IT.COM

alert Epik Had A Major Breach

Spaceship Spaceship
Watch

Silentptnr

Domains88.comTop Member
Impact
47,110
Last edited:
33
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
Ok. So out of curiosity, I just logged into my Epik account just now only to find 3 of my domains in 'Unlock' state.

I checked and there is no transfer out taking place on them and they look fine. As per whois, and after verifying with chat support I can confirm these domains got unlocked on 15th or 16th Sept 2021.

I do not know if this has any relation to this incident that took place with Epik.

But just thought of sharing this scenario so that other members can verify that their domains are secured.

Epik support has forwarded my concern to their technical team to see if there was any unauthorized access into my account.
 
10
•••
The attack does not appear to have been successful. The attacker appears to have grown frustrated and attempted to register a new account when they weren't able to compromise existing accounts. The new account was flagged for review and closed.

If this is how the hacker does things then I have 4 suspects:

-------------------------------------------------------------------
Nidoma, BrandDo, PotDomains, &
SEDO ?!?!!?!
-------------------------------------------------------------------

The one in red is highly suspect because it's the only one I registered under their UK subdomain [sedo.co.uk]
, the rest are under Italy, Private/Cayman, and US.

Now I believe the one impersonating me should have his account flagged for precaution.


This site - I noticed the numbers change frequently. Just yesterday it was 46+%. Daily regs changed from XX to XXX even for data 2 days ago. So I'm not sure how accurate is this site. Anyone here from Alpnames? The site showed that Alpnames still have names there, seriously.

Ok. So out of curiosity, I just logged into my Epik account just now only to find 3 of my domains in 'Unlock' state.

I checked and there is no transfer out taking place on them and they look fine. As per whois, and after verifying with chat support I can confirm these domains got unlocked on 15th or 16th Sept 2021.

I do not know if this has any relation to this incident that took place with Epik.

But just thought of sharing this scenario so that other members can verify that their domains are secured.

Epik support has forwarded my concern to their technical team to see if there was any unauthorized access into my account.

Have you changed pw yet since the hack announcement? More data we have the better.
 
2
•••
Have you changed pw yet since the hack announcement? More data we have the bette
Yes I had changed the password probably on the day this thread came up.
 
4
•••
It doesn't matter: how they update this stats.
Risks to lose domains remain the same.
 
Last edited:
2
•••
@Paul Thanks for all your input here. Great to have someone who actually knows what they're talking about, instead of lots of assumptions. Anyway, I was just wondering if you've established from the dataset whether CVV's were stored with the CR Card details?
Thanks!
 
2
•••
3
•••
Epik support has forwarded my concern to their technical team to see if there was any unauthorized access into my account.
So you didn't use 2FA, right?
 
2
•••
2
•••
I just logged into my Epik account just now only to find 3 of my domains in 'Unlock' state.

This has happened to me in the past causing significant panic. I immediately reactivated the lock and asked what happened...I got a response but can't access that file at the moment but it was sufficient to keep me calm. Since they do not send an email (like some other registrars do) when an unlock happens, out of habit I check my lock status on a regular basis.

btw, activate 2fa now if you have not
 
Last edited:
4
•••
Last edited:
2
•••
Last edited:
2
•••
The $2,000 question is where is Rob Monster hiding.
The last time that he post/spam something here is on September 7.
Not a good and professional practice to leave thousand of customers here in the dark.
 
9
•••
Maybe the noobs need to watch now for phishing emails.
 
1
•••
The $2,000 question is where is Rob Monster hiding.
The last time that he post/spam something here is on September 7.
Not a good and professional practice to leave thousand of customers here in the dark.
He is here daily.
But only in DM mode.
 
1
•••
3.5 hours of Epik CEO Rob Monster's live Q&A

 
Last edited:
12
•••
Is this Epik's current strategy? It sure seems like it.

upload_2021-9-18_12-48-46.png
 
Last edited:
12
•••
3
•••
The microphones have been hacked also.
 
2
•••
4
•••
No posts = No dislikes.
This is their strategy.
 
5
•••

Cybersecurity, brought to you by thoughts and prayers.

I don't know about you, but I would rather have qualified people in the role.

Epik has still basically taken no responsibly in their failure to safeguard customer's data. Not only that, they just seem to be ignoring how complete and disastrous this hack was in the first place.

https://www.wired.com/story/anonymous-leaked-data-from-right-wing-web-host-epik/

Ignore, deflect, blame is not going to work.

At this point, how could even the biggest Epik supporters feel comfortable with their response? They are basically leaving customers out there on their own with no further information or guidance on what they should be doing.

Brad
 
Last edited:
10
•••
Hmm. What is going on there?

Brad

Maybe it's junk domains in lower quality TLDs that were registered for like 99cents last year. I've seen a lot of junk domains in their Daily Diamonds.

Even right now, there are dozens of domains like this:

livelyaboulevard.xyz

that will be in redemption in a few days.
 
Last edited:
3
•••
In my opinion everyone here is overreacting to this situation.

Hackers have different motives for doing what they do.

Some are motivated by financial gains and some are motivated by ideology and politics. And some just want to monitor certain companies and organizations and never reveal that they have hacked their systems which could go on for years without anyone noticing and could be harmless if done by friendlies or very harmful if done by hostile adversaries.

But, hacktivists always have to be able to present some justification for their actions as to not be considered terrorists or saboteurs and spies by the Authorities because although they might be anonymous to the general public, but they are not so anonymous to the those who are in the know.

In my opinion the motive here has been more to punish rather than to destroy hence the fact that hackers have gone out of their way to protect most credit card and password info.

I don’t believe that the average innocent customer should worry too much about their credit cards or domains and should not have any fear of losing anything. Although if you are the kind of person who enjoys inflicting pain onto others then you probably need to be a little scared.

I am very optimistic that Epik can get back on their feet once they have reevaluated their whole company strategy and changed how and with whom they are doing business with.

IMO

No further comments.
 
9
•••
Maybe it's junk domains in lower quality TLDs that were registered for like 99cents last year. I've seen a lot of junk domains in their Daily Diamonds.

Even right now, there are dozens of domains like this:

livelyaboulevard.xyz

The math doesn't seem to work out. Almost half their total registered domains are junk and deleting?

https://domainnamestat.com/statistics/registrar/Epik_Inc_-IANA_ID-617

Registered domains 612,936
Global market share 0.12%
Signed zones 19,548
Upcoming deletes 279,329 (45.57%)

If you look at more detail the only extensions that show substantial registration volume (above 20k) are -

COM - 327,803
CO - 151,131
ORG - 26,307
INFO - 25,646

Something is not adding up.

Brad
 
Last edited:
8
•••
In my opinion everyone here is overreacting to this situation.

Hackers have different motives for doing what they do.

Some are motivated by financial gains and some are motivated by ideology and politics. And some just want to monitor certain companies and organizations and never reveal that they have hacked their systems which could go on for years without anyone noticing and could be harmless if done by friendlies or very harmful if done by hostile adversaries.

But, hacktivists always have to be able to present some justification for their actions as to not be considered terrorists or saboteurs and spies by the Authorities because although they might be anonymous to the general public, but they are not so anonymous to the those who are in the know.

In my opinion the motive here has been more to punish rather than to destroy hence the fact that hackers have gone out of their way to protect most credit card and password info.

I don’t believe that the average innocent customer should worry too much about their credit cards or domains and should not have any fear of losing anything. Although if you are the kind of person who enjoys inflicting pain onto others then you probably need to be a little scared.

I am very optimistic that Epik can get back on their feet once they have reevaluated their whole company strategy and changed how and with whom they are doing business with.

IMO

No further comments.

Overreacting? To what appears to be one of the most complete data breaches?
One that seems to involve a lot of poor security practices by Epik.

Gee, that is really reassuring that the hackers have decided to not inflict maximum damage on the customers, though they could if they wanted. That is the point.

I am not sure how anyone could feel comfortable with this company after Epik's (lack of) response to the situation.

Brad
 
Last edited:
11
•••
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back