Gearslutz.com compromized!

Status
This old topic is closed. If you want to reopen this topic, contact a moderator using the "Report Post" button.
That's odd I just got my DNS sorted out a few minutes ago.
I was there for a moment earlier today looking for a mic preamp for a member here.
Maybe a coincidence I suppose, I thought the Chinese finally hacked me.

The Vonage and the Macbook continued to work, the iMac, ipad and 'doze 7 machine stopped working.

Had me scratching my head for a while.(Translation: profusely swearing).

Is there something wrong with me because I want to click your link and see? Are there midgets?
 
I had a gut feeling that it was DNS! :D

Sorry for being off-line yesterday! (Thursday 1 March)

What happened?

Gearslutz changed web hosts back in June 2011 and the migration went well. During this migration an error was made when the nameservers were configured. One of the nameservers was misspelled and under normal circumstances this would have not caused any issues other than slightly less resilience in the DNS infrastructure.

On 1 March 2012 a hacker noticed this domain exploit and registered the misspelled domain name. They used this domain typo to redirect some users to a "branded" web page that makes money off page clicks. Our web host corrected the misspelling as soon as it was identified at 7am GMT.

Why was this not resolved sooner?
The hacker used a domain name with a time to live (TTL) of one day. This TTL means that any forum users who were redirects to this branded web page would have it cached for 24 hours.

Was I hacked?
The aim of this hack was to make money from the hyper link clicks rather than compromise end users PCs and Macs. But to be on the safe side the techs at our server company scanned the web page - and confirmed no viruses or snide scripts. Your computer is clean!

Will this happen again?
No. The changes we've made are permanent and will stop this from happening again. We will also be moving our domain registration to our web hosting provider so any future updates will be handled automatically to prevent any further typos.
The end result was a boring wait until the DNS propagated.

Welcome back and sorry for the disruption!!

Jules
 
I am not sure of the date, but the collection of name servers that has been preventing the big DNS redirection hack from working are going off line soon, so all those who had not fixed this systems may be again exploited. The US ran them for 6 months to give every one time.

Glad they jumped on the error and got it fixed. So many don't. No matter how good our tools are, fat fingers will still undo them!

There were a lit of issues on the 29th as it seems Microsoft's cloud had a date problem.
 
What really happened...

Hi Folks

Sorry for being off-line on Thurs 1st March!

What happened?

Gearslutz changed web hosts back in June 2011 and the migration went well. During this migration an error was made when the nameservers were configured. One of the nameservers was misspelled and under normal circumstances this would have not caused any issues other than slightly less resilience in the DNS infrastructure.

On 1 March 2012 a hacker noticed this domain exploit and registered the misspelled domain name. They used this domain typo to redirect approximately 1/3rd of visitors to a "branded" web page that makes money off page clicks. Our web host corrected the misspelling as soon as it was identified at 7am GMT.

Why was this not resolved sooner?
The hacker used a domain name with a time to live (TTL) of one day. This TTL means that any forum users who were redirects to this branded web page would have it cached for 24 hours.

Was I hacked?
The aim of this hack was to make money from the hyper link clicks rather than compromise end users PCs and Macs. But to be on the safe side the techs at our server company scanned the web page - and confirmed no viruses or snide scripts. Your computer is clean!

Will this happen again?
No. The changes we've made are permanent and will stop this from happening again. We will also be moving our domain registration to our web hosting provider so any future updates will be handled automatically to prevent any further typos.

The end result was a typo over a year old caused the site to be inaccessible for 1/3rd of its visitors and boring wait until the DNS propagated.

Sorry for the interruption in service!

if you are still getting the bogus site here is a link that tells you how to flush your DNS How to Flush DNS

Thanks

Jules
GS Admin
 
Status
This old topic is closed. If you want to reopen this topic, contact a moderator using the "Report Post" button.