NameSilo

alert Epik Had A Major Breach

SpaceshipSpaceship
Watch

DaveX

@GoDaveXTop Member
Impact
52,011
Last edited:
36
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
GoDaddyGoDaddy
Keep in mind I am not American, we do not have the same concept of "free speech", prosecutions can and will happen due to "hate", and multiple affected groups in this breach are, in fact, terrorist organizations in my nation, treated in every way the same as, for example, ISIS. Proud Boys, etc, are terrorists here.

My work is in the domain of counter-extremism, my publicly known trail of examples being to stifle, contain, and end the damage caused by QAnon.

Consider my opinions and stance coloured by this fact, and try not to devolve into an intellectual debate on the merits of free speech. God bless.

So you are helping your government convict people who participate in "hate" speech? Good to know. What percentage of anonymous do you think have been caught in some online crime and forced to work for feds?

The interesting thing about all these "hacks" is that the real criminals are never exposed for actual crimes. It really seems to just be about punishing actual dissidents and people with some emotional or mental health issues and making examples of them so others live in fear of the govt and keep their heads down and allow the ever encroaching tyranny from their countries without fighting back.

For example, gab was involved in real SEC fraud to the tune of millions of dollars, dealing in CP and illegal lolicon behind paywalls and even trying to get critics, ME, killed by some of their unstable fans, for real. Those things were all easy to prove with the access the hackers had but none of it came out. Why? Because Gab is a fed honeypot meant to incite and entrap people, as is epik, proudboys and Q.

Amazing, and encouraging, how few real crimes feds can solve they didn't create.
 
0
•••
Good to see so much input here, from so many different perspectives.

I wonder how many people have stopped using Epik since the breach, I suspect the cost of moving away from Epik could be very high for some people, so they're probably very reluctant to move.
 
3
•••
So you are helping your government convict people who participate in "hate" speech? Good to know. What percentage of anonymous do you think have been caught in some online crime and forced to work for feds?

As someone with a lot of experience in identifying, vetting and recruiting hackers for a number of intelligence services I can answer question to some degree.

The answer is "very few".

It's better to recruit hackers earlier, as soon as they've been identified as having the right skills.

Most people "want to do good", and that includes "black hats".
 
2
•••
Good to see so much input here, from so many different perspectives.

I wonder how many people have stopped using Epik since the breach, I suspect the cost of moving away from Epik could be very high for some people, so they're probably very reluctant to move.

Yeah, that is true. If someone has hundreds or thousands of domains there, you are talking at minimum of around $9/per domain (.COM) to move them to another registrar. Some other extensions could be even more expensive.

Epik's user base seems to be basically domain investors and extreme elements. I am not sure how either group could really be comfortable with them going forward.

Many of the more extreme elements are having their connections unearthed. Connections they probably don't appreciate being made. You would think privacy would be their top concern.

Domain investors are getting lumped in with the extreme elements. Many domain investors probably have no clue about any of the drama with Epik, especially over the last few years.

Either way, how would you have confidence going forward with how Epik was handling their customer's private information?

A few pages back someone said a CC charge was rejected recently. Has any Epik customer had a successful charge in the last couple days? I am wondering if that is a one-off issue, or PCI compliance issue.

Brad
 
Last edited:
3
•••
As someone with a lot of experience in identifying, vetting and recruiting hackers for a number of intelligence services I can answer question to some degree.

The answer is "very few".

It's better to recruit hackers earlier, as soon as they've been identified as having the right skills.

Most people "want to do good", and that includes "black hats".

So you are saying recruitment is more focused on identifying people with the skills who would agree with your version "good" vs coercion? I could see that being the case but I am sure velvet glove is also applied.
 
0
•••
Either way, how would you have confidence going forward with how Epik was handling their customer's private information?

This is the real issue to focus on right now.

Personally my confidence is very low in Rob Monster's ability to prevent future attacks, not only that but my research into his US operations and shell companies indicates that there's a lot of "shady", some of which has been pointed out already by others, so I won't repeat it.

Having looked at both the database and the code it's quite apparent that a lot needs to be rebuilt from scratch, there's a lot of work that needs doing and I'm also not confident in Epik's ability to hire and recruit the "right people" to work on it.

Who with good skills and reputation would want to work for Epik right now? I suspect not many.
 
7
•••
So you are saying recruitment is more focused on identifying people with the skills who would agree with your version "good" vs coercion? I could see that being the case but I am sure velvet glove is also applied.

It's common for intelligence services to "coerce" or worse, but that doesn't work particularly well when it comes to having someone sit in front of a computer and write code or run technical ops. Coercion under these circumstances can be highly counterproductive and when there's a lot at stake, like infiltrating a terrorist group for example, the stakes are simply too high to warrant the risk.
 
2
•••
It's common for intelligence services to "coerce" or worse, but that doesn't work particularly well when it comes to having someone sit in front of a computer and write code or run technical ops. Coercion under these circumstances can be highly counterproductive and when there's a lot at stake, like infiltrating a terrorist group for example, the stakes are simply too high to warrant the risk.


Yeah, I agree: zealot > mercenary > slave
 
0
•••
10
•••
BREAKING: hacktivists with Anonymous release a second round of data from the Epik hack. A security researcher who was able to verify the extent of the leak to me described it as "a complete own." At over 300 gigabytes worth of data, this leak is larger than the first.
 
8
•••
Curious if this 300GB is similar to the 180GB leaked already. Given the information in the previous leak spanned ten years (basically the entire length of time Epik has been around), it might suggest that this is additional data rather than the same types of data over a longer span.

Other initial thoughts: it may take some time for researchers to pore through this, as it did with the first dump. With the first, it took a while for the data to be released in a reliable way (DDoSecrets took a day or two to host it, if memory serves, because they had to reformat it). Time to analyze the data will depend a lot on what the data is and if it's formatted similarly to the previous. I imagine there will be more eyes on it more quickly this time, though, given the broad news reach of the first hack. If it's similar data to the first hack, that's a ton of information to go through. 180GB was already a ton, and researchers were only getting started. But if it's PDFs or images or something like that, it could be less dense.
 
Last edited:
3
•••
1
•••
1
•••
Ah, here we go. I was expecting to have to wait longer for details. https://www.dailydot.com/debug/anonymous-new-epik-leak/

For some reason, NamePros is apparently spamlisting the term "d_t_base d_mps", hence the ____ in the quote so the edit would go through.

WhiskeyNeon, a Texas-based hacker and cybersecurity expert who reviewed the file structure of the leak, told the Daily Dot how the disk images represented Epikโ€™s entire server infrastructure.

โ€œFiles are one thing, but a virtual machine disk image allows you to boot up the companyโ€™s entire server on your own,โ€ he said. โ€œWe usually see breaches with _____, documents, configuration files, etc. In this case, we are talking about the entire server image, with all the programs and files required to host the application it is serving.โ€

The data includes API keys and plaintext login credentials for not only Epikโ€™s system but for Coinbase, PayPal, and the companyโ€™s Twitter account.

 
Last edited:
8
•••
4
•••
2
•••
0
•••
Also, who are you?
Namepros fan?
Hacker?
Etc..?
whoami (sic), Valid question. I have held many titles, but with reference to this post, you may refer to me as a security researcher that walks a very thin line, but understands the thresholds of the systems I choose to be a part of. A name pro fan? Donโ€™t feel special, I make my presence known on forums that belong to your competitors as well, regardless of their politics. Also a privacy advocate and data protection officer concerned with how companies use and store data. Any company that does business in the state of California or the European Union and soon to be many more states is subject to oversight, regardless of how that makes them feel. Many times you donโ€™t have to โ€œHackโ€ in order to obtain the data, for instance, it required no hacking for me to verify that Epik purchased a company called Cityinformation BV, I just did a google search with a couple properly punctuated terms and a wealth of information was available, which in and of itself could be benign, but in the event of a breach it shows that there are many compliance issues, and when a company does any business in the EU that is a problem with the GDPR, also If a business holds data on any customers who are residents of the state of California and there privacy is breached that becomes an issue with the Attorney general of California. With respect to PCI DSS information that is a completely different situation and falls under the governance of the PCI Security Standards council, which brings us to the issue of Unsalted Md5 hashes and CVV numbers. There is a minimum threshold companies must adhere to in order to be in compliance with those standards and my assessment leads me to believe that threshold was not met. Period. Now you can take my assessment with a grain of salt, just make sure you use that salt for the Md5 hashes of any credit card information that is stored on your servers, or do as many do and use a third party vendor to process payments, which in the case of Epik became increasingly harder, not because of their political stance, but because of their poorly written code and their complete lack of cybersecurity, a term I personally loathe, because anybody within an organization that claims their system is secure IS the vulnerability. Consider the Epik breach a cautionary tale and use the information you are being presented by people who may not share your world view as free advice. Advice that would normally cost you a hefty price. As for those who are asking for clarification on terms they may not be familiar with, I offer you this: become familiar with these terms, google them if you have to, but learn them.
 
5
•••
*their
 
0
•••
2
•••
Appraise.net
Spaceship
Domain Recover
CatchDoms
DomainEasy โ€” Payment Flexibility
  • The sidebar remains visible by scrolling at a speed relative to the pageโ€™s height.
Back