Aldryic C'boas
The Pony
They banned me, finally. Pretty much made my day when I heard about it.
What'd you do? -_-They banned me, finally. Pretty much made my day when I heard about it.
Well I don't have a laundry list of the bans (wish they'd have a list in one place for offenders )Haven't been on LET today. Who all is banned? Why?
What's the deal with Jack? Confused.
At least, I'm assuming it's the above. That's been my only post there in hell, probably over a year. Maybe they're just feeling especially insecure *shrug*.
I'd be shocked if the majority of customer data hasn't been compromised/disclosed and probably more than once this year.FULLY possible others exist. But for now, in the past 24 hours and disclosure of current customer data, hasn't happened.
I have no bones to pick with Jon, although I would say he needs to find another line of business (after he grows up).
Yeah, probably what was up with the ban.... Now mind you, all the shit scams the owners of LET sit behind and count dineros from... They had the ability to let GVH drown last time he left the nest... They brought him and liability back into their nest. Like I've told someone over there, enablers. They are the pusher, servers are the drug.If that is the reason, they were covering their a** for any liability.
There was some case of a kid who committed suicide live on a forum (similar to this situation) and I believe the lawyers went hard after everyone involved including the forum owners.
Dear Valued Client,
It with our greatest remorse that we are sending you this email today to
inform you regarding a breach of security that has occurred on
GreenValueHost systems, resulting in a possible release of customer
information and the rollback of data stored on our WHMCS client area
and SolusVM VPS Control Panel.
This breach occurred yesterday (June 23) around 7:00 PM CST (Central Time).
Our technicians immediately began working on the issue at hand and was able
to salvage data from recent backups to bring ourselves back online and
running.
Our WHMCS client area has been restored from a backup that was taken
10 minutes BEFORE the breach. As far as we are aware, there is NO client
sensitive data from our billing/support system being distributed. Our
WHMCS database was 'dumped' into a publicly accessible domain under secure.
banned-url, however after after further investigation we've gotten to
these conclusions regarding the sql dump:
1. The dump was created and brought offline DURING THE SAME MINUTE.
One of our ex-staff members Jack has managed to coincidentally
(as verified by evidence) discover the dump URL, passed it onto Jon,
which promptly resulted in the server being immedaitely shut down.
A few hours later, the server was turned back on and the sql dump was
immediately removed.
2. After scanning logs, it appears that Jack and Jon were the only two
people (the hacker, apparently, did not yet test the sql dump) that
accessed the URL. Therefore it is concluded that client data from our
billing/support system is SAFE.
Our SolusVM VPS control panel/administrative area has been restored
from a backup taken 10 hours BEFORE the breach occured.
(New login URL: https://104.131.252.131:5656)
There is a flurr of rumors out in public that a copy of our admin table
database has been leaked to a public pastebin URL. At this time we
cannot confirm that the admin table that was leaked is authentic,
however it looks to be forged as the table is not completely accurate
and is missing some information that should be there. From the
information we were able to gather from the SolusVM server, we have
concluded that the hacker whom compromised the server spent little
time in this server as well and performed commands such as rm -rf
to delete crucial folders.
Although we are able to confirm that no data has been stolen/leaked
from our WHMCS billing/support database, we are unsure of whether or
not data has been stolen/leaked from our SolusVM database. It appears
likely not, as what's been "leaked" appears inaccurate/incomplete on
top of the fact that the entire operation of compromising and exploiting
our systems was a "rushjob" -- The hacker knew that he had little time
to do damage and thankfully wasn't able to do much damage at all
(Nodes appear completely untouched from Solus; we are still verifying this)
Despite our doubts that much has been done in the compromise in our
systems, we don't want to take any chances. We care about your security,
your privacy, and your safety. As of this notice, we are enabling the
"Disable MD5 Clients Password" option in WHMCS which will force all
clients to request a password reset before they are able to successfully
log in to the client area. This, as a security precaution, will remain in
place for another 24-48 hours. Clients are also advised to change their
SolusVM VPS control password AS SOON AS POSSIBLE, as we are unaware of
an option to force password resets for SolusVM.
At this time we are still working on restoring SolusVM to full working order.
We are aware that it is not fully usable right now, but we wanted to get
an update out as quickly as possible for the well being of our clients.
We can assure you that all data, although some may be rolled back, CAN be
fully recovered and we have NOT lost control of any of our systems. They are
more secured than ever, with additional heightened security measures still
being put into place as we continue to sort things entire situation out.
If any of your client data has been rolled back or not applied
(such as invoices from automated subscriptions during site downtime, or
SolusVM changes AFTER SolusVM is sorted), please contact us. Again, we are
still working on getting everything sorted and would like to take this
opportunity to let our clients know what has happened, and how we're
proceeding to resolve things. We will be sending ANOTHER email shortly
notifying clients of the completion of SolusVM data restoration, any further
information from our investigation, and how we will be moving on from there.
In the meantime, we are greatly sorry for any inconveniences these events
have/may cause and we appreciate your continued patience, understanding,
and patronage throughout this ideal.
Any questions, comments, or concerns can be addressed to us through our
helpdesk ticket system at https://secure.banned-url/submitticket.php
Thank You,
The GreenValueHost Team
As far as we are aware, there is NO client sensitive data from our billing/support system being distributed
joke of the day.Our WHMCS database was 'dumped' into a publicly accessible domain under secure.banned-url
That's a funny line... It isn't my handiwork / writing.joke of the day.
The hacker knew that he had little time to do damage and thankfully wasn't able to do much damage at all
Posted on LET today:We employ a talented and skilled team of systems administrators that are paid top dollar/expensive wages
Some Perspective (US average salaries):Jon said he pays all of his contractors 1600 a month, various levels such as support and system administration.
Burger King cashiers make minimum wage as do everyone else. Perhaps you meant shift supervisors?Jon Nguyen said in January:
Posted on LET today:
Some Perspective (US average salaries):
Vice President of Operations $143,000
Vice President $130,000
Director of Operations $105,000
Senior System Administrator $83,000
Linux Systems Administrator $79,000
Server Administrator $65,000
System Administrator $61,000
U.S. Median Income $39,500
Cashier Burger King NYC $26,000
Cashier Buger King $21,000
GreenValueHost System Administrator $19,200
Fast Food Cook $18,900
US Minimum Wage $15,080
There was a customer email earlier that went out to GVH customers:
Code:Dear Valued Client, It with our greatest remorse that we are sending you this email today to inform you regarding a breach of security that has occurred on GreenValueHost systems, resulting in a possible release of customer information and the rollback of data stored on our WHMCS client area and SolusVM VPS Control Panel. This breach occurred yesterday (June 23) around 7:00 PM CST (Central Time). Our technicians immediately began working on the issue at hand and was able to salvage data from recent backups to bring ourselves back online and running. Our WHMCS client area has been restored from a backup that was taken 10 minutes BEFORE the breach. As far as we are aware, there is NO client sensitive data from our billing/support system being distributed. Our WHMCS database was 'dumped' into a publicly accessible domain under secure. banned-url, however after after further investigation we've gotten to these conclusions regarding the sql dump: 1. The dump was created and brought offline DURING THE SAME MINUTE. One of our ex-staff members Jack has managed to coincidentally (as verified by evidence) discover the dump URL, passed it onto Jon, which promptly resulted in the server being immedaitely shut down. A few hours later, the server was turned back on and the sql dump was immediately removed. 2. After scanning logs, it appears that Jack and Jon were the only two people (the hacker, apparently, did not yet test the sql dump) that accessed the URL. Therefore it is concluded that client data from our billing/support system is SAFE. Our SolusVM VPS control panel/administrative area has been restored from a backup taken 10 hours BEFORE the breach occured. (New login URL: https://104.131.252.131:5656) There is a flurr of rumors out in public that a copy of our admin table database has been leaked to a public pastebin URL. At this time we cannot confirm that the admin table that was leaked is authentic, however it looks to be forged as the table is not completely accurate and is missing some information that should be there. From the information we were able to gather from the SolusVM server, we have concluded that the hacker whom compromised the server spent little time in this server as well and performed commands such as rm -rf to delete crucial folders. Although we are able to confirm that no data has been stolen/leaked from our WHMCS billing/support database, we are unsure of whether or not data has been stolen/leaked from our SolusVM database. It appears likely not, as what's been "leaked" appears inaccurate/incomplete on top of the fact that the entire operation of compromising and exploiting our systems was a "rushjob" -- The hacker knew that he had little time to do damage and thankfully wasn't able to do much damage at all (Nodes appear completely untouched from Solus; we are still verifying this) Despite our doubts that much has been done in the compromise in our systems, we don't want to take any chances. We care about your security, your privacy, and your safety. As of this notice, we are enabling the "Disable MD5 Clients Password" option in WHMCS which will force all clients to request a password reset before they are able to successfully log in to the client area. This, as a security precaution, will remain in place for another 24-48 hours. Clients are also advised to change their SolusVM VPS control password AS SOON AS POSSIBLE, as we are unaware of an option to force password resets for SolusVM. At this time we are still working on restoring SolusVM to full working order. We are aware that it is not fully usable right now, but we wanted to get an update out as quickly as possible for the well being of our clients. We can assure you that all data, although some may be rolled back, CAN be fully recovered and we have NOT lost control of any of our systems. They are more secured than ever, with additional heightened security measures still being put into place as we continue to sort things entire situation out. If any of your client data has been rolled back or not applied (such as invoices from automated subscriptions during site downtime, or SolusVM changes AFTER SolusVM is sorted), please contact us. Again, we are still working on getting everything sorted and would like to take this opportunity to let our clients know what has happened, and how we're proceeding to resolve things. We will be sending ANOTHER email shortly notifying clients of the completion of SolusVM data restoration, any further information from our investigation, and how we will be moving on from there. In the meantime, we are greatly sorry for any inconveniences these events have/may cause and we appreciate your continued patience, understanding, and patronage throughout this ideal. Any questions, comments, or concerns can be addressed to us through our helpdesk ticket system at https://secure.banned-url/submitticket.php Thank You, The GreenValueHost Team
opcorn: Come one now... We're all capable of remembering when I called him out, about outsourcing... about exploting those Indians (ColoCrossing's Indians no less)...Jon Nguyen said in January:
Posted on LET today:
Some Perspective (US average salaries):
Vice President of Operations $143,000
Vice President $130,000
Director of Operations $105,000
Senior System Administrator $83,000
Linux Systems Administrator $79,000
Server Administrator $65,000
System Administrator $61,000
U.S. Median Income $39,500
Cashier Burger King NYC $26,000
Cashier Buger King $21,000
GreenValueHost System Administrator $19,200
Fast Food Cook $18,900
US Minimum Wage $15,080
Stoopidassmuddafakkas! Valued customers, we care about your security so we're going to give our 1001 poorly paid skid GVH admins the opportunity to view your passwords...We care about your security,your privacy, and your safety. As of this notice, we are enabling the
"Disable MD5 Clients Password" option in WHMCS which will force all
clients to request a password reset before they are able to successfully
log in to the client area. This, as a security precaution, will remain in
place for another 24-48 hours.
Pay your workers peanuts get a bunch of brain dead baboons steering the ship...Disable MD5 Clients Password
For security client area passwords are irreversibly encrypted and cannot be viewed by admins, enabling this option will switch to reversible encryption allowing admins to view the password. When switching from irreversible to reversible clients will all be assigned a new password and will need to use password recovery.
Yep, he has no real employee assets. I have been slipping little comments like this for the past few weeks and he never calls me out on being wrong, and seems to stop commenting.Posted on LET today:
You sound surprised... WHMCS is a pretty big piece of shit. You should be more surprised MD5 is even an option...Wait... are the only two options in WHMCS MD5 or plain text?