Ricky Spanish
New Member
Are they a member here? I never did business with this company and I got a email from them.
Former employee with a copy of the NWNX/CVPS mailing list is more likely than someone harvesting emails from one of those DB leaks because many of those addresses that were spammed Sunday night (UGVPS customers, 123sys customers) weren't in the Solus/WHMCS DB leaks. The email address I used for UGVPS was added to the CVPS mailing list when they acquired UGVPS but was never added to their WHMCS (or SolusVM).With all the DB leaks that have occurred in the past, it could just be a company utilizing harvested emails.
Looking over at LET I see that Chris's little puppy dog who for the past 2 years obediently locked and sunk CVPS related threads when Chris asked him to, and frequently went into attack mode against anyone who criticized CVPS, quit as administrator and deleted all of his own posts. Good riddance (he was a major reason I haven't posted there since December 2013).Ah, looking over at LET I see .... ChicagoVPS
123Systems never was hacked as far as we all know.Quote said:Former employee with a copy of the NWNX/CVPS mailing list is more likely than someone harvesting emails from one of those DB leaks because many of those addresses that were spammed Sunday night (UGVPS customers, 123sys customers) weren't in the Solus/WHMCS DB leaks. The email address I used for UGVPS was added to the CVPS mailing list when they acquired UGVPS but was never added to their WHMCS (or SolusVM).
Looking over at LET I see that Chris's little puppy dog who for the past 2 years obediently locked and sunk CVPS related threads when Chris asked him to, and frequently went into attack mode against anyone who criticized CVPS, quit as administrator and deleted all of his own posts. Good riddance (he was a major reason I haven't posted there since December 2013).Ah, looking over at LET I see .... ChicagoVPS
Dillybob's statement eliminates the 2012/2013Solus/WHMCS DB hacks as the source, and the timing eliminates as suspects a pair of former employees who went to work for a competitor in mid 2014.Quote said:CVPS_Chris said: "It was not me or anyone currently associated with CVPS. If I had to take a stab in the dark it is just someone using old DB when we were unfortunately hacked twice a few years back."
Dillybob replied: "You're so far off.
My email / account was used to purchase the 75 cent package several months ago. And I only signed up with 1 VPS Provider with that email address (HINT: It was with CVPS), it couldn't of been years 'back'.
Make a better guess."
http://www.lowendtalk.com/discussion/comment/1250147/#Comment_1250147
#WINNINGDillybob's statement eliminates the 2012/2013Solus/WHMCS DB hacks as the source, and the timing eliminates as suspects a pair of former employees who went to work for a competitor in mid 2014.Quote said:CVPS_Chris said: "It was not me or anyone currently associated with CVPS. If I had to take a stab in the dark it is just someone using old DB when we were unfortunately hacked twice a few years back."
Dillybob replied: "You're so far off.
My email / account was used to purchase the 75 cent package several months ago. And I only signed up with 1 VPS Provider with that email address (HINT: It was with CVPS), it couldn't of been years 'back'.
Make a better guess."
http://www.lowendtalk.com/discussion/comment/1250147/#Comment_1250147
So either A. CVPS got hacked recently (i.e. in the past few months) and doesn't know it, B. a recent/current CVPS worker is selling the mailing list, and/or C. #winning is full of shit.
I see this said a lot, but why wouldn't a company selling your data just pass it on without the +... part, to cover their tracks?This is why it's wise to sign up with company specific emails when ordering services. Very easy if you use Gmail.
Example with Gmail: [email protected] will still email all messages to your [email protected] address but will place these messages in a folder named 'hostingcompany' in your inbox. Neat little trick. The benefit of doing this is that if you receive email spam to a specific folder you can determine what company sold your information, was compromised with no notification to the user or is engaging in some other shady behavior.
That's certainly possible too. But there are also people who also sign up for things with specific email addresses that are associated with what they're signing up for. There is several [email protected] type addresses used by members on this site that I've seen in passing, and working in the hosting industry have seen stuff like that as well from customers.I see this said a lot, but why wouldn't a company selling your data just pass it on without the +... part, to cover their tracks?This is why it's wise to sign up with company specific emails when ordering services. Very easy if you use Gmail.
Example with Gmail: [email protected] will still email all messages to your [email protected] address but will place these messages in a folder named 'hostingcompany' in your inbox. Neat little trick. The benefit of doing this is that if you receive email spam to a specific folder you can determine what company sold your information, was compromised with no notification to the user or is engaging in some other shady behavior.