<<  >> (p.4)
    Author Topic: About the recent attack  (Read 14107 times)
    bitfreak!
    Legendary
    *
    Offline Offline

    Activity: 1536
    Merit: 1000


    electronic [r]evolution


    View Profile WWW
    October 07, 2013, 09:31:08 PM
     #61

    In my opinion the forum software cannot be considered secure until a completely fresh version of SMF has been installed. The database doesn't need to be reset but the files need to be re-installed. If every single line of code cannot be reviewed carefully then that is what needs to happen.
    My understanding is that that's exactly what we did. We even moved to different hardware. Hence why it took several days for us to return.
    I read that we moved to different hardware, but it didn't seem like the forum was re-installed using fresh files based on what was written. Or does the code need to be reviewed to figure out that hole in the avatar system? If that's the case then I find highly surprising is that this bug seems to be undocumented. How is it that such a crucial flaw in SMF could go unnoticed so long, or was this the first time this exploit has been used to hack a website?

    My understanding the hack comprised of a couple vectors not just one point. This vector also had to do with a previous hack so it really wasn't SMF's software.
    But the first attack was facilitated by a flaw in the SMF software, which allowed the attackers to install backdoors in the first place. It sounds to me like the method used in the 2011 attack is not fully understood even now, but some people suspect the avatar system was exploited. It seems to me like the attacker is using an undocumented flaw in the SMF software.

    XCN: CYsvPpb2YuyAib5ay9GJXU8j3nwohbttTz | BTC: 18MWPVJA9mFLPFT3zht5twuNQmZBDzHoWF
    Cryptonite - 1st mini-blockchain altcoin | BitShop - digital shop script
    Web Developer - PHP, SQL, JS, AJAX, JSON, XML, RSS, HTML, CSS
Page 3
Viewing Page: 4