New update on security breach - can we get an update please
Can we get an update on what the situation is and some categoric statements? If there is more of a potential problem than we were originally led to believe then I think we need to know (or to the contrary).
Here is the warning issued by Phusion Passenger today:
What is worrying is that they were not informed by Linode that a problem existed
6 Replies
@tentimes:
What is worrying is that they were not informed by Linode that a problem existed
:(
HTP claim that Linode didn't notify their customers until they were forced to by the FBI.
(Not that HTP can be trusted at all)
@vonskippy:
One can only hope HTP's hacking skills are better then their lame ass writing skills.
They write like retards, and their motivation isn't clear at all. They don't seem to be after money.
But then they did have access to a zero day exploit for cold fusion so they can't be entirely retarded.
and on irc they claimed to have owned lish
new lish a few weeks after HTP
sednet is right that "they did have access to a zero day exploit for cold fusion". Either they are the ones who uncovered the zero day or they bought it, so their lack of interest in financial gain in this circumstance is puzzling.
If they were after nmap, and they added something to the code (backdoor into the networks that run it, a report on the vulnerabilities found so they can compromise the networks running it, a way to mask their specific infections, whatever), then we should see a major spike in breaches of nmap users. I'm sure that the good folks at nmap have thought of this as well and are double checking everything.