Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 19:09:57 GMT -5
I run online security software and just received this notice below. I suggest you all log out, clean all the browsers cache and history that you use and lo
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 19:11:37 GMT -5
Once you log out and your cache and history is cleaned out, log back in. You should be safe.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 19:19:12 GMT -5
Just cleaned out all cache and history in my browsers and the spoof that was running in the background has been removed.
PS I also suggest you reboot your PC, Mac or mobile device you were using.
|
|
|
Post by dave g on Jul 9, 2018 20:48:28 GMT -5
Thank for the warning
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 20:51:47 GMT -5
I’m surprised that most members don’t seem to be worried about what occurred. I traced th IP address back to a small Chinese Province.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 21:02:49 GMT -5
Thanks. I clean and delete daily, but will do so now, as a precaution.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 21:09:23 GMT -5
The screen shot above will only pop up on my security software on my server if one of my backdoor ports is being attempted to be hacked. As you can see in the screenshot I was on this website when the spoof occurred.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 21:18:29 GMT -5
I got a similar page. Sometimes it's simply a broken pipe on getting site credentials. One time my browser was giving me crap trying to load up Amazon. It was a setting. Thankful that you posted it or I might have just thought it was me.
|
|
|
Post by Ronv69 on Jul 9, 2018 21:20:15 GMT -5
I run a triple trap on the phones and computers. Not much can get through.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 21:32:06 GMT -5
Think I performed a triple browser cache, history delete, browser closing, and rebooting prior to logging back into the forum Running Webroot Secure Anywhere on the laptop. Thanks for the heads-up Ted... PS. Nothing that a couple of JDAMS wouldn't take care of on that IP
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 21:47:12 GMT -5
I got a similar page. Sometimes it's simply a broken pipe on getting site credentials. One time my browser was giving me crap trying to load up Amazon. It was a setting. Thankful that you posted it or I might have just thought it was me. This was more than getting the sites certificate, this was an actual spoof. The security program I run will pick up an incoming IP address and if the client IP address pings for over 16 seconds I also get a copy of the devices MAC address. You can always change your IP address, the only way to change the MAC address is by changing the motherboard or logic board of the hardware that was being used at the time of the spoofing/hacking.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 21:52:06 GMT -5
Think I performed a triple browser cache, history delete, browser closing, and rebooting prior to logging back into the forum Running Webroot Secure Anywhere on the laptop. Thanks for the heads-up Ted... PS. Nothing that a couple of JDAMS wouldn't take care of on that IP Don’t worry, later when I’m offline I will have my server with a program I use constantly sending ping packages to that annoying IP address. They will get the hint.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 21:56:51 GMT -5
I run a triple trap on the phones and computers. Not much can get through. I’ve seen the Russians and Chinese break through a Watchguard Firebox. Takes time and a high skill level but it’s been done, kind of scary what goes on that most don’t realize.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 9, 2018 22:03:14 GMT -5
I run a triple trap on the phones and computers. Not much can get through. You smart IT guys can make heads explode. Triple trap?
|
|
|
Post by Ronv69 on Jul 9, 2018 22:24:40 GMT -5
I run a triple trap on the phones and computers. Not much can get through. I’ve seen the Russians and Chinese break through a Watchguard Firebox. Takes time and a high skill level but it’s been done, kind of scary what goes on that most don’t realize. They would have to be motivated. I was IT director for a large payroll company before my retirement. Finally got a system in place that allowed me to sleep at night just be I retired. We're talking about over a million SS#s, bank accounts, etc. Also the main company account averaged 2.5 billion in the sweep accounts. Yeah, I know about that stuff.
|
|
|
Post by Stanhill on Jul 10, 2018 1:57:58 GMT -5
I’m surprised that most members don’t seem to be worried about what occurred. I traced th IP address back to a small Chinese Province. It hasn't occurred here. I keep an eye on the address bar and if it's still 'https' and the little padlock is green, the page should be secure. Every time I shut Firefox down, my cache and history is erased and it always warn me if I stumble onto an unsecured connection.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 10, 2018 3:36:38 GMT -5
I’m surprised that most members don’t seem to be worried about what occurred. I traced th IP address back to a small Chinese Province. It hasn't occurred here. I keep an eye on the address bar and if it's still 'https' and the little padlock is green, the page should be secure. Every time I shut Firefox down, my cache and history is erased and it always warn me if I stumble onto an unsecured connection.
This was a backdoor issue that Firefox would not have picked up on, even though it’s one of my favorite browsers. I often use Tor browser and have the ability to bounce my IP address.
|
|
|
Post by Legend Lover on Jul 10, 2018 8:34:46 GMT -5
Um, thank you. It never happened to me. I'm not sure why someone would want to hack into the patch.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 10, 2018 8:37:27 GMT -5
Um, thank you. It never happened to me. I'm not sure why someone would want to hack into the patch. For spoofing or spam and too gather personal or general information.
|
|
|
Post by Legend Lover on Jul 10, 2018 8:39:29 GMT -5
Um, thank you. It never happened to me. I'm not sure why someone would want to hack into the patch. For spoofing or spam and too gather personal or general information. people have to much time on their hands. They should come and chat.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 10, 2018 8:44:50 GMT -5
For spoofing or spam and too gather personal or general information. people have to much time on their hands. They should come and chat. LL, it’s a BIG money making business. Banks lose MILLIONS annually as do big corporations.
|
|
|
Post by Legend Lover on Jul 10, 2018 12:15:44 GMT -5
people have to much time on their hands. They should come and chat. LL, it’s a BIG money making business. Banks lose MILLIONS annually as do big corporations. I've no doubt. I'm simply surprised that there's any info in the patch that will give these guys anything that would prove lucrative.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 10, 2018 12:24:19 GMT -5
LL, it’s a BIG money making business. Banks lose MILLIONS annually as do big corporations. I've no doubt. I'm simply surprised that there's any info in the patch that will give these guys anything that would prove lucrative. Also at times it’s done too also see how vulnerable a particular website can be, at times malicious others not so much.
|
|
|
Post by sparks on Jul 10, 2018 16:31:18 GMT -5
From a security standpoint, we are pretty locked down. We pay for security certificates to ensure that all access to the site is via a secure connection.
That being said, there really is no way on our end to keep someone from spoofing the site. Your best bet is to take the steps that Lonecoyote suggested and clear your history and cache regularly.
|
|
|
Post by sparks on Jul 10, 2018 16:49:02 GMT -5
Just received this from our hosting provider:
This error message was a direct result of side-effects of a code push we performed yesterday. There was a very brief window yesterday where users may have received that error due to an update we pushed relating to security certificates. They were temporarily revoked during that window but were reinstated immediately after the completion of the code push.
The SSL certificate you have installed alongside your domain name ensures that any information your users send or receive from the forum is private. On our end we have several monitoring systems in place to ensure that the data we store stays private and protected, as well as our systems team which actively monitors traffic to ensure that no malicious attempts to access the backend of our service are being performed.
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 10, 2018 16:56:38 GMT -5
Just received this from our hosting provider: This error message was a direct result of side-effects of a code push we performed yesterday. There was a very brief window yesterday where users may have received that error due to an update we pushed relating to security certificates. They were temporarily revoked during that window but were reinstated immediately after the completion of the code push. The SSL certificate you have installed alongside your domain name ensures that any information your users send or receive from the forum is private. On our end we have several monitoring systems in place to ensure that the data we store stays private and protected, as well as our systems team which actively monitors traffic to ensure that no malicious attempts to access the backend of our service are being performed. I claim bragging rights
|
|
|
Post by Matthew on Jul 10, 2018 17:04:08 GMT -5
Just received this from our hosting provider: This error message was a direct result of side-effects of a code push we performed yesterday. There was a very brief window yesterday where users may have received that error due to an update we pushed relating to security certificates. They were temporarily revoked during that window but were reinstated immediately after the completion of the code push. The SSL certificate you have installed alongside your domain name ensures that any information your users send or receive from the forum is private. On our end we have several monitoring systems in place to ensure that the data we store stays private and protected, as well as our systems team which actively monitors traffic to ensure that no malicious attempts to access the backend of our service are being performed. Well,,,,,Now I got a headache !
|
|
Deleted
Deleted Member
Posts: 0
Location:
|
Post by Deleted on Jul 10, 2018 17:07:36 GMT -5
Just received this from our hosting provider: This error message was a direct result of side-effects of a code push we performed yesterday. There was a very brief window yesterday where users may have received that error due to an update we pushed relating to security certificates. They were temporarily revoked during that window but were reinstated immediately after the completion of the code push. The SSL certificate you have installed alongside your domain name ensures that any information your users send or receive from the forum is private. On our end we have several monitoring systems in place to ensure that the data we store stays private and protected, as well as our systems team which actively monitors traffic to ensure that no malicious attempts to access the backend of our service are being performed. Greatly appreciate the info and what was explained to you is definitely a fact. The host usually posts a period of SSL certificate updates scheduled. This way while they update nobody on the site is vulnerable, an actual maintenance shutdown is posted during any server updates. It’s still best if everyone learns to clean their browsers cache and history at least on a daily basis. I use a special software that removes all finger prints left behind, which is totally different from cache and history. Thank you Sparks for your kindness and generosity in keeping BriarPatch available to pipe smokers, both far and near.......OUTSTANDING JOB👍👍👍👍👍
|
|
|
Post by Legend Lover on Jul 11, 2018 2:29:23 GMT -5
Thanks for the clarification.
|
|
|
Post by unknownpipesmoker on Jul 11, 2018 15:18:25 GMT -5
I’m surprised that most members don’t seem to be worried about what occurred. I traced th IP address back to a small Chinese Province. Well the lack of concern is probably mostly due to the fact that most of us don't have very sensitive information on this site. So if someone is listening, we don't care too much. I understand some of you do sell and buy on this site, though, so this may a bit more of a concern for you. I use FreeBSD which is very difficult to hack, so I am not too concerned about this security flaw permeating the rest of my operating system. Honestly its probably the PRC doing some political snooping across a wide margin of various bulletin boards and social media sites. The PRC stole my entire identity from the Office of Personnel Management.
|
|