miata.net hacked?
Found this in my updates folder this evening:
Miata.net Server security breach This past weekend, Miata.net suffered a breach of our servers by hackers who gained access to all our servers. Although we don't have direct evidence that they accessed the encrypted passwords stored in the database, prudence dictates that its better to be safe. As a result, we recommend that you change your password on the Miata.net forum. We recommend using a strong password, as its much more difficult to decrypt. In addition, we recommend that you not use the same password here that you use on other sites. We apologize for the inconvenience. -- Miata.net Administration |
Ok guys fess up. Who did it?
|
:laugh:
|
Yeah, I got the same email.
|
I did I, here what I found out:
yo-yos makes the best intercoolers koni shocks are the best. |
Originally Posted by Braineack
(Post 1360486)
I did I, here what I found out:
yo-yos makes the best intercoolers Fatcat shocks are the best. |
No way, they still preach the worlds shittiest shock as the king.
|
Originally Posted by Braineack
(Post 1360526)
No way, they still preach the worlds shittiest shock as the king.
"As King" though... well... OTS Koni... nope :p |
They are awful. Would rather ricelands.
|
Originally Posted by Splitime
(Post 1360560)
I've rocked Koni yellows on multiple cars over the years... they are far from shitty... take it back you meanie head! :p
"As King" though... well... OTS Koni... nope :p |
Originally Posted by shuiend
(Post 1360562)
No those Koni yellows are shit, you just have not driven on a good suspension to compare them to.
Are they as good as XIDAs? No. Are they "the shittiest shock ever?" Hardly. |
Hey, I like my Fatcats :mad:
But back on topic, if anyone sees anything else about the breach I'd love to hear about it. I doubt we'll get anything technical out of Gary but who knows. |
I sent Gary a pm asking for more info. I am curious to know what attack vector they used. We will see if he gives me any more info.
|
CR hacked, now Mnet.
:( |
At least CR auto reset everyones password. If you did that to m.net you would loose 80% of the users because they don't know how to change a password.
|
I got a message back from Gary. He is pretty sure he knows how it happened and it should be fixed now. Also password should be more then fine. They were hashed then salted, so unless you use a really easy password you should be good.
|
Originally Posted by shuiend
(Post 1360681)
They were hashed then salted, so unless you use a really easy password you should be good.
|
Originally Posted by rleete
(Post 1360726)
English translation?
|
Originally Posted by rleete
(Post 1360726)
English translation?
|
I see chi-town is making Joe lazy.
Or less drunk than usual. |
Sober as a judge. Just exhausted from 12 hour days filled with proposals and capital requisitions and staff meetings.
In all seriousness, I know this will sound absurd to people whose work history to date has not included upper management roles, but being the boss sucks quite a lot of the time. |
I've seen my managers schedule.
I'm amazed he gets anything done besides going to meetings. |
I got an email...........but I though this hack took place in February of this year??
|
Originally Posted by Joe Perez
(Post 1360749)
Sober as a judge. Just exhausted from 12 hour days filled with proposals and capital requisitions and staff meetings.
In all seriousness, I know this will sound absurd to people whose work history to date has not included upper management roles, but being the boss sucks quite a lot of the time. |
Originally Posted by Stealth97
(Post 1360729)
Credentails ain't gonna get cracked without AMAZON levels of compute power for a LONG time
|
Originally Posted by rleete
(Post 1360726)
English translation?
Encryption terms. https://en.wikipedia.org/wiki/Salt_(cryptography) In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" a password or passphrase. Salts are closely related to the concept of nonce. The primary function of salts is to defend against dictionary attacks or against its hashed equivalent, a pre-computed rainbow table attack. A new salt is randomly generated for each password. In a typical setting, the salt and the password (or its version after Key stretching) are concatenated and processed with a cryptographic hash function, and the resulting output (but not the original password) is stored with the salt in a database. Hashing allows for later authentication without keeping and therefore risking the plaintext password in the event that the authentication data store is compromised. Since salts do not have to be memorized by humans they can make the size of the rainbow table required for a successful attack prohibitively large without placing a burden on the users. Since salts are different in each case, they also protect commonly used passwords, or those who use the same password on several sites, by making all salted hash instances for the same password different from each other. Cryptographic salts are broadly used in many modern computer systems, from Unix system credentials to Internet security. |
Thanks for posting; I read that after I posted. Learned way more than I ever wanted to about encryption and passwords.
I actually thought the "salted and hashed" was a method the hackers used to break in. |
All times are GMT -4. The time now is 05:54 AM. |
© 2024 MH Sub I, LLC dba Internet Brands