Hey guys, making a post regarding what happened since I dont like the stupidity over here:
Our logs indicate that an individual may have ran the whmcs2.py script on our WHMCS install. One of our employees acted immediately when it came to our attention that there was a new WHMCS exploit available. After an evaluation of our logs, we have identified that about 3% of our customers were affected and we've went ahead and issued a password reset to those customers to be on the safe side. The customers that were affected were legacy customers, meaning that high percentage were inactive clients.
We issued a partial password reset towards the 3% of customers that may have been affected by this WHMCS exploit. If you received a password reset email and you did not request one, you were possibly affected, and your password was reset for your safety. While passwords are encrypted, we do not want to take any chances when it comes to the security of our customers. The only information that possibly was accessed by a third party for the 3% of customers impacted were the following: clientid, name, address, email address, encrypted password. No VPS service details or credit card information was accessed in any way.
We have already patched our WHMCS installation, and have adjusted our security settings to make it harder for exploits in general to be ran. One of the measures we took to further enhance security was doing a complete overhaul on our modsecurity rules on the billing server.
An email is currently going out to the clients that were affected explaining the situation.
Regards
Chris
Our logs indicate that an individual may have ran the whmcs2.py script on our WHMCS install. One of our employees acted immediately when it came to our attention that there was a new WHMCS exploit available. After an evaluation of our logs, we have identified that about 3% of our customers were affected and we've went ahead and issued a password reset to those customers to be on the safe side. The customers that were affected were legacy customers, meaning that high percentage were inactive clients.
We issued a partial password reset towards the 3% of customers that may have been affected by this WHMCS exploit. If you received a password reset email and you did not request one, you were possibly affected, and your password was reset for your safety. While passwords are encrypted, we do not want to take any chances when it comes to the security of our customers. The only information that possibly was accessed by a third party for the 3% of customers impacted were the following: clientid, name, address, email address, encrypted password. No VPS service details or credit card information was accessed in any way.
We have already patched our WHMCS installation, and have adjusted our security settings to make it harder for exploits in general to be ran. One of the measures we took to further enhance security was doing a complete overhaul on our modsecurity rules on the billing server.
An email is currently going out to the clients that were affected explaining the situation.
Regards
Chris