Miata Turbo Forum - Boost cars, acquire cats.

Miata Turbo Forum - Boost cars, acquire cats. (https://www.miataturbo.net/)
-   Insert BS here (https://www.miataturbo.net/insert-bs-here-4/)
-   -   miata.net hacked? (https://www.miataturbo.net/insert-bs-here-4/miata-net-hacked-90484/)

gesso 09-12-2016 11:21 PM

miata.net hacked?
 
Found this in my updates folder this evening:


Miata.net Server security breach

This past weekend, Miata.net suffered a breach of our servers by hackers who gained access to all our servers. Although we don't have direct evidence that they accessed the encrypted passwords stored in the database, prudence dictates that its better to be safe. As a result, we recommend that you change your password on the Miata.net forum.

We recommend using a strong password, as its much more difficult to decrypt. In addition, we recommend that you not use the same password here that you use on other sites.

We apologize for the inconvenience.

--
Miata.net Administration

aidandj 09-12-2016 11:34 PM

Ok guys fess up. Who did it?

Girz0r 09-13-2016 12:05 AM

:laugh:

Chilicharger665 09-13-2016 02:50 AM

Yeah, I got the same email.

Braineack 09-13-2016 06:42 AM

I did I, here what I found out:

yo-yos makes the best intercoolers
koni shocks are the best.

Splitime 09-13-2016 08:53 AM


Originally Posted by Braineack (Post 1360486)
I did I, here what I found out:

yo-yos makes the best intercoolers
Fatcat shocks are the best.

Fixed that one bit for you. Couldn't come up with a fix for the intercoolers :p

Braineack 09-13-2016 09:02 AM

No way, they still preach the worlds shittiest shock as the king.

Splitime 09-13-2016 10:19 AM


Originally Posted by Braineack (Post 1360526)
No way, they still preach the worlds shittiest shock as the king.

I've rocked Koni yellows on multiple cars over the years... they are far from shitty... take it back you meanie head! :p

"As King" though... well... OTS Koni... nope :p

Braineack 09-13-2016 10:21 AM

They are awful. Would rather ricelands.

shuiend 09-13-2016 10:21 AM


Originally Posted by Splitime (Post 1360560)
I've rocked Koni yellows on multiple cars over the years... they are far from shitty... take it back you meanie head! :p

"As King" though... well... OTS Koni... nope :p

No those Koni yellows are shit, you just have not driven on a good suspension to compare them to.

z31maniac 09-13-2016 10:38 AM


Originally Posted by shuiend (Post 1360562)
No those Koni yellows are shit, you just have not driven on a good suspension to compare them to.

Maybe on Miata's, but I've also ran Ground Control coilovers on mulitple cars over the years and do now on my BRZ.

Are they as good as XIDAs? No. Are they "the shittiest shock ever?" Hardly.

EO2K 09-13-2016 11:41 AM

Hey, I like my Fatcats :mad:

But back on topic, if anyone sees anything else about the breach I'd love to hear about it. I doubt we'll get anything technical out of Gary but who knows.

shuiend 09-13-2016 12:07 PM

I sent Gary a pm asking for more info. I am curious to know what attack vector they used. We will see if he gives me any more info.

Erat 09-13-2016 12:17 PM

CR hacked, now Mnet.

:(

aidandj 09-13-2016 12:19 PM

At least CR auto reset everyones password. If you did that to m.net you would loose 80% of the users because they don't know how to change a password.

shuiend 09-13-2016 06:37 PM

I got a message back from Gary. He is pretty sure he knows how it happened and it should be fixed now. Also password should be more then fine. They were hashed then salted, so unless you use a really easy password you should be good.

rleete 09-13-2016 09:07 PM


Originally Posted by shuiend (Post 1360681)
They were hashed then salted, so unless you use a really easy password you should be good.

English translation?

Stealth97 09-13-2016 09:23 PM


Originally Posted by rleete (Post 1360726)
English translation?

Credentails ain't gonna get cracked without government levels of compute power for a LONG time

Joe Perez 09-13-2016 09:37 PM


Originally Posted by rleete (Post 1360726)
English translation?

(Imagine that I've written an extremely clever and witty response here.)

aidandj 09-13-2016 09:38 PM

I see chi-town is making Joe lazy.

Or less drunk than usual.

Joe Perez 09-13-2016 10:25 PM

Sober as a judge. Just exhausted from 12 hour days filled with proposals and capital requisitions and staff meetings.

In all seriousness, I know this will sound absurd to people whose work history to date has not included upper management roles, but being the boss sucks quite a lot of the time.

aidandj 09-13-2016 10:26 PM

I've seen my managers schedule.

I'm amazed he gets anything done besides going to meetings.

RalliartRsX 09-13-2016 11:45 PM

I got an email...........but I though this hack took place in February of this year??

z31maniac 09-14-2016 08:22 AM


Originally Posted by Joe Perez (Post 1360749)
Sober as a judge. Just exhausted from 12 hour days filled with proposals and capital requisitions and staff meetings.

In all seriousness, I know this will sound absurd to people whose work history to date has not included upper management roles, but being the boss sucks quite a lot of the time.

Never been in upper management but I know what the schedules are like. I'm perfectly happy to not be the boss and be the only one in the company that does my job and knows to use my publishing software.

psyber_0ptix 09-14-2016 08:37 AM


Originally Posted by Stealth97 (Post 1360729)
Credentails ain't gonna get cracked without AMAZON levels of compute power for a LONG time

:3

Girz0r 09-14-2016 09:31 AM


Originally Posted by rleete (Post 1360726)
English translation?

https://pioneerwoman.files.wordpress...browns-13.jpg?

Encryption terms.

https://en.wikipedia.org/wiki/Salt_(cryptography)


In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" a password or passphrase. Salts are closely related to the concept of nonce. The primary function of salts is to defend against dictionary attacks or against its hashed equivalent, a pre-computed rainbow table attack.

A new salt is randomly generated for each password. In a typical setting, the salt and the password (or its version after Key stretching) are concatenated and processed with a cryptographic hash function, and the resulting output (but not the original password) is stored with the salt in a database. Hashing allows for later authentication without keeping and therefore risking the plaintext password in the event that the authentication data store is compromised.

Since salts do not have to be memorized by humans they can make the size of the rainbow table required for a successful attack prohibitively large without placing a burden on the users. Since salts are different in each case, they also protect commonly used passwords, or those who use the same password on several sites, by making all salted hash instances for the same password different from each other.

Cryptographic salts are broadly used in many modern computer systems, from Unix system credentials to Internet security.

rleete 09-14-2016 12:07 PM

Thanks for posting; I read that after I posted. Learned way more than I ever wanted to about encryption and passwords.

I actually thought the "salted and hashed" was a method the hackers used to break in.


All times are GMT -4. The time now is 05:54 AM.


© 2024 MH Sub I, LLC dba Internet Brands