傳附件
不可以編輯自己的文章

啟用 BB 代碼
論壇啟用 表情符號
論壇啟用 [IMG] 代碼
論壇禁用 HTML 代碼



所有時間均為 +8。現在的時間是 11:28 AM


本站主機由網易虛擬主機代管
Powered by vBulletin® 版本 3.8.4
版權所有 ©2000 - 2024,Jelsoft Enterprises Ltd.