alert Epik Had A Major Breach

SpaceshipSpaceship
Watch

DaveX

@GoDaveXTop Member
Impact
52,011
Last edited:
36
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
Unstoppable Domains — AI StorefrontUnstoppable Domains — AI Storefront
Then Rob gets called out by a poster on his forum who says -

I believe that thread is active because you don't address specific issues brought up. It seems you want to skirt around them bringing in religion and posts like these. Some of the emails the owner Paul posted from seems you're not so ok with open dialogue, and they come across as beware what you post.

In other posts here you talk about unity among the industry, when literally on your site you have pages going against competitors like GoDaddy.

I received yet another email from you today about password reset.

I'm more concerned about what you're doing to secure the site. What about the "shitty code" your words the site is built on. Has that been fixed yet?


and

Just saw your post in the other thread. Why not post that at Namepros and send an email letting customers know what is being done. That's what we've been asking for.
It's rich that he dunks on GoDaddy considering their reseller account credentials were reportedly in the first dump.
 
3
•••
OK, let me guess.

Some future events (12/24):

*begin*

Many new members joined NamePros for the purposes of participating in this thread. None of them are domainers. They are still discussing the stuff on 200th page. Most domainers "unwatched" the thread already. Derek was the most enduring member, but even he stopped posting in November. Rob stepped in, offering $6.49 Christmas domain transfer promo. Nobody seemed to care. The hackers announced 7th leak with a few terabytes of Epik data. Nobody seemed to care. This thread itself was moved to The Break Room (little or no moderation).

*end*

Just a satire, don't take it too seriously
 
Last edited:
5
•••
From the post, seems nothing has been done nor will ever be done to rebuild the codebase.

The code is vulnerable because their "system" is just a bunch of PHP scripts, there's nothing proprietary, nothing engineered and you can't do proper static analysis of interpreted code.

"Shuting down access to endpoints" doesn't solve security when the target is an internet-facing service.

Maybe endusers buy into that response, but experts are without a doubt baffled.
 
Last edited:
6
•••
From the post, seems nothing has been done nor will ever be done to rebuild the codebase.

The code is vulnerable because their "system" is just a bunch of PHP scripts, there's nothing proprietary, nothing engineered and you can't do proper static analysis of interpreted code.

"Shuting down access to endpoints" doesn't solve security when the target is an internet-facing service.

Maybe endusers buy into that response, but experts are without a doubt baffled.
The more they deny and downplay, the more the knife will end up being twisted.

I suggested to study a particular hack from 2011 for a reason.

It escalated to the point of leaking personal emails.
 
2
•••
it just dawned on me; Rob Monster lied about already having a bug bounty program during the prayer meeting. That latest update states they launched such a program on Oct 7.

Lies. Constant lies.
 
2
•••
8
•••
Epik Fail is now penetrating the cryptocurrency news cycle.

Thanks for the link. Epik's digital currency Masterbucks has been in the news before at the time of PayPal's termination of service to Epik.

https://mashable.com/article/epik-domain-names-paypal-proud-boys

upload_2021-10-8_14-34-31.png
 
Last edited:
5
•••
https://www.washingtonpost.com/technology/2021/10/08/cryptocurrency-scam-websites/

"Wwwblockchain.com isn’t a typo. Nor is hlockchain.com or blpckchain.com.

Those sites are set up to dupe Internet users trying to reach Blockchain.com, a website that lets users buy and sell cryptocurrency.

And there’s big money in little typos. A man in Brazil paid more than $200,000 worth of bitcoin between last November and February for those and other typo Web addresses, according to sales records leaked after a hack of Epik, an Internet services company favored by the far-right. He also purchased conibase.com for more than $16,000, meant to mimic Coinbase, another cryptocurrency exchange.

“The price that this person paid blows me away,” said Zack Allen, an expert at cybersecurity company ZeroFox.


The high price paid for the Web addresses, sometimes called domains, indicates someone thinks they’ll make a substantial profit. Domains ending in dot-com cost around $10 per year and scammers often rely on ones that are even cheaper...."

But last month, Coinbase announced 6,000 of its customers had their cryptocurrency stolen through a phishing attack, in which fake log-in pages are used to steal passwords. The attack took advantage of a “flaw” in Coinbase’s two-factor authentication security system, the company said. Coinbase said it reimbursed the customers, though it didn’t say how much was lost. There’s no known link between that attack on Coinbase’s customers and conibase.com.

The man with a Brazilian address who bought the domains between November and February didn’t respond to requests for comment from The Washington Post sent in English and Portuguese via email and WhatsApp. It’s not clear if he still controls the domain names or has sold them to others.

But the bulk of Epik’s business appears not to have been the far-right, but rather domain investors. Legitimate domain investors buy domain names — often for around $10 for dot-com Web addresses, sometimes less for other suffixes — and then flip them to someone who wants to use them. Sometimes short or particularly memorable Web addresses can sell for huge sums, like HealthInsurance.com, which sold for more than $8 million dollars in 2019 to a company that markets health insurance plans. Short domain names often sell for thousands. Companies often buy up mistyped versions of their real Web addresses to protect against attacks like these, said Allen, whose firm ZeroFox offers to assist companies in finding and buying typo domains on their behalf.

An Epik spokesperson, replying from a generic email account, told The Post that “typodomains are a common tier of domains in the trading community.”


When investors sell domains — whether to cybercriminals or legitimate companies — they often use an escrow service to ensure that neither the buyer nor the seller is defrauding each other. Epik offered one such service, alongside its role as a domain registrar, selling the right to use a particular Web address.

According to records released in the hack, Epik served as an escrow agent for hundreds of transactions, including many legitimate ones. Epik appears to have charged a 2.5 percent fee for its escrow services — meaning it earned about $5,000 from the sale of the false cryptocurrency exchange Web addresses. The Post confirmed the authenticity of the records by checking with American purchasers of legitimate domains that the private details of the transactions shown in the leaked records were correct.
 
4
•••
Epik knowingly facilitates crime.
 
0
•••
I wrote this almost a year ago:

"At this time my recommendation to Epik is to change their financial models so that they can be in good standing with all the laws and rules that their business associates such as Paypal and Godaddy expect them to abide with and as such I expect Epik to be given a chance for redemption before it is permanently cut of by Godaddy and Paypal."

GoDaddy terminating fast transfer inclusions over Afternic for any of Epik’s customers
 
Last edited:
0
•••
it just dawned on me; Rob Monster lied about already having a bug bounty program during the prayer meeting. That latest update states they launched such a program on Oct 7.

Lies. Constant lies.
They have certainly had a bug bounty of sorts, at times, though I highly doubt it was formalised in any manner. I remember times on this forum where people commented that they received a bounty. But from memory, it generally related to one of the Labs projects which was usually undergoing fast development, and bugs were not particularly uncommon. Rob seems to like a bit of a crowd-sourced approach to developing some of his projects. It's not my style, though I can see the merit for it to some extent, especially when said 'crowd' is a bunch of domainers who are indeed his customers.
 
6
•••
They have certainly had a bug bounty of sorts

"High Fidelity: You have a bug bounty program?

Monster: We do!

Jackson: Where?

Monster: So right now it’s just an email, but we also are… bugs @ epik.com But what we are also doing, we actually have a software team… We have a cybersecurity team, believe it or not.

Unidentified SC3:02:39: You should fire them."
 
6
•••
"High Fidelity: You have a bug bounty program?

Monster: We do!

Jackson: Where?

Monster: So right now it’s just an email, but we also are… bugs @ epik.com But what we are also doing, we actually have a software team… We have a cybersecurity team, believe it or not.

Unidentified SC3:02:39: You should fire them."

Several people have already indicated that they had reported security bugs to Rob personally. The problem is that he didn't act upon these reports.
 
7
•••
Security shouldn't be an afterthought, it has to be part of your company DNA, including the Boardroom.

As soon as Epik feels confident about their code, it's highly recommended to list the company on https://www.hackerone.com/

HackerOne is a vulnerability coordination and bug bounty platform that connects businesses with penetration testers and cybersecurity researchers. It was one of the first companies, along with Synack and Bugcrowd, to embrace and utilize crowd-sourced security and cybersecurity researchers as linchpins of its business model; it is the largest cybersecurity firm of its kind.

HackerOne was created by the Dutch, something that Rob will certainly appreciate as an extra bonus.
 
Last edited:
5
•••
it just dawned on me; Rob Monster lied about already having a bug bounty program during the prayer meeting. That latest update states they launched such a program on Oct 7.

Lies. Constant lies.

As others will have pointed out, our bug bounty program was informal through email and our ticketing system. We absolutely did and do pay out many bug bounties over the years to ethical hackers.

As of earlier this year, we have been incubating a proprietary bug reporting system. It is not ready yet but we think it is mission critical enough to self-host it.

In the end, we went with a commercial solution since we would rather have hackers choose an ethical path, and we realize that their skills and time have value.

HackerOne is one we did consider for our formal bug bounty platform, but since they never replied to our inquiries, why we went with BugCrowd.

As for the mystery of the $444 deposited to your GoFundMe page, as I guess that mystery is unsolved for you despite the bread crumbs, here is a clue for what that was about.


And, yes, I still have faith in you.
 
1
•••
0
•••
As others will have pointed out, our bug bounty program was informal through email and our ticketing system. We absolutely did and do pay out many bug bounties over the years to ethical hackers.

As of earlier this year, we have been incubating a proprietary bug reporting system. It is not ready yet but we think it is mission critical enough to self-host it.

In the end, we went with a commercial solution since we would rather have hackers choose an ethical path, and we realize that their skills and time have value.

HackerOne is one we did consider for our formal bug bounty platform, but since they never replied to our inquiries, why we went with BugCrowd.

As for the mystery of the $444 deposited to your GoFundMe page, as I guess that mystery is unsolved for you despite the bread crumbs, here is a clue for what that was about.


And, yes, I still have faith in you.

Monster post hack actions:
1) Curse data.
2) Offer up customers to sacrifice.
3) Cuck.
 
0
•••
I appreciate that you are all talking about me. I will not address your lies, fake "evidence" etc.

Have a good life.

Joey Camp
I don't hate you. I had never even heard your name until Monster was bad mouthing you on his live stream and offered you up as a sacrifice to the hordes, which I found disgusting as someone who actually believes in free speech. Other than that, all I know is what this user, Molly, has said and I have no idea who she is or if she is even a real person. I am honestly not interested in the online beef between the two of you and I know it is always best to stay out of e-celeb drama but I am interested in exposing this grifter, Rob Monster, who is trying to redefine US 1A into some European version and using the name of Christ as part of his affinity grift to manipulate people but mostly because he is a danger to good people. For years, he has been lying about his products and services putting the lives of dissidents and activists and Christians all over the world in peril and now we see the result of his ignoring all those warning that he answered with threats and personal attacks. It's almost like all this was his plan all along.

Anyway, I know you can't very well admit to anything that could potentially be used against you but please do the best you can.

1) Are those posts that show your conversation with Monster about Molly real or fake?
2) In your post attached you seem to believe that Monster did a deal with "hackers", do you think he has done any deals with feds or antifa types before the hack was published to ID customers?
3) Did Monster ask you to research me in any way? (I won't do anything to you) I've heard some things...

Don't let Rob Monster use you. He is a dishonest person that has hurt a lot of good people and will continue to hurt good people if he is able, and he'll throw you under any bus if it serves him.
 

Attachments

  • E_l_uL0X0AQRmKQ.png
    E_l_uL0X0AQRmKQ.png
    25.1 KB · Views: 192
  • E_lPkyGX0AUrUEp.png
    E_lPkyGX0AUrUEp.png
    130.9 KB · Views: 216
1
•••
As for the mystery of the $444 deposited to your GoFundMe page, as I guess that mystery is unsolved for you despite the bread crumbs, here is a clue for what that was about.


And, yes, I still have faith in you.

When I donate money to a cause or charity, I don't publicly try to take credit for it. It makes me question how sincere it actually is.

Regardless, this is just more deflection away from answering the hard questions IMO.

Stop deflecting and start answering the tough questions people have for you.

Brad
 
Last edited:
4
•••
When I donate money to a cause or charity, I don't publicly try to take credit for it. It makes me question how sincere it actually is.

My first impression was this:

Winning hearts and minds is a concept occasionally expressed in the resolution of war, insurgency, and other conflicts, in which one side seeks to prevail not by the use of superior force, but by making emotional or intellectual appeals to sway supporters of the other side.​
 
5
•••
Dynadot — .com TransferDynadot — .com Transfer
Appraise.net

We're social

Spaceship
Domain Recover
CatchDoms
DomainEasy — Zero Commission
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back