Модераторы: Siberian-troll, Hobbit
каких юзеров удалял быстрый взлом? из-под какого аккаунта он осуществлял РУЧНОЕ удаление??? mySQL командами что он удалял?
From deathshadow at HMPro quote:
"Well, here's where we're at and the current battleplan.
It appears that we may have had TWO hacks occur near simultaneously or with overlap -- a nasty fast one atop a slow/insidious one.
The nasty fast one somehow got itself elevated to admin rights and started deleting users MANUALLY and running mySQL commands to delete post indexes from the database -- and we're not talking indexes that can be rebuilt either. Since they appear to have had access to admin rights I cannot/will not trust any of the existing user accounts that were on it. It's odd though as they used a certain admin password without it showing up as being logged in for that user -- so I think they found a security flaw or had a backdoor installed from that previous failed hacking attempt back in July. (that I thought I cleaned out)... either that or the TWO DAYS since SMF 1.1.13 was released documented a new doorway. (and I was going to upgrade tomorrow too...). Maybe a four day upgrade gap was too wide?
The slow/insidious one appears to have been modifying forum .php files in the background slowly and quietly that I THINK was a failed attack circa late October, and that up and decided to start running when the 'fast one' started playing around with it.
It is unclear whether these were two separate attacks, or a slowly and well planned escalation over several months... Going through the monthly backups I am unwilling to trust the Jan, Dec or Nov backups as they all seem to have a slow corruption and bits and pieces of various hacking attempts in them. SO...
I'm with Ripley...
To try and turn this into a positive I'm going to take this 'nuke it from orbit' moment to move us to SMF 2.0 even if it is only at release candidate status -- I was going to wait for final but if we're going to start over, I'd like to do so on the next-gen.
It is going to take me a few days to get it to where I'm happy with the new security settings I'll be putting in place (things actually COULD have been worse!!! Lord help us if the main site had been running turdpress or boomla) at which point I'm gonna have the admins and mods go in and dot every t and cross every i on getting the correct forums and settings into place. We're also going to take this opportunity to review the rules and who's responsible for what.
We probably will NOT have a new forums up and running for the public until sometime after monday. I apologize for the delay but the old forum was starting to rot and was hack upon hack upon upgrade upon upgrade -- and like anything else after three years of use it needed a spring cleaning anyways. (TRYING to look at the bright side here!)
I'll try to keep you posted here as to where I'm at with this.
Oh, and if you know who's at 192.251.226.205 (that's a german IP), do me a favor and shove your boot straight up their backside. I should have listened to George -- I put up one of the biggest static fortifications possible on a server; and it ended up a Maginot line. Leave it to some German to goose-step through Belgium on me.
Fixed fortifications are a monument to the stupidity of man."
Трассировка маршрута к classicbattletech.com [209.139.208.130]
с максимальным числом прыжков 30:
1 769 ms <1 мс 769 ms 89.179.17.132
2 769 ms <1 мс 769 ms 89.179.17.152
3 769 ms 770 ms 769 ms 62.141.95.125
4 861 ms 809 ms 39 ms mx01.Stockholm.gldn.net [194.186.157.66]
5 805 ms 805 ms 805 ms xe-11-0-0-xcr1.skt.cw.net [166.63.220.65]
6 150 ms 918 ms 150 ms xe-7-0-0-xcr1.amd.cw.net [195.2.25.89]
7 916 ms 916 ms 949 ms xe-0-1-0-xcr1.lsw.cw.net [195.2.25.101]
8 140 ms 140 ms 908 ms xe-5-1-0-xcr1.lnd.cw.net [195.2.25.133]
9 147 ms 917 ms 915 ms xe-5-3-0-xcr1.nyk.cw.net [195.2.25.197]
10 * * * Превышен интервал ожидания для запроса.
11 937 ms 937 ms 934 ms POS7-0.WANA-MTRLPQ.IP.GROUPTELECOM.NET [66.59.19
1.173]
12 * * * Превышен интервал ожидания для запроса.
13 219 ms * * POS6-0.WANA-VANCBC.IP.GROUPTELECOM.NET [66.59.19
0.57]
14 * * * Превышен интервал ожидания для запроса.
15 * * 227 ms static-209-17-142-113.gtcust.grouptelecom.net [2
09.17.142.113]
16 995 ms 223 ms 986 ms www.cutcodedown.com [209.139.208.130]
Обмен пакетами с classicbattletech.com [209.139.208.130] по 32 байт:
Ответ от 209.139.208.130: число байт=32 время=217мс TTL=49
Ответ от 209.139.208.130: число байт=32 время=222мс TTL=49
Превышен интервал ожидания для запроса.
Превышен интервал ожидания для запроса.
Статистика Ping для 209.139.208.130:
Пакетов: отправлено = 4, получено = 2, потеряно = 2 (50% потерь),
Приблизительное время приема-передачи в мс:
Минимальное = 217мсек, Максимальное = 222 мсек, Среднее = 219 мсек
Обмен пакетами с classicbattletech.com [209.139.208.130] по 32 байт:
Превышен интервал ожидания для запроса.
Ответ от 209.139.208.130: число байт=32 время=997мс TTL=49
Превышен интервал ожидания для запроса.
Превышен интервал ожидания для запроса.
Статистика Ping для 209.139.208.130:
Пакетов: отправлено = 4, получено = 1, потеряно = 3 (75% потерь),
Приблизительное время приема-передачи в мс:
Минимальное = 997мсек, Максимальное = 997 мсек, Среднее = 997 мсек
Трассировка маршрута к classicbattletech.com [209.139.208.130]
с максимальным числом прыжков 30:
1 2 ms <1 мс <1 мс 172.16.0.12
2 17 ms 17 ms 17 ms 212.41.32.113
3 12 ms 13 ms 14 ms ttk-lgw.inetcomm.ru [212.152.38.125]
4 15 ms 14 ms 16 ms ae10-215.RT.M9.MSK.RU.retn.net [87.245.255.193]
5 170 ms 151 ms 154 ms xe000-8.RT.EQX.ASH.US.retn.net [87.245.233.118]
6 176 ms 157 ms 160 ms 10GE1-0.PEERA-ASBNVA.IP.GROUPTELECOM.NET [206.223.115.113]
7 173 ms 172 ms 173 ms POS2-2.PEERA-CHCGIL.IP.GROUPTELECOM.NET [66.59.191.89]
8 165 ms 173 ms 160 ms POS2-0.WANB-TOROONXN.IP.GROUPTELECOM.NET [66.59.191.149]
9 224 ms 228 ms 225 ms POS6-0.WANB-VANCBC.IP.GROUPTELECOM.NET [66.59.190.62]
10 212 ms 212 ms 213 ms 216.18.31.142
11 223 ms 213 ms 213 ms static-209-17-142-113.gtcust.grouptelecom.net [209.17.142.113]
12 230 ms 223 ms 228 ms www.cutcodedown.com [209.139.208.130]
Вернуться в Новости вселенной Battletech
Сейчас этот форум просматривают: нет зарегистрированных пользователей и гости: 4