Dynadot

alert Epik Had A Major Breach

Spaceship Spaceship
Watch

Silentptnr

Domains88.comTop Member
Impact
47,110
Last edited:
33
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
Were total slowness and troubles there... with any changes for domains.
Not just login form.

BEFORE this thread.
 
Last edited:
1
•••
Were total slowness and troubles there... with any changes for domains.
Not just login from.

BEFORE this thread.

Yes, you've mentioned that once or twice. ;) Unfortunately, without additional information, that's not particularly useful in assessing what happened.
 
4
•••
For example, after I clicked SAVE button for another nameservers - successful banner appeared after ~30 seconds.
 
1
•••
As a side note. The pdf mentions Epik-provided "hosting" of various websites the hackers do not like. I refreshed my memory and checked whois of a few domains of this nature (registered via epik). Would not post domains in this thread - it is indexed and may attract irrelevant comments from non-domaining community as the result. But, any domainer can generate such a list. From ~3 domains I remembered, ALL are using cloudflare dns servers and cloudflare IPs. So, epik serves as a registrar only. So, it is unclear what are the hackers speaking about? What real IPs, hosting companies, etc..? Just the non-private whois (how real would it really be?)... payment details maybe (should be anonymous like btc)... ?
 
1
•••
As a side note. The pdf mentions Epik-provided "hosting" of various websites the hackers do not like. I refreshed my memory and checked whois of a few domains of this nature (registered via epik). Would not post domains in this thread - it is indexed and may attract irrelevant comments from non-domaining community as the result. But, any domainer can generate such a list. From ~3 domains I remembered, ALL are using cloudflare dns servers and cloudflare IPs. So, epik serves as a registrar only. So, it is unclear what are the hackers speaking about? What real IPs, hosting companies, etc..? Just the non-private whois (how real would it really be?)... payment details maybe (should be anonymous like btc)... ?

a couple of things that we need hear from the people themselves … first from Rob Monster concerning the whole situation.. second from Anonymous as to rather it is truly anonymous that did the hack .
 
4
•••
@tonyk2000, I wouldn't read too much into the message written by the attacker.
 
4
•••
second from Anonymous as to rather it is truly anonymous that did the hack .

"Anonymous" isn't a cohesive entity or organization; it's just a term used by random attackers. The letter from the attacker even pokes fun at this fact:
OFFICIAL ANONYMOUS (not to be confused with 'Anonymous Official' grifters) PRESS RELEASE
As such, there's no way you could "hear from Anonymous."
 
Last edited:
3
•••
I looked all over the internet .. including Dark .. I have found nothing from Anonymous stating they coordinated and are responsible for the hack .. so until clarity comes from Rob Monster and Anonymous.. I will just monitor
 
0
•••
I looked all over the internet .. including Dark .. I have found nothing from Anonymous stating they coordinated and are responsible for the hack .. so until clarity comes from Rob Monster and Anonymous.. I will just monitor

I've already explained this.
 
0
•••
"Anonymous" isn't a cohesive entity or organization; it's just a term used by random attackers. The letter from the attacker even pokes fun at this fact. As such, there's no way you could "hear from Anonymous."

the hacker or hackers usually post a video .. if it’s an anonymous hacker .. maybe things have changed though .. who knows
 
0
•••
0
•••
the hacker or hackers usually post a video .. if it’s an anonymous hacker .. maybe things have changed though .. who knows

It's never been like that. It's a common point of confusion.

It would be akin to a group of people who wear jeans. Anyone can join the group by simply wearing jeans. Who represents the group? Well, nobody, really; it's just an arbitrary collection of people who have decided they want to be part of that collection.

Attackers know this causes confusion and play it up.
 
1
•••
I've already explained this.

sorry .. I don’t dig through threads .. I join in on whatever page the thread is on and comment ..
 
1
•••
Skipped the couple of hundred posts. Is it true they were hacked? Sorry for being lazy but if true I'd better start transferring instead of going through all posts.
 
0
•••
It's never been like that. It's a common point of confusion.

It would be akin to a group of people who wear jeans. Anyone can join the group by simply wearing jeans. Who represents the group? Well, nobody, really; it's just an arbitrary collection of people who have decided they want to be part of that collection.

Attackers know this causes confusion and play it up.

I am fully aware it is not a group .. gang or the sort … it’s not an alliance .. it’s an allegiance and all that stuff .. I had a friend of mine do the Dark Web shit .. there was nothing of data release or any one flaunting responsibility for that attack ..at least not as of 3 am ..
 
1
•••
there was nothing of data release or any one flaunting responsibility for that attack ..at least not as of 3 am ..

The data is being distributed publicly--not on the dark web, but out in the open. Links were accessible via various news articles yesterday. (Edit: I've removed references to specific news articles, since it's possible the authors didn't realize what they were publishing.)

Skipped the couple of hundred posts. Is it true they were hacked? Sorry for being lazy but if true I'd better start transferring instead of going through all posts.

The snippets of data I've seen appear to indicate as much, but the dataset is quite large, so I don't think anyone can be certain at this point. Epik doesn't seem to have commented.
 
Last edited:
1
•••
Of course, but incident response is a tricky beast. It's overwhelming at best. Even the most prepared teams have to prioritize and end up making decisions that don't necessarily look great in hindsight.

There's always a human element, and as someone who's had experience being paged at 4 AM while on vacation because some random person decided that would be a great time launch an attack, I certainly empathize with what they're going through right now. Again, that's not to say I condone the silence or their security practices, but it's a tough situation to be in.



Keep in mind the actual attack in the spotlight here wasn't a DDoS attack, and it's important not to conflate the two. Denial of Service is just that: users have trouble accessing a service. It doesn't mean data has been leaked. That's not what appears to have happened here.

When enough real people visit a website, it has the same effect as a DDoS attack. If a lot of people are trying to log in right now, it will be indiscernible from the users' perspective: the site will slow down and fail to function properly. That's not an attack; that's just a side effect of everyone panicking.

Paul thanks for chiming in glad I tagged you. What would the steps be in order from first to last if you were consulted here or owned Epik in it's entirety?
 
0
•••
The data is being distributed publicly--not on the dark web, but out in the open. There's a link to it in the PDF on DNW.



The snippets of data I've seen appear to indicate as much, but the dataset is quite large, so I don't think anyone can be certain at this point. Epik doesn't seem to have commented.

there actually is a video made that posted on Twitter .. I am on my phone and can’t post it .. but it is common for Anonymous to post a video .. they did
 
0
•••
Paul thanks for chiming in glad I tagged you. What would the steps be in order from first to last if you were consulted here or owned Epik in it's entirety?

I would need to know a lot more about Epik, its staff, and its infrastructure before I would be able to answer that.

If I were to be consulted, my first step would be to acquire that information.

there actually is a video made that posted on Twitter .. I am on my phone and can’t post it .. but it is common for Anonymous to post a video .. they did

There's no "they."
 
Last edited:
2
•••
Thanks @Paul . Gonna be a busy night moving stuff... Fortunately there's a NC promo running. Got some developed stuff there (just regs, not hosting) so time is of the essence.
 
1
•••
I meant .. who ever did it .. it .. him .. her .. them
 
Last edited:
0
•••
What would the steps be in order from first to last if you were consulted here or owned Epik in it's entirety?

I suppose the one step that applies no matter what is: log everything. From the moment you find out there might be an issue, everything needs to be recorded. This has a number of benefits:
  1. It forces you to think about what you're doing instead of panicking.
  2. It provides a record of your response. Optionally, it can be published live to reassure users that you're responding to the incident.
  3. It ensures everyone responding is on the same page.
  4. For long incidents, it allows you to hand off, which is important: tired, stressed incidence response teams make mistakes, so each individual on the team needs to be able to rest without fear of being paged.
  5. It enables to you to learn from the incident after-the-fact.
 
Last edited:
4
•••
I think it’s been a long enough period of silence from Rob/Epik that I’m going to begin the process of moving out domains to another registrar.

At the very least they could have put a banner or blog post up saying “we’re investigating, here’s what customers should do in the meantime…” but they haven’t.
 
1
•••
I looked all over the internet .. including Dark .. I have found nothing from Anonymous stating they coordinated and are responsible for the hack .. so until clarity comes from Rob Monster and Anonymous.. I will just monitor

The @ AnonOpsSE posted (@ AnonOps didn't )

twitter .com /AnonOpsSE/status/1438100775968837636

ann.jpg
 
2
•••
This thread is exploding. I still have a few pages to catch up on. Here are brief thoughts.

I just found this tweet. This was just reported as news yesterday, but the tweet is from (2) days ago.


Hackers come in many different colors. Most are determined to steal data and sell it on the dark web. Identity theft, bribes, ransomware, and other scams. This one sounds like it was motivated by Rob's position on free speech, hate speech to be precise. This is well documented on NP, Wikipedia, and many other sites, including journalist articles. I don't know what he was thinking. Maybe a way to differentiate his company.

Companies are going to get hacked; that's just the way it is. While there are clearly security lapses visible in the data, that's no different from any other company. Maybe it was hacktivism, maybe it was a disgruntled customer, maybe it was just someone who thought it was fun--it doesn't really matter.

This is very true. The bigger the company gets the more likely it will become a target. But what is most important is what is the company's response.
 
0
•••
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back